{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T22:39:47Z","timestamp":1772059187153,"version":"3.50.1"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2015,1,31]],"date-time":"2015-01-31T00:00:00Z","timestamp":1422662400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1186\/s13677-014-0025-1","type":"journal-article","created":{"date-parts":[[2015,1,30]],"date-time":"2015-01-30T12:12:18Z","timestamp":1422619938000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":25,"title":["Confidential database-as-a-service approaches: taxonomy and survey"],"prefix":"10.1186","volume":"4","author":[{"given":"Jens","family":"K\u00f6hler","sequence":"first","affiliation":[]},{"given":"Konrad","family":"J\u00fcnemann","sequence":"additional","affiliation":[]},{"given":"Hannes","family":"Hartenstein","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,1,31]]},"reference":[{"issue":"1","key":"25_CR1","first-page":"1","volume":"2","author":"J Huang","year":"2013","unstructured":"Huang J, Nicol D: Trust mechanisms for cloud computing. Journal of Cloud Computing 2013, 2(1):1\u201314.","journal-title":"Journal of Cloud Computing"},{"issue":"1","key":"25_CR2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/2192-113X-1-1","volume":"1","author":"N Gonzalez","year":"2012","unstructured":"Gonzalez N, Miers C, Red\u00edgolo F, Simpl\u00edcio M, Carvalho T, N\u00e4lund M, Pourzandi M: A quantitative analysis of current security concerns and solutions for cloud computing. Journal of Cloud Computing 2012, 1(1):1\u201318. 10.1186\/2192-113X-1-1","journal-title":"Journal of Cloud Computing"},{"issue":"11","key":"25_CR3","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1109\/MC.2013.384","volume":"46","author":"DSL Wei","year":"2013","unstructured":"Wei DSL, Murugesan S, Naik K, Krizanc D: Kuo S.-Y: Enhancing data integrity and privacy in the cloud: An agenda. Computer 2013, 46(11):87\u201390. 10.1109\/MC.2013.384","journal-title":"Computer"},{"issue":"2","key":"25_CR4","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1145\/1149976.1149977","volume":"2","author":"E Mykletun","year":"2006","unstructured":"Mykletun E, Narasimha M, Tsudik G: Authentication and integrity in outsourced databases. ACM Transactions on Storage 2006, 2(2):107\u2013138. 10.1145\/1149976.1149977","journal-title":"ACM Transactions on Storage"},{"key":"25_CR5","doi-asserted-by":"crossref","first-page":"584","DOI":"10.1145\/1315245.1315317","volume-title":"Proceedings of the 14th ACM Conference on Computer and Communications Security. CCS\u201907","author":"A Juels","year":"2007","unstructured":"Juels A, Kaliski BS Jr: Pors: Proofs of retrievability for large files. In Proceedings of the 14th ACM Conference on Computer and Communications Security. CCS\u201907. ACM, New York, NY, USA; 2007:584\u2013597. 10.1145\/1315245.1315317"},{"key":"25_CR6","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1145\/1103780.1103792","volume-title":"Proceedings of the 2005 ACM Workshop on Storage Security and Survivability. StorageSS \u201905","author":"E Damiani","year":"2005","unstructured":"Damiani E, di Vimercati SDC, Foresti S, Jajodia S, Paraboschi S, Samarati P: Key management for multi-user encrypted databases. In Proceedings of the 2005 ACM Workshop on Storage Security and Survivability. StorageSS \u201905. ACM, New York, NY, USA; 2005:74\u201383. 10.1145\/1103780.1103792"},{"key":"25_CR7","first-page":"139","volume-title":"Privacy and Identity Management for Emerging Services and Technologies. IFIP Advances in Information and Communication Technology, vol. 421","author":"J K\u00f6ler","year":"2014","unstructured":"K\u00f6ler J, J\u00fcnemann K: Securus: From confidentiality and access requirements to data outsourcing solutions. In Privacy and Identity Management for Emerging Services and Technologies. IFIP Advances in Information and Communication Technology, vol. 421. Edited by: Hansen M, Hoepman J-H, Leenes R, Whitehouse D. Springer, Berlin Heidelberg; 2014:139\u2013149."},{"key":"25_CR8","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1145\/2043556.2043566","volume-title":"Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles. SOSP \u201911","author":"RA Popa","year":"2011","unstructured":"Popa RA, Redfield CMS, Zeldovich N, Balakrishnan H: Cryptdb: Protecting confidentiality with encrypted query processing. In Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles. SOSP \u201911. ACM, New York, NY, USA; 2011:85\u2013100. 10.1145\/2043556.2043566"},{"key":"25_CR9","doi-asserted-by":"crossref","first-page":"710","DOI":"10.1109\/ICDCS.2011.37","volume-title":"Proceedings of the 2011 31st International Conference on Distributed Computing Systems. ICDCS \u201911","author":"S De Capitani di Vimercati","year":"2011","unstructured":"De Capitani di Vimercati S, Foresti S, Paraboschi S, Pelosi G, Samarati P: Efficient and private access to outsourced data. In Proceedings of the 2011 31st International Conference on Distributed Computing Systems. ICDCS \u201911. IEEE Computer Society, Washington, DC, USA; 2011:710\u2013719. 10.1109\/ICDCS.2011.37"},{"issue":"1","key":"25_CR10","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1145\/1053283.1053289","volume":"8","author":"A Ceselli","year":"2005","unstructured":"Ceselli A, Damiani E, Vimercati SDCD, Jajodia S, Paraboschi S, Samarati P: Modeling and assessing inference exposure in encrypted databases. ACM Transactions on Information and System Security 2005, 8(1):119\u2013152. 10.1145\/1053283.1053289","journal-title":"ACM Transactions on Information and System Security"},{"key":"25_CR11","doi-asserted-by":"crossref","first-page":"216","DOI":"10.1145\/564691.564717","volume-title":"Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data. SIGMOD \u201902","author":"H Hacig\u00fcm\u00fc\u015f","year":"2002","unstructured":"Hacig\u00fcm\u00fc\u015f H, Iyer B, Li C, Mehrotra S: Executing sql over encrypted data in the database-service-provider model. In Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data. SIGMOD \u201902. ACM, New York, NY, USA; 2002:216\u2013227. 10.1145\/564691.564717"},{"issue":"3","key":"25_CR12","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1007\/s00778-011-0245-7","volume":"21","author":"B Hore","year":"2012","unstructured":"Hore B, Mehrotra S, Canim M, Kantarcioglu M: Secure multidimensional range queries over outsourced data. VLDB Journal 2012, 21(3):333\u2013358. 10.1007\/s00778-011-0245-7","journal-title":"VLDB Journal"},{"key":"25_CR13","doi-asserted-by":"crossref","first-page":"563","DOI":"10.1145\/1007568.1007632","volume-title":"Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data. SIGMOD \u201904","author":"R Agrawal","year":"2004","unstructured":"Agrawal R, Kiernan J, Srikant R, Xu Y: Order preserving encryption for numeric data. In Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data. SIGMOD \u201904. ACM, New York, NY, USA; 2004:563\u2013574. 10.1145\/1007568.1007632"},{"key":"25_CR14","first-page":"224","volume-title":"Advances in Cryptology - EUROCRYPT 2009. Lecture Notes in Computer Science, vol. 5479","author":"A Boldyreva","year":"2009","unstructured":"Boldyreva A, Chenette N, Lee Y, O\u2019Neill A: Order-preserving symmetric encryption. In Advances in Cryptology - EUROCRYPT 2009. Lecture Notes in Computer Science, vol. 5479. Edited by: Joux A. Springer, Berlin Heidelberg; 2009:224\u2013241."},{"key":"25_CR15","doi-asserted-by":"crossref","first-page":"965","DOI":"10.1145\/2382196.2382298","volume-title":"Proceedings of the 2012 ACM Conference on Computer and Communications Security. CCS \u201912","author":"S Kamara","year":"2012","unstructured":"Kamara S, Papamanthou C, Roeder T: Dynamic searchable symmetric encryption. In Proceedings of the 2012 ACM Conference on Computer and Communications Security. CCS \u201912. ACM, New York, NY, USA; 2012:965\u2013976. 10.1145\/2382196.2382298"},{"key":"25_CR16","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1109\/SECPRI.2000.848445","volume-title":"Proceedings of the 2000 IEEE Symposium on Security and Privacy (S&P)","author":"DX Song","year":"2000","unstructured":"Song DX, Wagner D, Perrig A: Practical techniques for searches on encrypted data. In Proceedings of the 2000 IEEE Symposium on Security and Privacy (S&P). IEEE Computer Society, Washington, DC, USA; 2000:44\u201355."},{"key":"25_CR17","first-page":"442","volume-title":"Applied Cryptography and Network Security. Lecture Notes in Computer Science, vol. 3531","author":"Y-C Chang","year":"2005","unstructured":"Chang Y-C, Mitzenmacher M: Privacy preserving keyword searches on remote encrypted data. In Applied Cryptography and Network Security. Lecture Notes in Computer Science, vol. 3531. Edited by: Ioannidis J, Keromytis A, Yung M. Springer, Berlin Heidelberg; 2005:442\u2013455."},{"key":"25_CR18","first-page":"535","volume-title":"Advances in Cryptology - CRYPTO 2007. Lecture Notes in Computer Science, vol. 4622","author":"M Bellare","year":"2007","unstructured":"Bellare M, Boldyreva A, O\u2019Neill A: Deterministic and efficiently searchable encryption. In Advances in Cryptology - CRYPTO 2007. Lecture Notes in Computer Science, vol. 4622. Edited by: Menezes A. Springer, Berlin Heidelberg; 2007:535\u2013552."},{"key":"25_CR19","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1145\/1456492.1456506","volume-title":"Proceedings of the 2008 ACM Workshop on Secure Web Services. SWS \u201908","author":"F Kerschbaum","year":"2008","unstructured":"Kerschbaum F, Vayssi\u00e8re J: Privacy-preserving data analytics as an outsourced service. In Proceedings of the 2008 ACM Workshop on Secure Web Services. SWS \u201908. ACM, New York, NY, USA; 2008:87\u201396. 10.1145\/1456492.1456506"},{"key":"25_CR20","first-page":"69","volume-title":"Proceedings of the 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security. DBSec\u201905","author":"ER Omiecinski","year":"2005","unstructured":"Omiecinski ER: Li J: Efficiency and security trade-off in supporting range queries on encrypted databases. In Proceedings of the 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security. DBSec\u201905. Springer, Berlin, Heidelberg; 2005:69\u201383."},{"key":"25_CR21","volume-title":"Proceedings of the Network and Distributed System Security Symposium (NDSS)","author":"M Islam","year":"2012","unstructured":"Islam M, Kuzu M, Kantarcioglu M: Access pattern disclosure on searchable encryption: Ramification, attack and mitigation. In Proceedings of the Network and Distributed System Security Symposium (NDSS). Internet Society, Geneva, Switzerland; 2012."},{"key":"25_CR22","volume-title":"Proceedings of the ACM Conference on Computer and Communications Security (CCS)","author":"E Damiani","year":"2003","unstructured":"Damiani E, De Capitani di Vimercati S, Jajodia S, Paraboschi S, Samarati P: Balancing confidentiality and efficiency in untrusted relational DBMSs. In Proceedings of the ACM Conference on Computer and Communications Security (CCS). ACM, New York, NY, USA; 2003."},{"issue":"7","key":"25_CR23","doi-asserted-by":"crossref","first-page":"1533","DOI":"10.1109\/TKDE.2012.77","volume":"25","author":"H Pang","year":"2013","unstructured":"Pang H, Zhang J, Mouratidis K: Enhancing access privacy of range retrievals over (B+)-trees. IEEE Transactions on Knowledge and Data Engineering 2013, 25(7):1533\u20131547. 10.1109\/TKDE.2012.77","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"25_CR24","first-page":"628","volume-title":"Computer Security \u2013 ESORICS 2013. Lecture Notes in Computer Science, vol. 8134","author":"S Capitani di Vimercati","year":"2013","unstructured":"Capitani di Vimercati S, Foresti S, Paraboschi S, Pelosi G, Samarati P: Distributed shuffling for preserving access confidentiality. In Computer Security \u2013 ESORICS 2013. Lecture Notes in Computer Science, vol. 8134. Edited by: Crampton J, Jajodia S, Mayes K. Springer, Berlin Heidelberg; 2013:628\u2013645."},{"key":"25_CR25","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4419-7659-8","volume-title":"Preserving Privacy in Data Outsourcing","author":"S Foresti","year":"2011","unstructured":"Foresti S: Preserving Privacy in Data Outsourcing. Springer, Berlin Heidelberg; 2011."},{"key":"25_CR26","volume-title":"Proceedings of the Second Conference on Innovative Data Systems Research","author":"G Aggarwal","year":"2005","unstructured":"Aggarwal G, Bawa M, Ganesan P, Garcia-Molina H, Kenthapadi K, Motwani R, Srivastava U, Thomas D, Xu Y: Two can keep a secret: A distributed architecture for secure database services. In Proceedings of the Second Conference on Innovative Data Systems Research. CIDR, Asilomar, CA, USA; 2005."},{"key":"25_CR27","unstructured":"Henrich C, Huber M, Kempka C, Mueller-Quade J, Reussner R (2010) Technical report: Secure cloud computing through a separation of duties. Institut f\u00fcr Kryptographie und Sicherheit (KIT). Henrich C, Huber M, Kempka C, Mueller-Quade J, Reussner R (2010) Technical report: Secure cloud computing through a separation of duties. Institut f\u00fcr Kryptographie und Sicherheit (KIT)."},{"key":"25_CR28","first-page":"8","volume-title":"Proceedings of the 4th International Workshop on Privacy and Anonymity in the Information Society. PAIS \u201911","author":"V Ganapathy","year":"2011","unstructured":"Ganapathy V, Thomas D, Feder T, Garcia-Molina H, Motwani R: Distributing data for secure database services. In Proceedings of the 4th International Workshop on Privacy and Anonymity in the Information Society. PAIS \u201911. ACM, New York, NY, USA; 2011:8\u20131810."},{"key":"25_CR29","first-page":"223","volume-title":"Advances in Cryptology \u2013 EUROCRYPT \u201999. Lecture Notes in Computer Science, vol. 1592","author":"P Paillier","year":"1999","unstructured":"Paillier P: Public-key cryptosystems based on composite degree residuosity classes. In Advances in Cryptology \u2013 EUROCRYPT \u201999. Lecture Notes in Computer Science, vol. 1592. Edited by: Stern J. Springer, Berlin Heidelberg; 1999:223\u2013238."},{"key":"25_CR30","first-page":"308","volume-title":"Advances in Cryptology \u2013 EUROCRYPT\u201998. Lecture Notes in Computer Science, vol. 1403","author":"T Okamoto","year":"1998","unstructured":"Okamoto T, Uchiyama S: A new public-key cryptosystem as secure as factoring. In Advances in Cryptology \u2013 EUROCRYPT\u201998. Lecture Notes in Computer Science, vol. 1403. Edited by: Nyberg K. Springer, Berlin Heidelberg; 1998:308\u2013318."},{"issue":"11","key":"25_CR31","first-page":"169","volume":"4","author":"RL Rivest","year":"1978","unstructured":"Rivest RL, Adleman L, Dertouzos ML: On data banks and privacy homomorphisms. Foundations of Secure Computation 1978, 4(11):169\u2013180.","journal-title":"Foundations of Secure Computation"},{"key":"25_CR32","first-page":"125","volume-title":"Database Systems for Advanced Applications. Lecture Notes in Computer Science, vol. 2973","author":"H Hacig\u00fcm\u00fc\u015f","year":"2004","unstructured":"Hacig\u00fcm\u00fc\u015f H, Iyer B, Mehrotra S: Efficient execution of aggregation queries over encrypted relational databases. In Database Systems for Advanced Applications. Lecture Notes in Computer Science, vol. 2973. Edited by: Lee Y, Li J, Whang K-Y., Lee D. Springer, Berlin Heidelberg; 2004:125\u2013136."},{"key":"25_CR33","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1007\/11805588_7","volume":"4127","author":"E Mykletun","year":"2006","unstructured":"Mykletun E, Tsudik G: Aggregation queries in the database-as-a-service model. Data Appl Security XX 2006, 4127: 89\u2013103. 10.1007\/11805588_7","journal-title":"Data Appl Security XX"},{"issue":"3","key":"25_CR34","doi-asserted-by":"crossref","first-page":"431","DOI":"10.1145\/233551.233553","volume":"43","author":"O Goldreich","year":"1996","unstructured":"Goldreich O, Ostrovsky R: Software protection and simulation on oblivious rams. Journal of the ACM 1996, 43(3):431\u2013473. 10.1145\/233551.233553","journal-title":"Journal of the ACM"},{"key":"25_CR35","doi-asserted-by":"crossref","first-page":"299","DOI":"10.1145\/2508859.2516660","volume-title":"Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security. CCS \u201913","author":"E Stefanov","year":"2013","unstructured":"Stefanov E, van Dijk M, Shi E, Fletcher C, Ren L, Yu X, Devadas S: Path oram: An extremely simple oblivious ram protocol. In Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security. CCS \u201913. ACM, New York, NY, USA; 2013:299\u2013310. 10.1145\/2508859.2516660"},{"key":"25_CR36","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1145\/2508859.2516673","volume-title":"Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security. CCS \u201913","author":"E Stefanov","year":"2013","unstructured":"Stefanov E, Shi E: Multi-cloud oblivious storage. In Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security. CCS \u201913. ACM, New York, NY, USA; 2013:247\u2013258. 10.1145\/2508859.2516673"},{"issue":"6","key":"25_CR37","doi-asserted-by":"crossref","first-page":"965","DOI":"10.1145\/293347.293350","volume":"45","author":"B Chor","year":"1998","unstructured":"Chor B, Kushilevitz E, Goldreich O, Sudan M: Private information retrieval. Journal of the ACM 1998, 45(6):965\u2013981. 10.1145\/293347.293350","journal-title":"Journal of the ACM"},{"key":"25_CR38","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1007\/978-3-642-14527-8_5","volume-title":"Proceedings of the 10th International Conference on Privacy Enhancing Technologies. PETS\u201910","author":"F Olumofin","year":"2010","unstructured":"Olumofin F, Goldberg I: Privacy-preserving queries over relational databases. In Proceedings of the 10th International Conference on Privacy Enhancing Technologies. PETS\u201910. Springer, Berlin, Heidelberg; 2010:75\u201392. 10.1007\/978-3-642-14527-8_5"},{"key":"25_CR39","unstructured":"Aguilar-Melchor C, Gaborit P (2007) A lattice-based computationally-efficient private information retrieval protocol In: Proceedings of the Western European Workshop on Research in Cryptology (WEWoRC\u20192007), 50\u201354, Bochum, Germany."},{"key":"25_CR40","doi-asserted-by":"crossref","first-page":"364","DOI":"10.1109\/SFCS.1997.646125","volume-title":"Proceedings of the 38th Annual Symposium on Foundations of Computer Science, 1997","author":"E Kushilevitz","year":"1997","unstructured":"Kushilevitz E, Ostrovsky R: Replication is not needed: single database, computationally-private information retrieval. In Proceedings of the 38th Annual Symposium on Foundations of Computer Science, 1997. IEEE Computer Society, Washington, DC, USA; 1997:364\u2013373."},{"key":"25_CR41","doi-asserted-by":"crossref","first-page":"304","DOI":"10.1145\/258533.258609","volume-title":"Proceedings of the Twenty-ninth Annual ACM Symposium on Theory of Computing. STOC \u201997","author":"B Chor","year":"1997","unstructured":"Chor B, Gilboa N: Computationally private information retrieval (extended abstract). In Proceedings of the Twenty-ninth Annual ACM Symposium on Theory of Computing. STOC \u201997. ACM, New York, NY, USA; 1997:304\u2013313. 10.1145\/258533.258609"},{"key":"25_CR42","volume-title":"Proceedings of the Network and Distributed Systems Security Symposium","author":"R Sion","year":"2007","unstructured":"Sion R, Carbunar B: On the computational practicality of private information retrieval. In Proceedings of the Network and Distributed Systems Security Symposium. Internet Society, Geneva, Switzerland; 2007."},{"key":"25_CR43","doi-asserted-by":"crossref","first-page":"326","DOI":"10.1007\/3-540-36413-7_24","volume-title":"Security in Communication Networks","author":"A Beimel","year":"2003","unstructured":"Beimel A, Stahl Y: Robust information-theoretic private information retrieval. In Security in Communication Networks. Springer, Berlin Heidelberg; 2003:326\u2013341. 10.1007\/3-540-36413-7_24"},{"key":"25_CR44","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1109\/SFCS.2002.1181949","volume-title":"Proceedings of the 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002","author":"A Beimel","year":"2002","unstructured":"Beimel A, Ishai Y, Kushilevitz E, Raymond J-F: Breaking the o(n1(2k-1)\/) barrier for information-theoretic private information retrieval. In Proceedings of the 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. IEEE Computer Society, Washington, DC, USA; 2002:261\u2013270. 10.1109\/SFCS.2002.1181949"},{"key":"25_CR45","doi-asserted-by":"crossref","unstructured":"J\u00fcnemann K, K\u00f6hler J, Hartenstein H (2012) Data outsourcing simplified: Generating data connectors from confidentiality and access policies In: Proceedings of the 2012 12th IEEE\/ACM International Symposium OnCluster, Cloud and Grid Computing (CCGrid), 923\u2013930.","DOI":"10.1109\/CCGrid.2012.117"}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-014-0025-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13677-014-0025-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-014-0025-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,20]],"date-time":"2019-08-20T10:13:37Z","timestamp":1566296017000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.journalofcloudcomputing.com\/content\/4\/1\/1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,1,31]]},"references-count":45,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,12]]}},"alternative-id":["25"],"URL":"https:\/\/doi.org\/10.1186\/s13677-014-0025-1","relation":{},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,1,31]]},"article-number":"1"}}