{"record_type":"pith_number_record","schema_url":"https://pith.science/schemas/pith-number/v1.json","pith_number":"pith:2011:HYN4CQ7DZPV5JY2SRPLD4WFQ2J","short_pith_number":"pith:HYN4CQ7D","schema_version":"1.0","canonical_sha256":"3e1bc143e3cbebd4e3528bd63e58b0d268ec587635289e91b0460aa26f00dc2d","source":{"kind":"arxiv","id":"1111.3165","version":1},"attestation_state":"computed","paper":{"title":"Effective Ways of Secure, Private and Trusted Cloud Computing","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.CR"],"primary_cat":"cs.DC","authors_text":"Durg Singh Chauhan, Manoj Diwakar, Pardeep Kumar, P. K. Gupta, Vivek Kumar Sehgal","submitted_at":"2011-11-14T10:28:59Z","abstract_excerpt":"Cloud computing is an Internet-based computing, where shared resources, software and information, are provided to computers and devices on-demand. It provides people the way to share distributed resources and services that belong to different organization. Since cloud computing uses distributed resources in open environment, thus it is important to provide the security and trust to share the data for developing cloud computing applications. In this paper we assess how can cloud providers earn their customers' trust and provide the security, privacy and reliability, when a third party is proces"},"verification_status":{"content_addressed":true,"pith_receipt":true,"author_attested":false,"weak_author_claims":0,"strong_author_claims":0,"externally_anchored":false,"storage_verified":false,"citation_signatures":0,"replication_records":0,"graph_snapshot":true,"references_resolved":false,"formal_links_present":false},"canonical_record":{"source":{"id":"1111.3165","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.DC","submitted_at":"2011-11-14T10:28:59Z","cross_cats_sorted":["cs.CR"],"title_canon_sha256":"df27e65d2778dc3bebab4bbda0734c4fe2499b10c138521c2cea92a807af883e","abstract_canon_sha256":"a4d4060dddb5f8322e1e8baccb012beaf71680e156e3c80801d04538c4ec0b84"},"schema_version":"1.0"},"receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T04:08:22.875585Z","signature_b64":"4QAt9aZmg9yiSoY2JKnEN72+tA7HbFdnnSbL6f/hTMVma4nuVHeVB2+ggflKUHkZkl/ID9E2aAWD9/ezvsgDCw==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"3e1bc143e3cbebd4e3528bd63e58b0d268ec587635289e91b0460aa26f00dc2d","last_reissued_at":"2026-05-18T04:08:22.874981Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T04:08:22.874981Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"graph_snapshot":{"paper":{"title":"Effective Ways of Secure, Private and Trusted Cloud Computing","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.CR"],"primary_cat":"cs.DC","authors_text":"Durg Singh Chauhan, Manoj Diwakar, Pardeep Kumar, P. K. Gupta, Vivek Kumar Sehgal","submitted_at":"2011-11-14T10:28:59Z","abstract_excerpt":"Cloud computing is an Internet-based computing, where shared resources, software and information, are provided to computers and devices on-demand. It provides people the way to share distributed resources and services that belong to different organization. Since cloud computing uses distributed resources in open environment, thus it is important to provide the security and trust to share the data for developing cloud computing applications. In this paper we assess how can cloud providers earn their customers' trust and provide the security, privacy and reliability, when a third party is proces"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1111.3165","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"aliases":[{"alias_kind":"arxiv","alias_value":"1111.3165","created_at":"2026-05-18T04:08:22.875068+00:00"},{"alias_kind":"arxiv_version","alias_value":"1111.3165v1","created_at":"2026-05-18T04:08:22.875068+00:00"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1111.3165","created_at":"2026-05-18T04:08:22.875068+00:00"},{"alias_kind":"pith_short_12","alias_value":"HYN4CQ7DZPV5","created_at":"2026-05-18T12:26:30.835961+00:00"},{"alias_kind":"pith_short_16","alias_value":"HYN4CQ7DZPV5JY2S","created_at":"2026-05-18T12:26:30.835961+00:00"},{"alias_kind":"pith_short_8","alias_value":"HYN4CQ7D","created_at":"2026-05-18T12:26:30.835961+00:00"}],"events":[],"event_summary":{},"paper_claims":[],"inbound_citations":{"count":0,"internal_anchor_count":0,"sample":[]},"formal_canon":{"evidence_count":0,"sample":[],"anchors":[]},"links":{"html":"https://pith.science/pith/HYN4CQ7DZPV5JY2SRPLD4WFQ2J","json":"https://pith.science/pith/HYN4CQ7DZPV5JY2SRPLD4WFQ2J.json","graph_json":"https://pith.science/api/pith-number/HYN4CQ7DZPV5JY2SRPLD4WFQ2J/graph.json","events_json":"https://pith.science/api/pith-number/HYN4CQ7DZPV5JY2SRPLD4WFQ2J/events.json","paper":"https://pith.science/paper/HYN4CQ7D"},"agent_actions":{"view_html":"https://pith.science/pith/HYN4CQ7DZPV5JY2SRPLD4WFQ2J","download_json":"https://pith.science/pith/HYN4CQ7DZPV5JY2SRPLD4WFQ2J.json","view_paper":"https://pith.science/paper/HYN4CQ7D","resolve_alias":"https://pith.science/api/pith-number/resolve?arxiv=1111.3165&json=true","fetch_graph":"https://pith.science/api/pith-number/HYN4CQ7DZPV5JY2SRPLD4WFQ2J/graph.json","fetch_events":"https://pith.science/api/pith-number/HYN4CQ7DZPV5JY2SRPLD4WFQ2J/events.json","actions":{"anchor_timestamp":"https://pith.science/pith/HYN4CQ7DZPV5JY2SRPLD4WFQ2J/action/timestamp_anchor","attest_storage":"https://pith.science/pith/HYN4CQ7DZPV5JY2SRPLD4WFQ2J/action/storage_attestation","attest_author":"https://pith.science/pith/HYN4CQ7DZPV5JY2SRPLD4WFQ2J/action/author_attestation","sign_citation":"https://pith.science/pith/HYN4CQ7DZPV5JY2SRPLD4WFQ2J/action/citation_signature","submit_replication":"https://pith.science/pith/HYN4CQ7DZPV5JY2SRPLD4WFQ2J/action/replication_record"}},"created_at":"2026-05-18T04:08:22.875068+00:00","updated_at":"2026-05-18T04:08:22.875068+00:00"}