{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:58:43Z","timestamp":1750309123211,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,12,4]],"date-time":"2023-12-04T00:00:00Z","timestamp":1701648000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,12,4]]},"DOI":"10.1145\/3603166.3632554","type":"proceedings-article","created":{"date-parts":[[2024,4,4]],"date-time":"2024-04-04T19:23:27Z","timestamp":1712258607000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Is Securing an Untrusted Cloud with Cryptography Still Economically Unviable?"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-1078-2314","authenticated-orcid":false,"given":"Kevin","family":"Klassen","sequence":"first","affiliation":[{"name":"Engineering for Professionals, Johns Hopkins University, Baltimore, MD, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-3870-5901","authenticated-orcid":false,"given":"Jake","family":"Skinner","sequence":"additional","affiliation":[{"name":"Engineering for Professionals, Johns Hopkins University, Baltimore, MD, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5500-4450","authenticated-orcid":false,"given":"Joel","family":"Coffman","sequence":"additional","affiliation":[{"name":"Engineering for Professionals, Johns Hopkins University, Baltimore, MD, United States"},{"name":"Department of Computer and Cyber Sciences, United States Air Force Academy, USAF Academy, CO, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,4,4]]},"reference":[{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455804"},{"key":"e_1_3_2_1_3_1","volume-title":"Bernstein and Tanja Lange","author":"Daniel","year":"2019","unstructured":"Daniel J. Bernstein and Tanja Lange. 2019. eBACS: ECRYPT Benchmarking of Cryptographic Systems. http:\/\/bench.cr.yp"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCA.2012.6179142"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866919.1866935"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2038916.2038945"},{"key":"e_1_3_2_1_7_1","volume-title":"How Utilities Attract Mission-Critical Facilities. Trade & Industry Development","author":"Comerford Tim","year":"2015","unstructured":"Tim Comerford. 2015. How Utilities Attract Mission-Critical Facilities. Trade & Industry Development (2015). https:\/\/www.bluetoad.com\/publication\/?i=271476&article_id=2261381"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250662.1250665"},{"volume-title":"Gartner Forecasts Worldwide Public Cloud End-User Spending to Reach Nearly $600 Billion","year":"2023","key":"e_1_3_2_1_9_1","unstructured":"Gartner. 2023. Gartner Forecasts Worldwide Public Cloud End-User Spending to Reach Nearly $600 Billion in 2023. https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2023-04-19-gartner-forecasts-worldwide-public-cloud-end-user-spending-to-reach-nearly-600-billion-in-2023"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1666420.1666444"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1496091.1496103"},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the 2nd Workshop on Large-Scale Distributed Systems and Middleware","author":"Hamilton James","year":"2008","unstructured":"James Hamilton. 2008. Internet-Scale Service Efficiency. In Proceedings of the 2nd Workshop on Large-Scale Distributed Systems and Middleware (Yorktown Heights, New York) (LADIS '08)."},{"key":"e_1_3_2_1_13_1","unstructured":"Jonathan Herzog. 2023. Share and query encrypted data in AWS Clean Rooms. AWS Security Blog. https:\/\/aws.amazon.com\/blogs\/security\/share-and-query-encrypted-data-in-aws-clean-rooms\/"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP48549.2020.00031"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3387108"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5120\/20711-3030"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2023.100567"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2015.10.026"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2023.3279517"},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of the 3rd USENIX Conference on Hot Topics in Cloud Computing","author":"Tak Byung Chul","year":"2011","unstructured":"Byung Chul Tak, Bhuvan Urgaonkar, and Anand Sivasubramaniam. 2011. To Move or Not to Move: The Economics of Cloud Computing. In Proceedings of the 3rd USENIX Conference on Hot Topics in Cloud Computing (Portland, OR) (HotCloud'11). USENIX Association, USA, 5."},{"key":"e_1_3_2_1_21_1","unstructured":"Noelle Walsh. 2022. How Microsoft measures datacenter water and energy use to improve Azure Cloud sustainability. Azure Blog. https:\/\/azure.microsoft.com\/en-us\/blog\/how-microsoft-measures-datacenter-water-and-energy-use-to-improve-azure-cloud-sustainability\/ (accessed: 2023-09-21)."},{"volume-title":"Saving Money Through Cloud Computing. Governance Studies at Brookings","author":"West Darrell M.","key":"e_1_3_2_1_22_1","unstructured":"Darrell M. West. 2010. Saving Money Through Cloud Computing. Governance Studies at Brookings. The Brookings Institution, Washington, DC."}],"event":{"name":"UCC '23: IEEE\/ACM 16th International Conference on Utility and Cloud Computing","sponsor":["SIGARCH ACM Special Interest Group on Computer Architecture","IEEE TCSC"],"location":"Taormina (Messina) Italy","acronym":"UCC '23"},"container-title":["Proceedings of the IEEE\/ACM 16th International Conference on Utility and Cloud Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603166.3632554","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3603166.3632554","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:49:09Z","timestamp":1750286949000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603166.3632554"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,4]]},"references-count":21,"alternative-id":["10.1145\/3603166.3632554","10.1145\/3603166"],"URL":"https:\/\/doi.org\/10.1145\/3603166.3632554","relation":{},"subject":[],"published":{"date-parts":[[2023,12,4]]},"assertion":[{"value":"2024-04-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}