{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,6]],"date-time":"2025-02-06T05:25:29Z","timestamp":1738819529911,"version":"3.37.0"},"reference-count":36,"publisher":"Academy Publisher","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JNW"],"DOI":"10.4304\/jnw.9.3.571-581","type":"journal-article","created":{"date-parts":[[2014,3,6]],"date-time":"2014-03-06T06:27:21Z","timestamp":1394087241000},"source":"Crossref","is-referenced-by-count":2,"title":["On Data and Virtualization Security Risks and Solutions of Cloud Computing"],"prefix":"10.4304","volume":"9","author":[{"given":"Xiangyang","family":"Luo","sequence":"first","affiliation":[]},{"given":"Lin","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Dai","family":"Hao","sequence":"additional","affiliation":[]},{"given":"Fenlin","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Daoshun","family":"Wang","sequence":"additional","affiliation":[]}],"member":"2838","published-online":{"date-parts":[[2014,3,5]]},"reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1001.2011.03958"},{"issue":"1","key":"ref2","first-page":"7","article-title":"The Future Needs Cloud Computing.","volume":"26","author":"Yao","year":"2009","unstructured":"[3] J. Yao. The Future Needs Cloud Computing. Development and Application of High Performance Computing, 2009, 26(1) pp. 7-9.","journal-title":"Development and Application of High Performance Computing"},{"key":"ref3","first-page":"1","article-title":"Cloud Computing: Security Risk.","volume-title":"Proceedings of ACM Southeast Conference","author":"Sumter","year":"2010","unstructured":"[4] L. Sumter. Cloud Computing: Security Risk. Proceedings of ACM Southeast Conference, 2010, 1-4."},{"key":"ref4","first-page":"55","article-title":"Secure and Efficient Access to Outsourced Data.","volume-title":"Proceedings of ACM Cloud Computing Security Workshop","author":"Wang","year":"2009","unstructured":"[5] W. Wang, Z. Li, R. Owens, B. Bhargava. Secure and Efficient Access to Outsourced Data. Proceedings of ACM Cloud Computing Security Workshop, 2009, 55-65."},{"key":"ref5","first-page":"1044","article-title":"Wei Song. Research on Cloud Storage Architecture and Key Technologies.","volume-title":"Proceedings of ACM International Conference on Information System","author":"Zeng","year":"2009","unstructured":"[6] W. Zeng, Y. Zhao, K. Ou, Wei Song. Research on Cloud Storage Architecture and Key Technologies. Proceedings of ACM International Conference on Information System, 2009, 1044-1048."},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.186"},{"key":"ref7","first-page":"693","article-title":"Privacy, Security and Trust Issues Arising from Cloud Computing.","volume-title":"Proceedings of IEEE International Conference on Cloud Computing Technology and Science","author":"Pearson","year":"2010","unstructured":"[8] S. Pearson, A. Benameur. Privacy, Security and Trust Issues Arising from Cloud Computing. Proceedings of IEEE International Conference on Cloud Computing Technology and Science, 2010, 693-702."},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.143"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/504909.504910"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/762476.762481"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315318"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1460877"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315317"},{"key":"ref13","first-page":"90","article-title":"Compact Proofs of Retrievability.","volume":"08","author":"Shacham","year":"2008","unstructured":"[17] H. Shacham, B. Waters. Compact Proofs of Retrievability. Proceedings of ASIACRYPT'08, 2008, 90-107.","journal-title":"Proceedings of ASIACRYPT"},{"key":"ref14","first-page":"12","article-title":"Store, Forget, and Check: Using Algebraic Signatures to Check Remotely Administered Storage.","volume-title":"Proceedings of the 26th IEEE International Conference on Distributed Computing Systems","author":"Schwarz","year":"2006","unstructured":"[19] T. Schwarz, S. Ethan, L. Miller. Store, Forget, and Check: Using Algebraic Signatures to Check Remotely Administered Storage. Proceedings of the 26th IEEE International Conference on Distributed Computing Systems, 2006, 12\u221221."},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655017"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04444-1_22"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88625-9_28"},{"key":"ref18","first-page":"44","article-title":"Practical Techniques for Searches on Encrypted Data.","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy","author":"Song","year":"2000","unstructured":"[23] D. Song, D. Wagner, A. Perrig. Practical Techniques for Searches on Encrypted Data. Proceedings of the IEEE Symposium on Security and Privacy, 2000, 44-55."},{"key":"ref19","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1007\/978-3-540-31815-6_7","article-title":"Public Key Encryption with Conjunctive Field Keyword Search.","volume-title":"Proceedings of the Workshop on Information Security Applications Lecture Notes in Computer Science","volume":"3325","author":"Park","year":"2004","unstructured":"[25] D. Park, K. Kim, P. Lee. Public Key Encryption with Conjunctive Field Keyword Search. Proceedings of the Workshop on Information Security Applications, Lecture Notes in Computer Science, 2004, vol. 3325, 73-86."},{"key":"ref20","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1145\/1314313.1314316","article-title":"Confidentiality- Preserving Rank-Ordered Search.","volume-title":"Proceedings of the ACM Workshop on Storage Security and Survivability","author":"Swaminathan","year":"2007","unstructured":"[26] A. Swaminathan, Y. Mao, G. Su, et al. Confidentiality- Preserving Rank-Ordered Search. Proceedings of the ACM Workshop on Storage Security and Survivability, 2007, 7-12."},{"key":"ref21","first-page":"169","article-title":"Fully Homomorphic Encryption Using Ideal Lattices.","volume-title":"Proceedings of the ACM International Symposium on Theory of Computing","author":"Gentry","year":"2009","unstructured":"[27] C. Gentry. Fully Homomorphic Encryption Using Ideal Lattices. Proceedings of the ACM International Symposium on Theory of Computing. 2009. 169\u2212178."},{"key":"ref22","first-page":"377","article-title":"Faster Fully Homomorphic Encryption.","volume-title":"Proceedings of ASIACRYPT 2010 Lecture Notes in Computer Science","volume":"6477","author":"Stehle","year":"2010","unstructured":"[28] D. Stehle, R. Steinfeld. Faster Fully Homomorphic Encryption. Proceedings of ASIACRYPT 2010, Lecture Notes in Computer Science, 2010, vol. 6477, 377-394."},{"key":"ref23","first-page":"24","article-title":"Fully Homomorphic Encryption over the Integers.","volume-title":"Proceedings of EUROCRYPT 2010 Lecture Notes in Computer Science","volume":"6110","author":"Dijk","year":"2010","unstructured":"[29] M. Dijk, C. Gentry, S. Halevi, V. Vaikuntanathan. Fully Homomorphic Encryption over the Integers. Proceedings of EUROCRYPT 2010, Lecture Notes in Computer Science, 2010, vol. 6110, 24-43."},{"key":"ref24","first-page":"116","article-title":"Toward Basing Fully Homomorphic Encryption on Worst-Case Hardness.","volume-title":"Proceedings of CRYPTO 2010 Lecture Notes in Computer Science","volume":"6223","author":"Gentry","year":"2010","unstructured":"[30] C. Gentry. Toward Basing Fully Homomorphic Encryption on Worst-Case Hardness. Proceedings of CRYPTO 2010, Lecture Notes in Computer Science, 2010, vol. 6223, 116-137."},{"key":"ref25","first-page":"138","article-title":"Additively Homomorphic Encryption with d-Operand Multiplications.","volume-title":"Proceedings of CRYPTO 2010 Lecture Notes in Computer Science","volume":"6223","author":"Aguilar","year":"2010","unstructured":"[31] C. Aguilar, P. Gaborit, J. Herranz. Additively Homomorphic Encryption with d-Operand Multiplications. Proceedings of CRYPTO 2010, Lecture Notes in Computer Science, 2010, vol. 6223, 138-154."},{"key":"ref26","first-page":"155","article-title":"i-Hop Homomorphic Encryption and Rerandomizable Yao Circuits.","volume-title":"Proceedings of CRYPTO 2010 Lecture Notes in Computer Science","volume":"6223","author":"Gentry","year":"2010","unstructured":"[32] C. Gentry, S. Halevi, V. Vaikuntanathan. i-Hop Homomorphic Encryption and Rerandomizable Yao Circuits. Proceedings of CRYPTO 2010, Lecture Notes in Computer Science, 2010, vol. 6223, 155-172."},{"key":"ref27","first-page":"483","article-title":"Improved Delegation of Computation Using Fully Homomorphic Encryption.","volume-title":"Proceedings of CRYPTO 2010 Lecture Notes in Computer Science","volume":"6223","author":"Chung","year":"2010","unstructured":"[33] K. Chung, Y. Kalai, S. Vadhan. Improved Delegation of Computation Using Fully Homomorphic Encryption. Proceedings of CRYPTO 2010, Lecture Notes in Computer Science, 2010, vol. 6223, 483-501."},{"key":"ref28","first-page":"129","article-title":"Implementing Gentry's Fully-Homomorphic Encryption Scheme.","volume-title":"Proceedings of EUROCRYPT 2011 Lecture Notes in Computer Science","volume":"6632","author":"Centry","year":"2011","unstructured":"[34] C. Centry, S. Halevi. Implementing Gentry's Fully-Homomorphic Encryption Scheme. Proceedings of EUROCRYPT 2011, Lecture Notes in Computer Science, 2011, vol. 6632, 129-148."},{"key":"ref29","first-page":"149","article-title":"Homomorphic Signatures for Polynomial Functions.","volume-title":"Proceedings of EUROCRYPT 2011 Lecture Notes in Computer Science","volume":"6632","author":"Boneh","year":"2011","unstructured":"[35] D. Boneh, D. Freeman. Homomorphic Signatures for Polynomial Functions. Proceedings of EUROCRYPT 2011, Lecture Notes in Computer Science, 2011, vol. 6632, 149-168."},{"key":"ref30","first-page":"169","article-title":"Semi-Homomorphic Encryption and Multiparty Computation.","volume-title":"Proceedings of EUROCRYPT 2011 Lecture Notes in Computer Science","volume":"6632","author":"Bendlin","year":"2011","unstructured":"[36] R. Bendlin, I. Damgard, C. Orlandi, S. Zakarias. Semi-Homomorphic Encryption and Multiparty Computation. Proceedings of EUROCRYPT 2011, Lecture Notes in Computer Science, 2011, vol. 6632, 169-188."},{"key":"ref31","first-page":"505","article-title":"Fully Homomorphic Encryption from Ring- LWE and Security for Key Dependent Messages.","volume-title":"Proceedings of CRYPTO 2011 Lecture Notes in Computer Science","volume":"6841","author":"Brakerski","year":"2011","unstructured":"[37] Z. Brakerski, V. Vaikuntanathan. Fully Homomorphic Encryption from Ring- LWE and Security for Key Dependent Messages. Proceedings of CRYPTO 2011, Lecture Notes in Computer Science, 2011, vol. 6841, 505-524."},{"key":"ref32","first-page":"487","article-title":"Fully Homomorphic Encryption over the Integers with Shorter Public-Keys.","volume-title":"Proceedings of CRYPTO 2011 Lecture Notes in Computer Science","volume":"6841","author":"Coron","year":"2011","unstructured":"[38] J. Coron, A. Mandal, D. Naccache, M. Tibouchi. Fully Homomorphic Encryption over the Integers with Shorter Public-Keys. Proceedings of CRYPTO 2011, Lecture Notes in Computer Science, 2011, vol. 6841, 487-504."},{"key":"ref33","first-page":"420","article-title":"Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes.","volume-title":"Proceedings of PKC 2010 Lecture Notes in Computer Science","volume":"6056","author":"Smart","year":"2010","unstructured":"[39] N. Smart, F. Vercauteren. Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes. Proceedings of PKC 2010, Lecture Notes in Computer Science, 2010, vol. 6056, 420-443."},{"key":"ref34","volume-title":"Cloud Computing","author":"Rittinghouse","year":"2011","unstructured":"[41] J. W. Rittinghouse, J. F. Ransome. Cloud Computing: Implementation, Management, and Security. Published by CRC Press, 2011."},{"key":"ref35","first-page":"203","article-title":"CloudVisor: retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization.","volume-title":"Proceedings of 23rd ACM Symposium on Operating Systems Principles (SOSP)","author":"Zhang","year":"2011","unstructured":"[42] F. Zhang, J. Chen, H. Chen and B. Zang. CloudVisor: retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization. Proceedings of 23rd ACM Symposium on Operating Systems Principles (SOSP), 2011, 203-216."}],"container-title":["Journal of Networks"],"original-title":[],"deposited":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:05:17Z","timestamp":1738775117000},"score":1,"resource":{"primary":{"URL":"https:\/\/dblp.org\/db\/journals\/jnw\/index.html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,3,5]]},"references-count":36,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2014,3,5]]}},"URL":"https:\/\/doi.org\/10.4304\/jnw.9.3.571-581","relation":{},"ISSN":["1796-2056"],"issn-type":[{"type":"print","value":"1796-2056"}],"subject":[],"published":{"date-parts":[[2014,3,5]]}}}