{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:10:58Z","timestamp":1750306258713,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T00:00:00Z","timestamp":1490140800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,3,22]]},"DOI":"10.1145\/3018896.3018913","type":"proceedings-article","created":{"date-parts":[[2018,2,23]],"date-time":"2018-02-23T16:12:59Z","timestamp":1519402379000},"page":"1-11","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["A new secure model for the use of cloud computing in big data analytics"],"prefix":"10.1145","author":[{"given":"Habiba","family":"Chaoui","sequence":"first","affiliation":[{"name":"Ibn Tofail University, Morocco"}]},{"given":"Ibtissam","family":"Makdoun","sequence":"additional","affiliation":[{"name":"Ibn Tofail University, Morocco"}]}],"member":"320","published-online":{"date-parts":[[2017,3,22]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"C. Barriers \"InfoSec Reading Room Enabling Big Data by Removing Security and Compliance Barriers.\"  C. Barriers \"InfoSec Reading Room Enabling Big Data by Removing Security and Compliance Barriers.\""},{"issue":"10","key":"e_1_3_2_1_2_1","first-page":"181","volume":"3","author":"Nafi K. W.","year":"2012","unstructured":"K. W. Nafi , T. S. Kar , S. A. Hoque , and M. M. A. Hashem , \" A Newer User Authentication , File encryption and Distributed Server Based Cloud Computing security architecture,\" International J. Adv. Comput. Sci. Appl. , vol. 3 , no. 10 , pp. 181 -- 186 , 2012 . K. W. Nafi, T. S. Kar, S. A. Hoque, and M. M. A. Hashem, \"A Newer User Authentication, File encryption and Distributed Server Based Cloud Computing security architecture,\" International J. Adv. Comput. Sci. Appl., vol. 3, no. 10, pp. 181--186, 2012.","journal-title":"International J. Adv. Comput. Sci. Appl."},{"key":"e_1_3_2_1_3_1","volume-title":"Extrem. Comput. Conf. HPEC 2014","author":"Yakoubov S.","year":"2014","unstructured":"S. Yakoubov , V. Gadepally , N. Schear , E. Shen , and A. Yerukhimovich , \" A survey of cryptographic approaches to securing big-data analytics in the cloud,\" 2014 IEEE High Perform . Extrem. Comput. Conf. HPEC 2014 , 2014 . S. Yakoubov, V. Gadepally, N. Schear, E. Shen, and A. Yerukhimovich, \"A survey of cryptographic approaches to securing big-data analytics in the cloud,\" 2014 IEEE High Perform. Extrem. Comput. Conf. HPEC 2014, 2014."},{"key":"e_1_3_2_1_4_1","first-page":"7","volume-title":"Adv. Comput. Technol.","volume":"29","author":"Tebaa M.","year":"2013","unstructured":". M. Tebaa and E. H. Said , \" Secure Cloud Computing Through Homomorphic Encryption,\" Int. J . Adv. Comput. Technol. , vol. 29 Volume, no. paragraph II , pp. 7 -- 9 , 2013 . .M. Tebaa and E. H. Said, \"Secure Cloud Computing Through Homomorphic Encryption,\" Int. J. Adv. Comput. Technol., vol. 29 Volume, no. paragraph II, pp. 7--9, 2013."},{"key":"e_1_3_2_1_5_1","first-page":"149","volume":"50","author":"Albeshri Thayananthan","year":"2015","unstructured":"Thayananthan and A. Albeshri , \"Big data security issues based on quantum cryptography and privacy with authentication for mobile data center,\" Procedia Comput. Sci. , vol. 50 , pp. 149 -- 156 , 2015 . Thayananthan and A. Albeshri, \"Big data security issues based on quantum cryptography and privacy with authentication for mobile data center,\" Procedia Comput. Sci., vol. 50, pp. 149--156, 2015.","journal-title":"Sci."},{"key":"e_1_3_2_1_6_1","first-page":"21","volume-title":"April","author":"Kandrouch I.","year":"2016","unstructured":"I. Kandrouch , N. Hmina , and H. Chaoui , \" Confidentiality in big data : state of the art,\" Proceeding de 6\u00e8me edition de la journ\u00e9e Nationale de la s\u00e9curit\u00e9, no . April , pp. 21 -- 22 , 2016 . I. Kandrouch, N. Hmina, and H. Chaoui, \"Confidentiality in big data : state of the art,\" Proceeding de 6\u00e8me edition de la journ\u00e9e Nationale de la s\u00e9curit\u00e9, no. April, pp. 21--22, 2016."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.19026\/rjaset.9.1451"},{"issue":"61472125","key":"e_1_3_2_1_8_1","first-page":"4065","volume":"11","author":"Zhao J.","year":"2015","unstructured":"J. Zhao , Y. Lin , J. Li , and C. Lei , \"Kerberos Based Authentication for Multiple Clouds Related Work,\" vol. 11 , no. 61472125 , pp. 4065 -- 4077 , 2015 . J. Zhao, Y. Lin, J. Li, and C. Lei, \"Kerberos Based Authentication for Multiple Clouds Related Work,\" vol. 11, no. 61472125, pp. 4065--4077, 2015.","journal-title":"\"Kerberos Based Authentication for Multiple Clouds Related Work,\""},{"key":"e_1_3_2_1_9_1","first-page":"253","volume-title":"Functional encryption: Definitions and challenges,\" Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics)","author":"Boneh D.","year":"2011","unstructured":"D. Boneh , A. Sahai , and B. Waters , \" Functional encryption: Definitions and challenges,\" Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics) , vol. 6597 LNCS , no. subaward 641, pp. 253 -- 273 , 2011 . D. Boneh, A. Sahai, and B. Waters, \"Functional encryption: Definitions and challenges,\" Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 6597 LNCS, no. subaward 641, pp. 253--273, 2011."},{"key":"e_1_3_2_1_10_1","first-page":"19","volume-title":"no. 16","author":"Chakraborty N.","year":"2014","unstructured":"N. Chakraborty , \" Functional Encryption for Secured Big Data Analytics ,\" vol. 107 , no. 16 , pp. 19 -- 22 , 2014 . N. Chakraborty, \"Functional Encryption for Secured Big Data Analytics,\" vol. 107, no. 16, pp. 19--22, 2014."},{"key":"e_1_3_2_1_11_1","first-page":"157","author":"Xu L.","year":"2016","unstructured":"L. Xu and W. Shi , \"Security Theories and Practices for Big Data,\" Big Data Concepts, Theor. Appl. , pp. 157 -- 192 , 2016 . L. Xu and W. Shi, \"Security Theories and Practices for Big Data,\" Big Data Concepts, Theor. Appl., pp. 157--192, 2016.","journal-title":"Appl."},{"key":"e_1_3_2_1_12_1","first-page":"13","volume-title":"June","author":"Global I. B. M.","year":"2006","unstructured":"I. B. M. Global , \"Best practices for data migration.,\" DM Rev., no . June , p. 13 , 2006 . I. B. M. Global, \"Best practices for data migration.,\" DM Rev., no. June, p. 13, 2006."},{"volume-title":"A Secure Ciphertext Self-Destruction Scheme with Attribute-Based Encryption,\" Math. Probl. Eng","author":"Yang T.","key":"e_1_3_2_1_13_1","unstructured":"T. Yang , J. Li , and B. Yu , \" A Secure Ciphertext Self-Destruction Scheme with Attribute-Based Encryption,\" Math. Probl. Eng ., vol. 2015 , 2. T. Yang, J. Li, and B. Yu, \"A Secure Ciphertext Self-Destruction Scheme with Attribute-Based Encryption,\" Math. Probl. Eng., vol. 2015, 2."},{"key":"e_1_3_2_1_14_1","volume-title":"Controlled Functional Encryption","author":"Naveed M.","year":"2014","unstructured":"M. Naveed , S. Agrawal , M. Prabhakaran , X. Wang , E. Ayday , J. Hubaux , and C. A. Gunter , \" Controlled Functional Encryption ,\" 2014 . M. Naveed, S. Agrawal, M. Prabhakaran, X. Wang, E. Ayday, J. Hubaux, and C. A. Gunter, \"Controlled Functional Encryption,\" 2014."},{"issue":"4","key":"e_1_3_2_1_15_1","first-page":"41","volume":"2","author":"Verma D.","year":"2014","unstructured":"D. Verma , E. K. Mahajan , and A. Prof , \"To Enhance Data Security in Cloud Computing using Combination of Encryption Algorithms,\" vol. 2 , no. 4 , pp. 41 -- 44 , 2014 . D. Verma, E. K. Mahajan, and A. Prof, \"To Enhance Data Security in Cloud Computing using Combination of Encryption Algorithms,\" vol. 2, no. 4, pp. 41--44, 2014.","journal-title":"\"To Enhance Data Security in Cloud Computing using Combination of Encryption Algorithms,\""},{"issue":"02","key":"e_1_3_2_1_16_1","first-page":"281","volume":"4","author":"Aggarwal N.","year":"2015","unstructured":"N. Aggarwal , A. Choudhary , M. Bachani , and R. Jain , \"Framework For Secure Cloud Data Communication,\" vol. 4 , no. 02 , pp. 281 -- 284 , 2015 . N. Aggarwal, A. Choudhary, M. Bachani, and R. Jain, \"Framework For Secure Cloud Data Communication,\" vol. 4, no. 02, pp. 281--284, 2015.","journal-title":"\"Framework For Secure Cloud Data Communication,\""},{"key":"e_1_3_2_1_17_1","first-page":"79","volume-title":"no. 3","author":"Kaur A.","year":"2013","unstructured":"A. Kaur , \" Secure Broker Cloud Computing Paradigm Using AES And Selective AES Algorithm ,\" vol. 3 , no. 3 , pp. 79 -- 83 , 2013 . A. Kaur, \"Secure Broker Cloud Computing Paradigm Using AES And Selective AES Algorithm,\" vol. 3, no. 3, pp. 79--83, 2013."}],"event":{"name":"ICC '17: Second International Conference on Internet of Things, Data and Cloud Computing","acronym":"ICC '17","location":"Cambridge United Kingdom"},"container-title":["Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3018896.3018913","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3018896.3018913","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:24:12Z","timestamp":1750220652000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3018896.3018913"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3,22]]},"references-count":17,"alternative-id":["10.1145\/3018896.3018913","10.1145\/3018896"],"URL":"https:\/\/doi.org\/10.1145\/3018896.3018913","relation":{},"subject":[],"published":{"date-parts":[[2017,3,22]]},"assertion":[{"value":"2017-03-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}