{"id":"https://openalex.org/W2560855703","doi":"https://doi.org/10.1109/uemcon.2016.7777827","title":"A framework to ensure data storage security in cloud computing","display_name":"A framework to ensure data storage security in cloud computing","publication_year":2016,"publication_date":"2016-10-01","ids":{"openalex":"https://openalex.org/W2560855703","doi":"https://doi.org/10.1109/uemcon.2016.7777827","mag":"2560855703"},"language":"en","primary_location":{"id":"doi:10.1109/uemcon.2016.7777827","is_oa":false,"landing_page_url":"https://doi.org/10.1109/uemcon.2016.7777827","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE 7th Annual Ubiquitous Computing, Electronics &amp; Mobile Communication Conference (UEMCON)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101655568","display_name":"Mrinal Kanti Sarkar","orcid":"https://orcid.org/0000-0001-5246-1851"},"institutions":[{"id":"https://openalex.org/I1296725772","display_name":"University of Engineering & Management","ror":"https://ror.org/02decng19","country_code":"IN","type":"education","lineage":["https://openalex.org/I1296725772"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Mrinal Kanti Sarkar","raw_affiliation_strings":["Dept. of Computer Science & Engineering, University of Engineering & Management, Jaipur, India"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Science & Engineering, University of Engineering & Management, Jaipur, India","institution_ids":["https://openalex.org/I1296725772"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5105353742","display_name":"Sanjay Kumar","orcid":"https://orcid.org/0000-0003-4549-7463"},"institutions":[{"id":"https://openalex.org/I9223067","display_name":"Jaipur National University","ror":"https://ror.org/01xrazc29","country_code":"IN","type":"education","lineage":["https://openalex.org/I9223067"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sanjay Kumar","raw_affiliation_strings":["Dept. of Computer Science & Engineering, Jaipur National University, Jaipur, India"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Science & Engineering, Jaipur National University, Jaipur, India","institution_ids":["https://openalex.org/I9223067"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5101655568"],"corresponding_institution_ids":["https://openalex.org/I1296725772"],"apc_list":null,"apc_paid":null,"fwci":5.9714,"has_fulltext":false,"cited_by_count":18,"citation_normalized_percentile":{"value":0.96360316,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9847999811172485,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.8474134206771851},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8314405083656311},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6481044888496399},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.6102325320243835},{"id":"https://openalex.org/keywords/virtualization","display_name":"Virtualization","score":0.5993592143058777},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5523916482925415},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.5065175294876099},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.452814519405365},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.4489896297454834},{"id":"https://openalex.org/keywords/cloud-testing","display_name":"Cloud testing","score":0.42609351873397827},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.42093223333358765},{"id":"https://openalex.org/keywords/virtual-machine","display_name":"Virtual machine","score":0.4115050435066223},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.38104748725891113},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.20081698894500732}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8474134206771851},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8314405083656311},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6481044888496399},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.6102325320243835},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.5993592143058777},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5523916482925415},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.5065175294876099},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.452814519405365},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.4489896297454834},{"id":"https://openalex.org/C120115606","wikidata":"https://www.wikidata.org/wiki/Q5135723","display_name":"Cloud testing","level":4,"score":0.42609351873397827},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.42093223333358765},{"id":"https://openalex.org/C25344961","wikidata":"https://www.wikidata.org/wiki/Q192726","display_name":"Virtual machine","level":2,"score":0.4115050435066223},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.38104748725891113},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.20081698894500732}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/uemcon.2016.7777827","is_oa":false,"landing_page_url":"https://doi.org/10.1109/uemcon.2016.7777827","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE 7th Annual Ubiquitous Computing, Electronics &amp; Mobile Communication Conference (UEMCON)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6200000047683716,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W89553247","https://openalex.org/W1507039213","https://openalex.org/W1566711011","https://openalex.org/W1669150381","https://openalex.org/W1993949541","https://openalex.org/W2040193872","https://openalex.org/W2079493184","https://openalex.org/W2102881299","https://openalex.org/W2107511818","https://openalex.org/W2132027883","https://openalex.org/W2157342211","https://openalex.org/W2167015470","https://openalex.org/W2949150991","https://openalex.org/W2949562265","https://openalex.org/W3030964839","https://openalex.org/W4246219036","https://openalex.org/W6603635020","https://openalex.org/W6633935343","https://openalex.org/W6637070711","https://openalex.org/W6675339306","https://openalex.org/W6763421864","https://openalex.org/W6763569868","https://openalex.org/W6778619023"],"related_works":["https://openalex.org/W2088620127","https://openalex.org/W2743348030","https://openalex.org/W2947629119","https://openalex.org/W1963799338","https://openalex.org/W2542775576","https://openalex.org/W2900408237","https://openalex.org/W2036412865","https://openalex.org/W78285473","https://openalex.org/W2949652405","https://openalex.org/W3194359722"],"abstract_inverted_index":{"Cloud":[0],"computing":[1,138],"is":[2,57,62,76,119,141,183],"a":[3,77,120,131,142,158],"future":[4],"generation":[5],"technology":[6],"for":[7,80,134],"IT":[8,39],"enterprise.":[9],"It":[10,21,42],"has":[11,29],"different":[12,101],"characteristics":[13],"like":[14],"virtualization,":[15],"multi-user,":[16],"scalability":[17],"and":[18,161,169,177,186,199],"many":[19],"more.":[20],"also":[22],"provides":[23],"on":[24],"demand":[25],"computational":[26],"infrastructure":[27],"which":[28,165],"the":[30,34,38,50,54,60,72,81,85,104,149,167,171,180,187],"power":[31],"to":[32,36,147],"reduce":[33],"cost":[35],"build":[37],"based":[40],"services.":[41],"can":[43,66],"provide":[44],"deferent":[45],"types":[46],"of":[47,53,103,124,179,189],"service":[48],"over":[49,100],"internet.":[51],"One":[52],"important":[55],"services":[56],"provided":[58],"by":[59],"cloud":[61,125,137,153],"storage":[63],"where":[64],"users":[65,108],"keep":[67],"their":[68],"data":[69,86,113,126,139,150,168,172],"as":[70,83],"per":[71],"requirement.":[73],"So,":[74,117],"it":[75,118],"challenging":[78],"issue":[79],"user,":[82],"all":[84],"are":[87,98,196],"stored":[88],"in":[89,152],"some":[90],"inter-connected":[91],"resource":[92,96],"pool":[93,97],"but":[94],"this":[95,112,128],"situated":[99],"places":[102],"world.":[105],"An":[106],"unauthorized":[107],"may":[109],"be":[110],"accessed":[111],"through":[114],"virtual":[115],"machines.":[116],"very":[121],"dark":[122],"side":[123],"storage,":[127],"insecurity":[129],"creates":[130],"big":[132],"problem":[133],"users.":[135],"Therefore":[136],"security":[140,151],"major":[143],"problem.":[144],"In":[145],"order":[146],"solve":[148],"computing,":[154],"we":[155],"have":[156],"proposed":[157,181],"new":[159],"framework":[160],"an":[162],"Encryption":[163],"Schemes":[164],"encrypt":[166],"retrieve":[170],"efficiently.":[173],"The":[174],"performance":[175,190],"evaluation":[176],"validation":[178],"model":[182],"carried":[184],"out":[185],"result":[188],"analysis":[191],"shown":[192],"that":[193],"our":[194],"architecture":[195],"feasible,":[197],"scalable":[198],"efficient.":[200]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
