{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T06:28:17Z","timestamp":1750746497516,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,8]]},"DOI":"10.1109\/pst.2018.8514195","type":"proceedings-article","created":{"date-parts":[[2018,11,19]],"date-time":"2018-11-19T20:50:46Z","timestamp":1542660646000},"page":"1-5","source":"Crossref","is-referenced-by-count":3,"title":["Enforcing Privacy and Security in Public Cloud Storage"],"prefix":"10.1109","author":[{"given":"Joao S.","family":"Resende","sequence":"first","affiliation":[]},{"given":"Rolando","family":"Martins","sequence":"additional","affiliation":[]},{"given":"Luis","family":"Antunes","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jnca.2010.07.006","article-title":"A survey on security issues in service delivery models of cloud computing","volume":"34","author":"subashini","year":"2011","journal-title":"Journal of Network and Computer Applications"},{"key":"ref10","article-title":"Usto. re: A private cloud storage software system","author":"frederico","year":"2013","journal-title":"International Conference on Web Engineering"},{"journal-title":"HMAC Keyed-Hashing for Message Authentication","year":"1997","author":"hugo","key":"ref11"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1145\/1721654.1721672","article-title":"A view of cloud computing","volume":"53","author":"michael","year":"2010","journal-title":"Communications of the ACM"},{"key":"ref13","article-title":"SCFS: A Shared Cloud-backed File System","author":"alysson neves","year":"2014","journal-title":"USENIX Annual Technical Conference"},{"journal-title":"liberasurecode - Erasure Code API","year":"2018","key":"ref14"},{"key":"ref15","first-page":"12","article-title":"DepSky: dependable and secure storage in a cloud-of-clouds","volume":"9","author":"alysson","year":"2013","journal-title":"ACM Transactions on Storage (TOS)"},{"journal-title":"google-api-java-client-samples","year":"2018","key":"ref16"},{"year":"2018","key":"ref17"},{"year":"2018","key":"ref18"},{"year":"2018","key":"ref19"},{"key":"ref28","first-page":"6","article-title":"Supercloud: A Library Cloud for Exploiting Cloud Diversity","volume":"35","author":"zhiming","year":"2017","journal-title":"ACM Transactions on Computer Systems (TOCS)"},{"key":"ref4","article-title":"Attack on Privacy-Preserving Public Auditing Schemes for Cloud Storage","author":"baoyuan","year":"2017","journal-title":"Mathematical Problems in Engineering 2017"},{"key":"ref27","article-title":"SafeStore: A durable and practical storage system","author":"ramakrishna","year":"2007","journal-title":"USENIX Annual Technical Conference"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1109\/TNSM.2014.011614.130429","article-title":"Learning automata-based QoS framework for cloud IaaS","volume":"11","author":"sudip","year":"2014","journal-title":"IEEE Transactions on Network and Service Management"},{"journal-title":"Encryption software to secure cloud files","year":"2017","key":"ref6"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/MSP.2010.115","article-title":"Understanding cloud computing vulnerabilities","volume":"9","author":"bernd","year":"2011","journal-title":"IEEE Security & Privacy"},{"year":"2017","key":"ref5"},{"journal-title":"All Your Data Across All Your Devices","year":"2018","key":"ref8"},{"journal-title":"Secure and easy file transfer","year":"2018","key":"ref7"},{"key":"ref2","first-page":"305","article-title":"A Review on Cloud Computing Development","volume":"7","author":"sugang","year":"2012","journal-title":"JNW"},{"journal-title":"File Sync & Share on Your Infrastructure","year":"2018","key":"ref9"},{"key":"ref1","article-title":"An enhanced erasure code-based security mechanism for cloud storage","author":"wenfeng","year":"2014","journal-title":"Mathematical Problems in Engineering 2014"},{"year":"2018","key":"ref20"},{"journal-title":"Intel SGX Enabled Key Manager Service with OpenStack Barbican","year":"2017","author":"somnath","key":"ref22"},{"key":"ref21","article-title":"A Cloud-User Protocol Based on Ciphertext Watermarking Technology","author":"keyang","year":"2017","journal-title":"Security and Communication Networks 2017"},{"key":"ref24","first-page":"27","article-title":"Overview of dropbox encryption in cloud computing","volume":"2","author":"latha","year":"2014","journal-title":"Transactions on Engineering Sciences"},{"year":"2018","key":"ref23"},{"key":"ref26","article-title":"MetaSync: File Synchronization Across Multiple Untrusted Storage Services","author":"seungyeop","year":"2015","journal-title":"USENIX Annual Technical Conference"},{"key":"ref25","article-title":"BlueSky: A cloud-backed file system for the enterprise","author":"michael","year":"2012","journal-title":"Proceedings of the 10th USENIX Conference on File and Storage Technologies USENIX Association"}],"event":{"name":"2018 16th Annual Conference on Privacy, Security and Trust (PST)","start":{"date-parts":[[2018,8,28]]},"location":"Belfast","end":{"date-parts":[[2018,8,30]]}},"container-title":["2018 16th Annual Conference on Privacy, Security and Trust (PST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8498146\/8514154\/08514195.pdf?arnumber=8514195","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,23]],"date-time":"2020-08-23T22:51:44Z","timestamp":1598223104000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8514195\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/pst.2018.8514195","relation":{},"subject":[],"published":{"date-parts":[[2018,8]]}}}