{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T21:37:28Z","timestamp":1757540248323,"version":"3.28.0"},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1109\/isda.2015.7489267","type":"proceedings-article","created":{"date-parts":[[2016,6,13]],"date-time":"2016-06-13T18:22:17Z","timestamp":1465842137000},"page":"421-427","source":"Crossref","is-referenced-by-count":13,"title":["An efficient algorithm for data security in Cloud storage"],"prefix":"10.1109","author":[{"given":"Ali","family":"Azougaghe","sequence":"first","affiliation":[]},{"given":"Zaid","family":"Kartit","sequence":"additional","affiliation":[]},{"given":"Mustapha","family":"Hedabou","sequence":"additional","affiliation":[]},{"given":"Mostafa","family":"Belkasmi","sequence":"additional","affiliation":[]},{"given":"Mohamed","family":"El Marraki","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Cloud Security Alliance","article-title":"Top Threats to Cloud Computing","year":"2010","key":"ref4"},{"key":"ref3","first-page":"6","article-title":"A Platform Computing Whitepaper","year":"2010","journal-title":"&#x2014;Enterprise Cloud Computing Transforming IT"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"927","DOI":"10.1016\/j.jnca.2011.03.010","article-title":"Secure and privacy preserving keyword searching for cloud storage services","volume":"35","author":"qin","year":"2012","journal-title":"Journal of network and mputer applications"},{"key":"ref6","article-title":"Data Security and Privacy in Cloud Storage using Hybrid Symmetric Encryption Algorithm","volume":"2","author":"arockiam","year":"2013","journal-title":"International Journal of Advanced Research in Computer and Communication Engineering"},{"journal-title":"A 9 Top Threats To Cloud Computing Security","year":"0","key":"ref5"},{"journal-title":"The Design of RIJNDAEL AES-The Advanced Encryption Standard","year":"2013","author":"daemen","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057074"},{"key":"ref2","article-title":"Cloud Computing Security Issues in Infrastructure as a Service","volume":"2","author":"arora","year":"2012","journal-title":"Int J Adv Res Comput Sci Softw Eng"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS.2009.5201385"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2011.55"}],"event":{"name":"2015 15th International Conference on Intelligent Systems Design and Applications (ISDA)","start":{"date-parts":[[2015,12,14]]},"location":"Marrakech, Morocco","end":{"date-parts":[[2015,12,16]]}},"container-title":["2015 15th International Conference on Intelligent Systems Design and Applications (ISDA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7484413\/7489153\/07489267.pdf?arnumber=7489267","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T12:18:09Z","timestamp":1498306689000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7489267\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/isda.2015.7489267","relation":{},"subject":[],"published":{"date-parts":[[2015,12]]}}}