{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T20:22:06Z","timestamp":1757622126767,"version":"3.44.0"},"reference-count":39,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,11]]},"DOI":"10.1109\/itnac46935.2019.9078007","type":"proceedings-article","created":{"date-parts":[[2020,4,27]],"date-time":"2020-04-27T20:49:26Z","timestamp":1588020566000},"page":"1-4","source":"Crossref","is-referenced-by-count":2,"title":["Data Security Frameworks for Mobile Cloud Computing: A Comprehensive Review of the Literature"],"prefix":"10.1109","author":[{"given":"Noah Oghenefego","family":"Ogwara","sequence":"first","affiliation":[{"name":"School of Engineering, Computer and Mathematical Sciences, Auckland University of Technology, Auckland, New Zealand"}]},{"given":"Krassie","family":"Petrova","sequence":"additional","affiliation":[{"name":"School of Engineering, Computer and Mathematical Sciences, Auckland University of Technology, Auckland, New Zealand"}]},{"given":"Mee Loong","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Engineering, Computer and Mathematical Sciences, Auckland University of Technology, Auckland, New Zealand"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2018.11.003"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2019.01.002"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-3811-6"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TEL-NET.2017.8343558"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-017-0797-4"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.08.017"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2018.03.008"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2018.8376973"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAIE.2018.8405469"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2017.2649685"},{"key":"ref10","first-page":"1","author":"mell","year":"2011","journal-title":"The NIST Definition of Cloud Computing Recommendations of the National Institute of Standards and Technology"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICEAC.2010.5702296"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SOSE.2010.20"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2011.5928784"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2011.5928886"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICPPW.2011.6"},{"key":"ref16","first-page":"710","article-title":"Survey on cloud based mobile security and a new framework for improvement","author":"lin","year":"2011","journal-title":"Proc IEEE Int Conf Inf Autom"},{"key":"ref17","first-page":"364","article-title":"How to dynamically protect data in mobile cloud computing?","author":"lu","year":"2012","journal-title":"proc Joint Int Conf on Perv Computing and the Networked World"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ITST.2013.6685567"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-013-0967-y"},{"key":"ref28","first-page":"401","article-title":"An ID-Based Anonymous Authentication Scheme for Distributed Mobile Cloud Computing","author":"zhang","year":"2016","journal-title":"Proc of the Int Conf on Geo-Informatics in Resource Management and Sust Ecosystems"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/S1007-0214(11)70070-0"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-0135-2_75"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.04.018"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jnca.2010.07.006","article-title":"A survey on security issues in service delivery models of cloud computing","volume":"34","author":"subashini","year":"2011","journal-title":"Journal of Network and Computer Applications"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/MobileCloud.2017.41"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.02.001"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-016-2400-3"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSP.2015.7322756"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICEEOT.2016.7755144"},{"journal-title":"The Treacherous 12 Cloud Computing Top Threats in 2016","year":"2016","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.1203"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2013.108"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MSN.2015.28"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-013-1055-z"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/INDICON.2015.7443761"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MobileCloud.2015.15"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CloudTech.2015.7336962"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/GCCT.2015.7342725"}],"event":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","start":{"date-parts":[[2019,11,27]]},"location":"Auckland, New Zealand","end":{"date-parts":[[2019,11,29]]}},"container-title":["2019 29th International Telecommunication Networks and Applications Conference (ITNAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9068186\/9077926\/09078007.pdf?arnumber=9078007","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T17:40:00Z","timestamp":1757353200000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9078007\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/itnac46935.2019.9078007","relation":{},"subject":[],"published":{"date-parts":[[2019,11]]}}}