{"id":"https://openalex.org/W2121724114","doi":"https://doi.org/10.1186/2192-113x-1-13","title":"The design of a redundant array of independent net-storages for improved confidentiality in cloud computing","display_name":"The design of a redundant array of independent net-storages for improved confidentiality in cloud computing","publication_year":2012,"publication_date":"2012-01-01","ids":{"openalex":"https://openalex.org/W2121724114","doi":"https://doi.org/10.1186/2192-113x-1-13","mag":"2121724114"},"language":"en","primary_location":{"id":"doi:10.1186/2192-113x-1-13","is_oa":true,"landing_page_url":"https://doi.org/10.1186/2192-113x-1-13","pdf_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/2192-113X-1-13","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing: Advances, Systems and Applications","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/2192-113X-1-13","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5071836226","display_name":"Martin Gilje Jaatun","orcid":"https://orcid.org/0000-0001-7127-6694"},"institutions":[{"id":"https://openalex.org/I173888879","display_name":"SINTEF","ror":"https://ror.org/01f677e56","country_code":"NO","type":"facility","lineage":["https://openalex.org/I173888879"]}],"countries":["NO"],"is_corresponding":true,"raw_author_name":"Martin Jaatun","raw_affiliation_strings":["SINTEF ICT, Trondheim, Norway","SINTEF ICT , Trondheim, Norway"],"affiliations":[{"raw_affiliation_string":"SINTEF ICT, Trondheim, Norway","institution_ids":["https://openalex.org/I173888879"]},{"raw_affiliation_string":"SINTEF ICT , Trondheim, Norway","institution_ids":["https://openalex.org/I173888879"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101818721","display_name":"Gansen Zhao","orcid":"https://orcid.org/0009-0007-1526-5326"},"institutions":[{"id":"https://openalex.org/I187400657","display_name":"South China Normal University","ror":"https://ror.org/01kq0pv72","country_code":"CN","type":"education","lineage":["https://openalex.org/I187400657"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Gansen Zhao","raw_affiliation_strings":["South China Normal University, Guangzhou, China","South China Normal University,Guangzhou,China"],"affiliations":[{"raw_affiliation_string":"South China Normal University, Guangzhou, China","institution_ids":["https://openalex.org/I187400657"]},{"raw_affiliation_string":"South China Normal University,Guangzhou,China","institution_ids":["https://openalex.org/I187400657"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074022699","display_name":"Athanasios V. Vasilakos","orcid":"https://orcid.org/0000-0003-1902-9877"},"institutions":[{"id":"https://openalex.org/I89506807","display_name":"University of Western Macedonia","ror":"https://ror.org/00a5pe906","country_code":"GR","type":"education","lineage":["https://openalex.org/I89506807"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Athanasios V Vasilakos","raw_affiliation_strings":["University of Western Macedonia, Florina, Greece"],"affiliations":[{"raw_affiliation_string":"University of Western Macedonia, Florina, Greece","institution_ids":["https://openalex.org/I89506807"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051828391","display_name":"\u00c5smund Ahlmann Nyre","orcid":null},"institutions":[{"id":"https://openalex.org/I173888879","display_name":"SINTEF","ror":"https://ror.org/01f677e56","country_code":"NO","type":"facility","lineage":["https://openalex.org/I173888879"]}],"countries":["NO"],"is_corresponding":false,"raw_author_name":"\u00c5smund Ahlmann Nyre","raw_affiliation_strings":["SINTEF ICT , Trondheim, Norway"],"affiliations":[{"raw_affiliation_string":"SINTEF ICT , Trondheim, Norway","institution_ids":["https://openalex.org/I173888879"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088686044","display_name":"Stian Alapnes","orcid":null},"institutions":[{"id":"https://openalex.org/I2800413675","display_name":"Telenor (Norway)","ror":"https://ror.org/02jsp2z03","country_code":"NO","type":"company","lineage":["https://openalex.org/I2800413675"]}],"countries":["NO"],"is_corresponding":false,"raw_author_name":"Stian Alapnes","raw_affiliation_strings":["Telenor Research and Future Studies, Trondheim, Norway",", Telenor Research and Future Studies, Trondheim, Norway"],"affiliations":[{"raw_affiliation_string":"Telenor Research and Future Studies, Trondheim, Norway","institution_ids":["https://openalex.org/I2800413675"]},{"raw_affiliation_string":", Telenor Research and Future Studies, Trondheim, Norway","institution_ids":["https://openalex.org/I2800413675"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5073529204","display_name":"Yong Tang","orcid":"https://orcid.org/0000-0002-5036-4350"},"institutions":[{"id":"https://openalex.org/I187400657","display_name":"South China Normal University","ror":"https://ror.org/01kq0pv72","country_code":"CN","type":"education","lineage":["https://openalex.org/I187400657"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yong Tang","raw_affiliation_strings":["South China Normal University, Guangzhou, China","South China Normal University,Guangzhou,China"],"affiliations":[{"raw_affiliation_string":"South China Normal University, Guangzhou, China","institution_ids":["https://openalex.org/I187400657"]},{"raw_affiliation_string":"South China Normal University,Guangzhou,China","institution_ids":["https://openalex.org/I187400657"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5071836226"],"corresponding_institution_ids":["https://openalex.org/I173888879"],"apc_list":{"value":990,"currency":"GBP","value_usd":1214},"apc_paid":{"value":990,"currency":"GBP","value_usd":1214},"fwci":1.7126,"has_fulltext":true,"cited_by_count":13,"citation_normalized_percentile":{"value":0.86734376,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"1","issue":"1","first_page":"13","last_page":"13"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.8600205183029175},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7912087440490723},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.7750710248947144},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.5786990523338318},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4431612491607666},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.43748176097869873},{"id":"https://openalex.org/keywords/private-information-retrieval","display_name":"Private information retrieval","score":0.4265476167201996},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3699139356613159},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1258578896522522}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8600205183029175},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7912087440490723},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.7750710248947144},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5786990523338318},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4431612491607666},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.43748176097869873},{"id":"https://openalex.org/C99221444","wikidata":"https://www.wikidata.org/wiki/Q1532069","display_name":"Private information retrieval","level":2,"score":0.4265476167201996},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3699139356613159},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1258578896522522},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1186/2192-113x-1-13","is_oa":true,"landing_page_url":"https://doi.org/10.1186/2192-113x-1-13","pdf_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/2192-113X-1-13","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing: Advances, Systems and Applications","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1186/2192-113x-1-13","is_oa":true,"landing_page_url":"https://doi.org/10.1186/2192-113x-1-13","pdf_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/2192-113X-1-13","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing: Advances, Systems and Applications","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.5799999833106995}],"awards":[],"funders":[{"id":"https://openalex.org/F4320326939","display_name":"State Key Laboratory of Software Engineering","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2121724114.pdf","grobid_xml":"https://content.openalex.org/works/W2121724114.grobid-xml"},"referenced_works_count":39,"referenced_works":["https://openalex.org/W65919655","https://openalex.org/W85967438","https://openalex.org/W1485800369","https://openalex.org/W1496139339","https://openalex.org/W1541979851","https://openalex.org/W1545050218","https://openalex.org/W1580004440","https://openalex.org/W1600328410","https://openalex.org/W1655958391","https://openalex.org/W1680037998","https://openalex.org/W1985510675","https://openalex.org/W2000418599","https://openalex.org/W2013060337","https://openalex.org/W2058972589","https://openalex.org/W2067697826","https://openalex.org/W2068189899","https://openalex.org/W2072934648","https://openalex.org/W2087811006","https://openalex.org/W2097913369","https://openalex.org/W2103647628","https://openalex.org/W2110642323","https://openalex.org/W2119028650","https://openalex.org/W2124342778","https://openalex.org/W2130050975","https://openalex.org/W2130336292","https://openalex.org/W2131900781","https://openalex.org/W2141420453","https://openalex.org/W2142437056","https://openalex.org/W2145721148","https://openalex.org/W2145790759","https://openalex.org/W2151962787","https://openalex.org/W2157236031","https://openalex.org/W2159024459","https://openalex.org/W2159306446","https://openalex.org/W2166130341","https://openalex.org/W2166471894","https://openalex.org/W2169080437","https://openalex.org/W2266515872","https://openalex.org/W2397561113"],"related_works":["https://openalex.org/W4387497383","https://openalex.org/W3183948672","https://openalex.org/W3173606202","https://openalex.org/W3110381201","https://openalex.org/W2948807893","https://openalex.org/W2935909890","https://openalex.org/W2778153218","https://openalex.org/W2758277628","https://openalex.org/W1531601525","https://openalex.org/W2091483479"],"abstract_inverted_index":{"This":[0],"article":[1],"describes":[2],"how":[3],"a":[4,97],"Redundant":[5],"Array":[6],"of":[7,38,83],"Independent":[8],"Net-storages":[9],"(RAIN)":[10],"can":[11],"be":[12,52],"deployed":[13],"for":[14],"confidentiality":[15,82],"control":[16],"in":[17,86],"Cloud":[18],"Computing.":[19],"The":[20],"RAIN":[21,76],"approach":[22],"splits":[23],"data":[24,50,84],"into":[25],"segments":[26,29,39,46],"and":[27,40,74,95,102],"distributes":[28],"between":[30,43],"multiple":[31],"storage":[32],"providers;":[33],"by":[34,54],"keeping":[35],"the":[36,41,44,48,81,87,91],"distribution":[37],"relationships":[42],"distributed":[45],"private,":[47],"original":[49],"cannot":[51],"re-assembled":[53],"an":[55,65],"observer.":[56],"As":[57],"long":[58],"as":[59],"each":[60],"segment":[61,67],"is":[62,77],"small":[63],"enough,":[64],"individual":[66],"discloses":[68],"no":[69],"meaningful":[70],"information":[71],"to":[72,79],"others,":[73],"hence":[75],"able":[78],"ensure":[80],"stored":[85],"clouds.":[88],"We":[89],"describe":[90],"inter-cloud":[92],"communication":[93],"protocol,":[94],"present":[96],"formal":[98],"model,":[99],"security":[100],"analysis,":[101],"simulation":[103],"results.":[104]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":2},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
