{"id":"https://openalex.org/W2188255781","doi":"https://doi.org/10.1109/cns.2015.7346879","title":"Secure Cloud Storage: A framework for Data Protection as a Service in the multi-cloud environment","display_name":"Secure Cloud Storage: A framework for Data Protection as a Service in the multi-cloud environment","publication_year":2015,"publication_date":"2015-09-01","ids":{"openalex":"https://openalex.org/W2188255781","doi":"https://doi.org/10.1109/cns.2015.7346879","mag":"2188255781"},"language":"en","primary_location":{"id":"doi:10.1109/cns.2015.7346879","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cns.2015.7346879","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE Conference on Communications and Network Security (CNS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5068509694","display_name":"Quang Hieu Vu","orcid":"https://orcid.org/0009-0008-8404-4153"},"institutions":[{"id":"https://openalex.org/I4210141355","display_name":"EBTIC","ror":"https://ror.org/050mver74","country_code":"AE","type":"other","lineage":["https://openalex.org/I4210141355"]},{"id":"https://openalex.org/I176601375","display_name":"Khalifa University of Science and Technology","ror":"https://ror.org/05hffr360","country_code":"AE","type":"education","lineage":["https://openalex.org/I176601375"]}],"countries":["AE"],"is_corresponding":true,"raw_author_name":"Quang Hieu Vu","raw_affiliation_strings":["Etisalat BT Innovation Center (EBTIC) Khalifa University, United Arab Emirates"],"affiliations":[{"raw_affiliation_string":"Etisalat BT Innovation Center (EBTIC) Khalifa University, United Arab Emirates","institution_ids":["https://openalex.org/I176601375","https://openalex.org/I4210141355"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090559896","display_name":"Maurizio Colombo","orcid":"https://orcid.org/0000-0002-0515-0724"},"institutions":[{"id":"https://openalex.org/I176601375","display_name":"Khalifa University of Science and Technology","ror":"https://ror.org/05hffr360","country_code":"AE","type":"education","lineage":["https://openalex.org/I176601375"]},{"id":"https://openalex.org/I4210141355","display_name":"EBTIC","ror":"https://ror.org/050mver74","country_code":"AE","type":"other","lineage":["https://openalex.org/I4210141355"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Maurizio Colombo","raw_affiliation_strings":["Etisalat BT Innovation Center (EBTIC) Khalifa University, United Arab Emirates"],"affiliations":[{"raw_affiliation_string":"Etisalat BT Innovation Center (EBTIC) Khalifa University, United Arab Emirates","institution_ids":["https://openalex.org/I176601375","https://openalex.org/I4210141355"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038418373","display_name":"Rasool Asal","orcid":null},"institutions":[{"id":"https://openalex.org/I4210141355","display_name":"EBTIC","ror":"https://ror.org/050mver74","country_code":"AE","type":"other","lineage":["https://openalex.org/I4210141355"]},{"id":"https://openalex.org/I176601375","display_name":"Khalifa University of Science and Technology","ror":"https://ror.org/05hffr360","country_code":"AE","type":"education","lineage":["https://openalex.org/I176601375"]},{"id":"https://openalex.org/I1332878012","display_name":"BT Group (United Kingdom)","ror":"https://ror.org/00kv9pj15","country_code":"GB","type":"company","lineage":["https://openalex.org/I1332878012"]}],"countries":["AE","GB"],"is_corresponding":false,"raw_author_name":"Rasool Asal","raw_affiliation_strings":["Etisalat BT Innovation Center (EBTIC) Khalifa University, United Arab Emirates","Research & Innovation, British Telecom"],"affiliations":[{"raw_affiliation_string":"Etisalat BT Innovation Center (EBTIC) Khalifa University, United Arab Emirates","institution_ids":["https://openalex.org/I176601375","https://openalex.org/I4210141355"]},{"raw_affiliation_string":"Research & Innovation, British Telecom","institution_ids":["https://openalex.org/I1332878012"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051623294","display_name":"Ali Sajjad","orcid":"https://orcid.org/0000-0003-0150-8060"},"institutions":[{"id":"https://openalex.org/I1332878012","display_name":"BT Group (United Kingdom)","ror":"https://ror.org/00kv9pj15","country_code":"GB","type":"company","lineage":["https://openalex.org/I1332878012"]},{"id":"https://openalex.org/I20581793","display_name":"University of Kent","ror":"https://ror.org/00xkeyj56","country_code":"GB","type":"education","lineage":["https://openalex.org/I20581793"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Ali Sajjad","raw_affiliation_strings":["Research & Innovation, British Telecom","School of Computing, University of Kent"],"affiliations":[{"raw_affiliation_string":"Research & Innovation, British Telecom","institution_ids":["https://openalex.org/I1332878012"]},{"raw_affiliation_string":"School of Computing, University of Kent","institution_ids":["https://openalex.org/I20581793"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056586996","display_name":"Fadi El-Moussa","orcid":null},"institutions":[{"id":"https://openalex.org/I1332878012","display_name":"BT Group (United Kingdom)","ror":"https://ror.org/00kv9pj15","country_code":"GB","type":"company","lineage":["https://openalex.org/I1332878012"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Fadi Ali El-Moussa","raw_affiliation_strings":["Research & Innovation, British Telecom"],"affiliations":[{"raw_affiliation_string":"Research & Innovation, British Telecom","institution_ids":["https://openalex.org/I1332878012"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5018366807","display_name":"Theo Dimitrakos","orcid":"https://orcid.org/0000-0002-9522-1863"},"institutions":[{"id":"https://openalex.org/I1332878012","display_name":"BT Group (United Kingdom)","ror":"https://ror.org/00kv9pj15","country_code":"GB","type":"company","lineage":["https://openalex.org/I1332878012"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Theo Dimitrakos","raw_affiliation_strings":["Research & Innovation, British Telecom"],"affiliations":[{"raw_affiliation_string":"Research & Innovation, British Telecom","institution_ids":["https://openalex.org/I1332878012"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5068509694"],"corresponding_institution_ids":["https://openalex.org/I176601375","https://openalex.org/I4210141355"],"apc_list":null,"apc_paid":null,"fwci":2.3838,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.91194231,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9781000018119812,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.796005368232727},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7795035243034363},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7435320615768433},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5931969285011292},{"id":"https://openalex.org/keywords/cloud-storage","display_name":"Cloud storage","score":0.591179609298706},{"id":"https://openalex.org/keywords/client-side-encryption","display_name":"Client-side encryption","score":0.5518600940704346},{"id":"https://openalex.org/keywords/flexibility","display_name":"Flexibility (engineering)","score":0.5489068031311035},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.5474690198898315},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.5172967910766602},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.49778270721435547},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.48137667775154114},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4459439814090729},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.42283880710601807},{"id":"https://openalex.org/keywords/on-the-fly-encryption","display_name":"On-the-fly encryption","score":0.19808974862098694},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1878356635570526}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.796005368232727},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7795035243034363},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7435320615768433},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5931969285011292},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.591179609298706},{"id":"https://openalex.org/C166501710","wikidata":"https://www.wikidata.org/wiki/Q5132476","display_name":"Client-side encryption","level":4,"score":0.5518600940704346},{"id":"https://openalex.org/C2780598303","wikidata":"https://www.wikidata.org/wiki/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.5489068031311035},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5474690198898315},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.5172967910766602},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.49778270721435547},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.48137667775154114},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4459439814090729},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.42283880710601807},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.19808974862098694},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1878356635570526},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C136264566","wikidata":"https://www.wikidata.org/wiki/Q159810","display_name":"Economy","level":1,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/cns.2015.7346879","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cns.2015.7346879","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE Conference on Communications and Network Security (CNS)","raw_type":"proceedings-article"},{"id":"pmh:oai:kar.kent.ac.uk:50845","is_oa":false,"landing_page_url":"https://doi.org/10.1109/CNS.2015.7346879>)","pdf_url":null,"source":{"id":"https://openalex.org/S4377196264","display_name":"Kent Academic Repository (University of Kent)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I20581793","host_organization_name":"University of Kent","host_organization_lineage":["https://openalex.org/I20581793"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W160827623","https://openalex.org/W181714688","https://openalex.org/W1467040741","https://openalex.org/W2021344643","https://openalex.org/W2071874829","https://openalex.org/W2071940270","https://openalex.org/W2081227030","https://openalex.org/W2099688605","https://openalex.org/W2116626915","https://openalex.org/W2117972680","https://openalex.org/W2123069643","https://openalex.org/W2132622327","https://openalex.org/W2260937880","https://openalex.org/W2538378363","https://openalex.org/W3147784838","https://openalex.org/W6628670651","https://openalex.org/W6692731522"],"related_works":["https://openalex.org/W2796974977","https://openalex.org/W3011402756","https://openalex.org/W2595956926","https://openalex.org/W2957021483","https://openalex.org/W4206753304","https://openalex.org/W2329178507","https://openalex.org/W2051488261","https://openalex.org/W2734469389","https://openalex.org/W3116715377","https://openalex.org/W2339614561"],"abstract_inverted_index":{"This":[0],"paper":[1],"introduces":[2],"Secure":[3],"Cloud":[4,161],"Storage":[5],"(SCS),":[6],"a":[7,13,27,131,143,150],"framework":[8,118,155],"for":[9,145],"Data":[10,24],"Protection":[11],"as":[12,26,31,57],"Service":[14,28],"(DPaaS)":[15],"to":[16,21,42,50,63,69,120,129,140],"cloud":[17],"computing":[18],"users.":[19],"Compared":[20],"the":[22,46,52,89,93,102,110,116,146,153,169,173,176],"existing":[23],"Encryption":[25],"(DEaaS)":[29],"such":[30],"those":[32],"provided":[33],"by":[34,100],"Amazon":[35,165],"and":[36,86,98,164],"Google,":[37],"DPaaS":[38,60],"provides":[39],"more":[40],"flexibility":[41],"protect":[43,70],"data":[44,54,74,94,103,122,135],"in":[45,109,127],"cloud.":[47],"In":[48],"addition":[49,128],"supporting":[51],"basic":[53],"encryption":[55,139],"capability":[56],"DEaaS":[58],"does,":[59],"allows":[61],"users":[62],"define":[64],"fine-grained":[65],"access":[66,79],"control":[67,80],"policies":[68],"their":[71],"data.":[72],"Once":[73],"is":[75,83,91,119],"put":[76],"under":[77],"an":[78],"policy,":[81],"it":[82],"automatically":[84],"encrypted":[85],"only":[87],"if":[88],"policy":[90],"satisfied,":[92],"could":[95],"be":[96],"decrypted":[97],"accessed":[99],"either":[101],"owner":[104],"or":[105],"anyone":[106],"else":[107],"specified":[108],"policy.":[111],"The":[112],"key":[113],"idea":[114],"of":[115,134,152,175],"SCS":[117,154,177],"separate":[121],"management":[123,126],"from":[124,138],"security":[125,136],"defining":[130],"full":[132],"cycle":[133],"automation":[137],"decryption.":[141],"As":[142],"proof-of-concept":[144],"design,":[147],"we":[148],"implemented":[149],"prototype":[151,170],"that":[156],"works":[157],"with":[158],"both":[159],"BT":[160],"Compute":[162],"platform":[163],"EC2.":[166],"Experiments":[167],"on":[168],"have":[171],"proved":[172],"efficiency":[174],"framework.":[178]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
