{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T05:46:24Z","timestamp":1747201584501,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1109\/uemcon.2016.7777827","type":"proceedings-article","created":{"date-parts":[[2016,12,13]],"date-time":"2016-12-13T01:35:39Z","timestamp":1481592939000},"page":"1-4","source":"Crossref","is-referenced-by-count":7,"title":["A framework to ensure data storage security in cloud computing"],"prefix":"10.1109","author":[{"given":"Mrinal Kanti","family":"Sarkar","sequence":"first","affiliation":[]},{"given":"Sanjay","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"1113","DOI":"10.1016\/j.jnca.2010.06.008","article-title":"Secure Virtualization for Cloud Computing","volume":"34","author":"lombardi","year":"2011","journal-title":"Journal of Network and Computer Application"},{"key":"ref11","first-page":"1","article-title":"Auditing to Keep Online Storage Services Honest","author":"shah","year":"2007","journal-title":"Proc 11th USENIX Workshop on Hot Topics in Operating Systems (HOTOS '07)"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2006.80"},{"key":"ref13","first-page":"598","article-title":"Provable Data Possession at Untrusted Stores","author":"ateniese","year":"2007","journal-title":"Proceedings of CCS &#x2018;02"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1460877.1460889"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2008.68"},{"key":"ref16","article-title":"Demonstrating Data Possession and Uncheatable Data Transfer","author":"filho","year":"2006","journal-title":"Cryptology ePrint Archive Report 2006\/150"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/NCM.2009.218"},{"key":"ref18","first-page":"13","article-title":"Enhancing Data Storage Security in Cloud Computing Through Steganography","volume":"5","author":"sarkar","year":"2014","journal-title":"International Journal of Security and Networks"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS.2009.5201385"},{"journal-title":"Introduction to Algorithms","year":"2010","author":"cormen","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315317"},{"key":"ref5","article-title":"Compact Proofs of Retrievability","author":"shacham","year":"2008","journal-title":"Proc of Asiacrypt &#x2018;08"},{"key":"ref8","article-title":"HAIL: A High-Availability and Integrity Layer for Cloud Storage","author":"bowers","year":"2008","journal-title":"Cryptology ePrint Archive Report 2008\/489"},{"key":"ref7","article-title":"Proofs of Retrievability: Theory and Implementation","author":"bowers","year":"2008","journal-title":"Cryptology ePrint Archive Report 2008\/175"},{"year":"2008","key":"ref2","article-title":"Amazon Web Services (AWS)"},{"article-title":"The NIST Definatin of Cloud Computing","year":"2011","author":"mell","key":"ref1"},{"key":"ref9","article-title":"A New Trusted and Collaborative Agent Based Approach for Ensuring Cloud Security","volume":"10","author":"pal","year":"2012","journal-title":"Annals of Faculty Engineering Hunedoara International Journal of Engineering (Archived copy) scheduled for publication"}],"event":{"name":"2016 IEEE 7th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","start":{"date-parts":[[2016,10,20]]},"location":"New York City, NY, USA","end":{"date-parts":[[2016,10,22]]}},"container-title":["2016 IEEE 7th Annual Ubiquitous Computing, Electronics &amp; Mobile Communication Conference (UEMCON)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7763653\/7777798\/07777827.pdf?arnumber=7777827","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,16]],"date-time":"2019-09-16T12:50:31Z","timestamp":1568638231000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7777827\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/uemcon.2016.7777827","relation":{},"subject":[],"published":{"date-parts":[[2016,10]]}}}