{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T12:04:29Z","timestamp":1768737869367,"version":"3.49.0"},"reference-count":68,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Serv. Comput."],"published-print":{"date-parts":[[2021,11,1]]},"DOI":"10.1109\/tsc.2019.2904958","type":"journal-article","created":{"date-parts":[[2019,3,13]],"date-time":"2019-03-13T18:47:00Z","timestamp":1552502820000},"page":"1717-1725","source":"Crossref","is-referenced-by-count":20,"title":["Defending <i>N<\/i>-Version Programming Service Components against Co-Resident Attacks in IoT Cloud Systems"],"prefix":"10.1109","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1606-1644","authenticated-orcid":false,"given":"Liudong","family":"Xing","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2107-8291","authenticated-orcid":false,"given":"Gregory","family":"Levitin","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9477-284X","authenticated-orcid":false,"given":"Yanping","family":"Xiang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2429132"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6883415"},{"key":"ref33","first-page":"929","article-title":"A measurement study on co-residence threat inside the cloud","author":"xu","year":"0","journal-title":"Proc 24th USENIX Security Symp"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2381913.2381915"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-013-0210-0"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.31"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2345396.2345473"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-02786-9_7"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2505680"},{"key":"ref34","first-page":"913","article-title":"A placement vulnerability study in multi-tenant public clouds","author":"varadarajan","year":"0","journal-title":"Proc 24th USENIX Conf Security Sympo USENIX Assoc"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/ColumbianCC.2015.7333473"},{"key":"ref62","article-title":"Example of a private cloud implementation","year":"0"},{"key":"ref61","article-title":"Guidelines for building a private cloud infrastructure","author":"panti?","year":"2012"},{"key":"ref28","first-page":"827","article-title":"D&#x00FC;ppel: Retrofitting commodity operating systems to mitigate cache side channels in the cloud","author":"zhang","year":"0","journal-title":"Proc ACM SIGSAC Conf Comput Commun Secur"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2015.2460333"},{"key":"ref64","first-page":"88","article-title":"Key architectural models, security issues and solutions on Cloud computing","volume":"5","author":"mebrahtu","year":"2017","journal-title":"Int J Comput Sci Trends Technol"},{"key":"ref27","article-title":"STEALTHMEM: System level protection against cache-based side channel attacks in the cloud","author":"kim","year":"0","journal-title":"Proc 21st USENIX Secur Symp"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2012.11.015"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2016.01.002"},{"key":"ref29","first-page":"687","article-title":"Scheduler-based defenses against cross-VM side-channels","author":"varadarajan","year":"0","journal-title":"Proc 23rd USENIX Secur Symp"},{"key":"ref67","first-page":"29","article-title":"Early warning systems for cyber defence","author":"kalutarage","year":"2015","journal-title":"Proc Int Workshop Open Problems Netw Security"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2017.08.021"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.bushor.2015.03.008"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2312291"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2014.2358236"},{"key":"ref22","first-page":"3019","article-title":"An extensive survey on co-resident attack in dynamic cloud computing environment","volume":"11","author":"nalinipriya","year":"2016","journal-title":"Int J Appl Eng Res"},{"key":"ref21","article-title":"Defending against co-resident attacks in cloud computing, PhD thesis","author":"han","year":"2015"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2011.04.017"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2011.110"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2012.28"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/DSNW.2011.5958812"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.5120\/20421-2721"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2017.06.006"},{"key":"ref59","article-title":"Community cloud services: The next big thing?","author":"butler","year":"0"},{"key":"ref58","article-title":"The community cloud","author":"sheldon","year":"0"},{"key":"ref57","article-title":"Explaining the community cloud","author":"kleyman","year":"0"},{"key":"ref56","year":"0"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.fcij.2017.02.001"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/DEST.2009.5276725"},{"key":"ref53","article-title":"Cloud Computing for Home Automation","author":"p\u00fchringer","year":"2015"},{"key":"ref52","first-page":"483","article-title":"Cloud-based smart home environment (CoSHE) for home healthcare","author":"pham","year":"0","journal-title":"Proc IEEE Int Conf Autom Sci Eng"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/24.370218"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/800215.806583"},{"key":"ref40","first-page":"9","article-title":"Colocation-resistant clouds","author":"azar","year":"0","journal-title":"Proc 6th ACM Workshop Cloud Comput Secur"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/S0951-8320(00)00089-2"},{"key":"ref13","author":"johnson","year":"1989","journal-title":"Design and Analysis of Fault-Tolerant Digital Systems"},{"key":"ref14","first-page":"3","article-title":"N-version programming: A fault tolerance approach to reliability of software operation","author":"chen","year":"0","journal-title":"Proc Int Symp Fault-Tolerant Comput"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/T-C.1971.223133"},{"key":"ref16","first-page":"463","article-title":"Optimization of weights for threshold redundancy of binary channels by the method of (Mahalanobis') generalized distance","author":"gogiashvili","year":"0","journal-title":"Proc 2nd Int Conf Math Methods Rel"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/24.765926"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.14419\/jacst.v3i2.3588"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653687"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.01.010"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2015.23"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1721654.1721672"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2008.12.001"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1985.231893"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2010.28"},{"key":"ref49","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1145\/2479942.2479946","article-title":"A framework for partitioning and execution of data stream applications in mobile cloud computing","volume":"40","author":"yang","year":"2013","journal-title":"SIGMETRICS Perform Eval Rev ACM"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1515\/9781400882618-003"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.5120\/16338-5625"},{"key":"ref45","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1016\/j.ress.2011.12.015","article-title":"Data survivability versus security in information systems","volume":"100","author":"levitin","year":"0","journal-title":"Rel Eng Syst Safety"},{"key":"ref48","first-page":"200","article-title":"Efficient and secured data partitioning in the multi cloud environment","volume":"10","author":"hazila","year":"2015","journal-title":"J Inf Assurance Security"},{"key":"ref47","article-title":"Scalable transactions in cloud data stores","volume":"4","author":"ahirraoemail","year":"2015","journal-title":"J Cloud Comput Adv Syst Appl"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-02726-5_9"},{"key":"ref41","first-page":"186","article-title":"An approach with two-stage mode to detect cache-based side channel attacks","author":"yu","year":"0","journal-title":"Proc Int Conf Inf Netw"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.12.025"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8056951"}],"container-title":["IEEE Transactions on Services Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4629386\/9642441\/08666782.pdf?arnumber=8666782","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:52:49Z","timestamp":1652194369000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8666782\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,1]]},"references-count":68,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tsc.2019.2904958","relation":{},"ISSN":["1939-1374","2372-0204"],"issn-type":[{"value":"1939-1374","type":"electronic"},{"value":"2372-0204","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,11,1]]}}}