{"id":"https://openalex.org/W2562089050","doi":"https://doi.org/10.1109/uemcon.2016.7777913","title":"Data storage security in cloud computing using container clustering","display_name":"Data storage security in cloud computing using container clustering","publication_year":2016,"publication_date":"2016-10-01","ids":{"openalex":"https://openalex.org/W2562089050","doi":"https://doi.org/10.1109/uemcon.2016.7777913","mag":"2562089050"},"language":"en","primary_location":{"id":"doi:10.1109/uemcon.2016.7777913","is_oa":false,"landing_page_url":"https://doi.org/10.1109/uemcon.2016.7777913","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE 7th Annual Ubiquitous Computing, Electronics &amp; Mobile Communication Conference (UEMCON)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5026704172","display_name":"Rohan Raj Gupta","orcid":null},"institutions":[{"id":"https://openalex.org/I1296725772","display_name":"University of Engineering & Management","ror":"https://ror.org/02decng19","country_code":"IN","type":"education","lineage":["https://openalex.org/I1296725772"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Rohan Raj Gupta","raw_affiliation_strings":["Dept. of Computer Science and Engineering, University of Engineering and Management"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Science and Engineering, University of Engineering and Management","institution_ids":["https://openalex.org/I1296725772"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048671755","display_name":"Gaurav Mishra","orcid":null},"institutions":[{"id":"https://openalex.org/I1296725772","display_name":"University of Engineering & Management","ror":"https://ror.org/02decng19","country_code":"IN","type":"education","lineage":["https://openalex.org/I1296725772"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Gaurav Mishra","raw_affiliation_strings":["Dept. of Computer Science and Management, University of Engineering and Management"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Science and Management, University of Engineering and Management","institution_ids":["https://openalex.org/I1296725772"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083459845","display_name":"Subham Katara","orcid":null},"institutions":[{"id":"https://openalex.org/I91894341","display_name":"Gyan Vihar University","ror":"https://ror.org/048q3sh29","country_code":"IN","type":"education","lineage":["https://openalex.org/I91894341"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Subham Katara","raw_affiliation_strings":["Dept. of Computer Science and Engineering, Suresh Gyan Vihar University, Jaipur"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Science and Engineering, Suresh Gyan Vihar University, Jaipur","institution_ids":["https://openalex.org/I91894341"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103177535","display_name":"Arpit Agarwal","orcid":"https://orcid.org/0000-0002-1594-5264"},"institutions":[{"id":"https://openalex.org/I91894341","display_name":"Gyan Vihar University","ror":"https://ror.org/048q3sh29","country_code":"IN","type":"education","lineage":["https://openalex.org/I91894341"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Arpit Agarwal","raw_affiliation_strings":["Dept. of Computer Science and Engineering, Suresh Gyan Vihar University, Jaipur"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Science and Engineering, Suresh Gyan Vihar University, Jaipur","institution_ids":["https://openalex.org/I91894341"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101655568","display_name":"Mrinal Kanti Sarkar","orcid":"https://orcid.org/0000-0001-5246-1851"},"institutions":[{"id":"https://openalex.org/I1296725772","display_name":"University of Engineering & Management","ror":"https://ror.org/02decng19","country_code":"IN","type":"education","lineage":["https://openalex.org/I1296725772"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Mrinal Kanti Sarkar","raw_affiliation_strings":["Dept. of Computer Science and Engineering, University of Engineering and Management"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Science and Engineering, University of Engineering and Management","institution_ids":["https://openalex.org/I1296725772"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056394032","display_name":"Rupayan Das","orcid":"https://orcid.org/0000-0002-3713-2459"},"institutions":[{"id":"https://openalex.org/I1296725772","display_name":"University of Engineering & Management","ror":"https://ror.org/02decng19","country_code":"IN","type":"education","lineage":["https://openalex.org/I1296725772"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Rupayan Das","raw_affiliation_strings":["Dept. of Computer Science and Engineering, University of Engineering and Management"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Science and Engineering, University of Engineering and Management","institution_ids":["https://openalex.org/I1296725772"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5105353742","display_name":"Sanjay Kumar","orcid":"https://orcid.org/0000-0003-4549-7463"},"institutions":[{"id":"https://openalex.org/I9223067","display_name":"Jaipur National University","ror":"https://ror.org/01xrazc29","country_code":"IN","type":"education","lineage":["https://openalex.org/I9223067"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sanjay Kumar","raw_affiliation_strings":["Dept. of Computer Science and Engineering, Jaipur National University, Jaipur, India"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Science and Engineering, Jaipur National University, Jaipur, India","institution_ids":["https://openalex.org/I9223067"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5026704172"],"corresponding_institution_ids":["https://openalex.org/I1296725772"],"apc_list":null,"apc_paid":null,"fwci":4.6444,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.95284423,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9896000027656555,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9702000021934509,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.7627249956130981},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.759914755821228},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.746873140335083},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7240850329399109},{"id":"https://openalex.org/keywords/client-side-encryption","display_name":"Client-side encryption","score":0.6215783357620239},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.584723949432373},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.5005066394805908},{"id":"https://openalex.org/keywords/upload","display_name":"Upload","score":0.48981162905693054},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.45796114206314087},{"id":"https://openalex.org/keywords/virtual-machine","display_name":"Virtual machine","score":0.4383859932422638},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.3939213156700134},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.374796986579895},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.3532909154891968},{"id":"https://openalex.org/keywords/on-the-fly-encryption","display_name":"On-the-fly encryption","score":0.2954784333705902}],"concepts":[{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.7627249956130981},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.759914755821228},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.746873140335083},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7240850329399109},{"id":"https://openalex.org/C166501710","wikidata":"https://www.wikidata.org/wiki/Q5132476","display_name":"Client-side encryption","level":4,"score":0.6215783357620239},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.584723949432373},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.5005066394805908},{"id":"https://openalex.org/C71901391","wikidata":"https://www.wikidata.org/wiki/Q7126699","display_name":"Upload","level":2,"score":0.48981162905693054},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.45796114206314087},{"id":"https://openalex.org/C25344961","wikidata":"https://www.wikidata.org/wiki/Q192726","display_name":"Virtual machine","level":2,"score":0.4383859932422638},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3939213156700134},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.374796986579895},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.3532909154891968},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.2954784333705902}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/uemcon.2016.7777913","is_oa":false,"landing_page_url":"https://doi.org/10.1109/uemcon.2016.7777913","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE 7th Annual Ubiquitous Computing, Electronics &amp; Mobile Communication Conference (UEMCON)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W51022818","https://openalex.org/W2029767370","https://openalex.org/W2085725725","https://openalex.org/W2109026747","https://openalex.org/W2112967367","https://openalex.org/W2113835537","https://openalex.org/W2117885651","https://openalex.org/W2167015470","https://openalex.org/W2169677269","https://openalex.org/W2418927766","https://openalex.org/W2950117580","https://openalex.org/W2963358330","https://openalex.org/W3105497638","https://openalex.org/W6657884239","https://openalex.org/W6676463127","https://openalex.org/W6677599165","https://openalex.org/W6786207722"],"related_works":["https://openalex.org/W2944823289","https://openalex.org/W2070735207","https://openalex.org/W2558538437","https://openalex.org/W2612791064","https://openalex.org/W2893967483","https://openalex.org/W2807937293","https://openalex.org/W2357605019","https://openalex.org/W1965405747","https://openalex.org/W2167514501","https://openalex.org/W2339614561"],"abstract_inverted_index":{"The":[0],"IT":[1,19],"world":[2],"these":[3,65],"days":[4],"is":[5,97,116,170,200,205,214,258,264,268,277,284],"migrating":[6],"to":[7,33,51,53,118,245],"cloud":[8,16],"computing":[9],"as":[10,44,56,127,158,224,266],"the":[11,24,42,49,57,88,119,122,175,177,186,191,218,222,239,252,256,281],"matter":[12],"of":[13,35,79,93,109,111,125,210,241],"fact":[14],"that":[15,204],"providers":[17],"provide":[18],"resources":[20,27,139,165],"on":[21],"demand":[22,40],"over":[23,39,87],"Internet.":[25],"These":[26],"vary":[28],"from":[29],"highly":[30],"available":[31],"instances":[32,153],"variety":[34],"storage":[36],"types,":[37],"all":[38],"and":[41,59,85,91,95,172,189,213,262],"pay":[43],"you":[45],"use":[46,164,231],"concept":[47],"fascinates":[48],"enterprises":[50,60],"move":[52],"cloud.":[54,89],"But":[55],"individuals":[58],"are":[61,74,129,143,254],"now":[62],"inclined":[63],"towards":[64],"services,":[66],"security":[67,77],"has":[68],"always":[69],"been":[70],"a":[71,101,168,201,208,246,269],"concern.":[72],"People":[73],"worried":[75],"about":[76],"issues":[78],"their":[80],"data":[81,94,113,257],"being":[82],"secure,":[83],"safe":[84],"confidential":[86],"Authentication":[90],"Authorization":[92],"accounts":[96],"more":[98],"than":[99],"just":[100],"requirement.":[102],"Our":[103,147],"Proposed":[104],"methodology,":[105],"along":[106],"with":[107],"implementation":[108],"encryption":[110,126,136,160,229,243,271],"user":[112],"when":[114,167,234,280],"it":[115,227],"uploaded":[117],"servers,":[120],"reduces":[121],"cost":[123,192],"overhead":[124],"we":[128],"not":[130,144],"using":[131],"standalone":[132],"hardware":[133],"servers":[134,230,244,253],"for":[135],"which":[137,154,162,276],"waste":[138],"even":[140,250],"if":[141,251],"they":[142],"in":[145,197,217,259,274],"use.":[146],"method":[148],"will":[149,155,163,180],"be":[150,156,181],"implementing":[151],"Docker":[152],"used":[157],"an":[159],"server,":[161],"only":[166,233,279],"file":[169,211,223],"received":[171],"after":[173],"encrypting":[174,221],"file,":[176],"docker":[178,195,282],"instance":[179,196,283],"shut":[182,215],"down,":[183],"hence":[184,263],"reducing":[185,190],"resource":[187,232],"usage":[188],"altogether.":[193],"A":[194],"layman":[198],"language":[199],"virtual":[202],"environment":[203],"launched":[206],"within":[207],"second":[209],"receiving":[212],"down":[216],"same":[219],"time,":[220],"well.":[225],"Hence":[226],"makes":[228],"necessary.":[235],"This":[236],"approach":[237],"removes":[238],"need":[240],"physical":[242],"greater":[247],"extent.":[248],"Now":[249],"compromised,":[255],"encrypted":[260],"form":[261],"secured":[265],"there":[267],"single":[270],"algorithm":[272],"written":[273],"code":[275],"executed":[278],"launched.":[285]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
