{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T09:59:46Z","timestamp":1730282386891,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,4]]},"DOI":"10.1109\/menacomm.2018.8371017","type":"proceedings-article","created":{"date-parts":[[2018,6,4]],"date-time":"2018-06-04T23:01:46Z","timestamp":1528153306000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["A secure client-side framework for protecting the privacy of health data stored on the cloud"],"prefix":"10.1109","author":[{"given":"Ali","family":"Sakr","sequence":"first","affiliation":[]},{"given":"Elias","family":"Yaacoub","sequence":"additional","affiliation":[]},{"given":"Hassan","family":"Noura","sequence":"additional","affiliation":[]},{"given":"Mohammed","family":"Al-Husseini","sequence":"additional","affiliation":[]},{"given":"Khalid","family":"Abualsaud","sequence":"additional","affiliation":[]},{"given":"Tamer","family":"Khattab","sequence":"additional","affiliation":[]},{"given":"Mohsen","family":"Guizani","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"910","article-title":"A Single to Multi-Cloud Security based on Secret Sharing Algorithm","volume":"1","author":"mallareddy","year":"2014","journal-title":"International Journal of Research (IJR)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-22915-7_2"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1966445.1966449"},{"key":"ref13","first-page":"3261","article-title":"Cloud Computing Security from Single to Multi-clouds using Secret Sharing Algorithm","volume":"2","author":"pareek","year":"2013","journal-title":"International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)"},{"key":"ref14","article-title":"An Approach Secret Sharing Algorithm in Cloud Computing Security over Single to Multi Clouds","volume":"3","author":"alam","year":"2013","journal-title":"International Journal of Scientific and Research Publications"},{"key":"ref15","first-page":"395","article-title":"Using Secret Sharing Algorithm for Improving Security in Cloud Computing","volume":"3","author":"mirajkar","year":"2014","journal-title":"International Journal of Advanced Research in Computer Science and Technology (IJARCST)"},{"journal-title":"Health Information Privacy","year":"2017","key":"ref16"},{"key":"ref4","first-page":"176","article-title":"Fog Computing: Implementation of Security and Privacy to Comprehensive Approach for Avoiding Knowledge Thieving Attack Exploitation Decoy Technology","volume":"2","author":"kurikala","year":"2017","journal-title":"International Journal of Scientific Research in Computer Science Engineering and Information Technology"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2766923"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.17485\/ijst\/2017\/v10i18\/112116"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2012.05.001"},{"key":"ref8","first-page":"718","article-title":"Survey on Data Storage and Retrieval Techniques over Encrypted Cloud Data","volume":"14","author":"raghavendra","year":"2016","journal-title":"International Journal of Computer Science and Information Security (IJCSIS)"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ISPDC.2016.31"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.05.010"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.06.124"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2009.139"}],"event":{"name":"2018 IEEE Middle East and North Africa Communications Conference (MENACOMM)","start":{"date-parts":[[2018,4,18]]},"location":"Jounieh","end":{"date-parts":[[2018,4,20]]}},"container-title":["2018 IEEE Middle East and North Africa Communications Conference (MENACOMM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8369046\/8370996\/08371017.pdf?arnumber=8371017","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,6,18]],"date-time":"2018-06-18T23:12:50Z","timestamp":1529363570000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8371017\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/menacomm.2018.8371017","relation":{},"subject":[],"published":{"date-parts":[[2018,4]]}}}