{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2011:HYN4CQ7DZPV5JY2SRPLD4WFQ2J","short_pith_number":"pith:HYN4CQ7D","canonical_record":{"source":{"id":"1111.3165","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.DC","submitted_at":"2011-11-14T10:28:59Z","cross_cats_sorted":["cs.CR"],"title_canon_sha256":"df27e65d2778dc3bebab4bbda0734c4fe2499b10c138521c2cea92a807af883e","abstract_canon_sha256":"a4d4060dddb5f8322e1e8baccb012beaf71680e156e3c80801d04538c4ec0b84"},"schema_version":"1.0"},"canonical_sha256":"3e1bc143e3cbebd4e3528bd63e58b0d268ec587635289e91b0460aa26f00dc2d","source":{"kind":"arxiv","id":"1111.3165","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1111.3165","created_at":"2026-05-18T04:08:22Z"},{"alias_kind":"arxiv_version","alias_value":"1111.3165v1","created_at":"2026-05-18T04:08:22Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1111.3165","created_at":"2026-05-18T04:08:22Z"},{"alias_kind":"pith_short_12","alias_value":"HYN4CQ7DZPV5","created_at":"2026-05-18T12:26:30Z"},{"alias_kind":"pith_short_16","alias_value":"HYN4CQ7DZPV5JY2S","created_at":"2026-05-18T12:26:30Z"},{"alias_kind":"pith_short_8","alias_value":"HYN4CQ7D","created_at":"2026-05-18T12:26:30Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2011:HYN4CQ7DZPV5JY2SRPLD4WFQ2J","target":"record","payload":{"canonical_record":{"source":{"id":"1111.3165","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.DC","submitted_at":"2011-11-14T10:28:59Z","cross_cats_sorted":["cs.CR"],"title_canon_sha256":"df27e65d2778dc3bebab4bbda0734c4fe2499b10c138521c2cea92a807af883e","abstract_canon_sha256":"a4d4060dddb5f8322e1e8baccb012beaf71680e156e3c80801d04538c4ec0b84"},"schema_version":"1.0"},"canonical_sha256":"3e1bc143e3cbebd4e3528bd63e58b0d268ec587635289e91b0460aa26f00dc2d","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T04:08:22.875585Z","signature_b64":"4QAt9aZmg9yiSoY2JKnEN72+tA7HbFdnnSbL6f/hTMVma4nuVHeVB2+ggflKUHkZkl/ID9E2aAWD9/ezvsgDCw==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"3e1bc143e3cbebd4e3528bd63e58b0d268ec587635289e91b0460aa26f00dc2d","last_reissued_at":"2026-05-18T04:08:22.874981Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T04:08:22.874981Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1111.3165","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T04:08:22Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"1YjAaGualZksba7zhpXO3kragT8GyO8HaVtv5OSjWyEUuuxOfTgls4rfHE/cnwwSxrXtOv0W2IOn+Bq071McDQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-20T18:04:18.611602Z"},"content_sha256":"5ffdc7df05d2d5b357a5fa246b440b77636672ae43f876b07946829931c6d3a9","schema_version":"1.0","event_id":"sha256:5ffdc7df05d2d5b357a5fa246b440b77636672ae43f876b07946829931c6d3a9"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2011:HYN4CQ7DZPV5JY2SRPLD4WFQ2J","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Effective Ways of Secure, Private and Trusted Cloud Computing","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.CR"],"primary_cat":"cs.DC","authors_text":"Durg Singh Chauhan, Manoj Diwakar, Pardeep Kumar, P. K. Gupta, Vivek Kumar Sehgal","submitted_at":"2011-11-14T10:28:59Z","abstract_excerpt":"Cloud computing is an Internet-based computing, where shared resources, software and information, are provided to computers and devices on-demand. It provides people the way to share distributed resources and services that belong to different organization. Since cloud computing uses distributed resources in open environment, thus it is important to provide the security and trust to share the data for developing cloud computing applications. In this paper we assess how can cloud providers earn their customers' trust and provide the security, privacy and reliability, when a third party is proces"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1111.3165","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T04:08:22Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"wVlJhGFlZSuiIuQRQ0bpNYtNMbuDNUL4YhLlnHCyP2wrFqTGL+lM6mBFQaA4qeKTtSApVKWiy7bV4R+QMilADA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-20T18:04:18.611949Z"},"content_sha256":"17f01c619abb9b5a27fe9491cdd76b56fbe921330432e96746a3592f389dacf1","schema_version":"1.0","event_id":"sha256:17f01c619abb9b5a27fe9491cdd76b56fbe921330432e96746a3592f389dacf1"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/HYN4CQ7DZPV5JY2SRPLD4WFQ2J/bundle.json","state_url":"https://pith.science/pith/HYN4CQ7DZPV5JY2SRPLD4WFQ2J/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/HYN4CQ7DZPV5JY2SRPLD4WFQ2J/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-20T18:04:18Z","links":{"resolver":"https://pith.science/pith/HYN4CQ7DZPV5JY2SRPLD4WFQ2J","bundle":"https://pith.science/pith/HYN4CQ7DZPV5JY2SRPLD4WFQ2J/bundle.json","state":"https://pith.science/pith/HYN4CQ7DZPV5JY2SRPLD4WFQ2J/state.json","well_known_bundle":"https://pith.science/.well-known/pith/HYN4CQ7DZPV5JY2SRPLD4WFQ2J/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2011:HYN4CQ7DZPV5JY2SRPLD4WFQ2J","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"a4d4060dddb5f8322e1e8baccb012beaf71680e156e3c80801d04538c4ec0b84","cross_cats_sorted":["cs.CR"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.DC","submitted_at":"2011-11-14T10:28:59Z","title_canon_sha256":"df27e65d2778dc3bebab4bbda0734c4fe2499b10c138521c2cea92a807af883e"},"schema_version":"1.0","source":{"id":"1111.3165","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1111.3165","created_at":"2026-05-18T04:08:22Z"},{"alias_kind":"arxiv_version","alias_value":"1111.3165v1","created_at":"2026-05-18T04:08:22Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1111.3165","created_at":"2026-05-18T04:08:22Z"},{"alias_kind":"pith_short_12","alias_value":"HYN4CQ7DZPV5","created_at":"2026-05-18T12:26:30Z"},{"alias_kind":"pith_short_16","alias_value":"HYN4CQ7DZPV5JY2S","created_at":"2026-05-18T12:26:30Z"},{"alias_kind":"pith_short_8","alias_value":"HYN4CQ7D","created_at":"2026-05-18T12:26:30Z"}],"graph_snapshots":[{"event_id":"sha256:17f01c619abb9b5a27fe9491cdd76b56fbe921330432e96746a3592f389dacf1","target":"graph","created_at":"2026-05-18T04:08:22Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Cloud computing is an Internet-based computing, where shared resources, software and information, are provided to computers and devices on-demand. It provides people the way to share distributed resources and services that belong to different organization. Since cloud computing uses distributed resources in open environment, thus it is important to provide the security and trust to share the data for developing cloud computing applications. In this paper we assess how can cloud providers earn their customers' trust and provide the security, privacy and reliability, when a third party is proces","authors_text":"Durg Singh Chauhan, Manoj Diwakar, Pardeep Kumar, P. K. Gupta, Vivek Kumar Sehgal","cross_cats":["cs.CR"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.DC","submitted_at":"2011-11-14T10:28:59Z","title":"Effective Ways of Secure, Private and Trusted Cloud Computing"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1111.3165","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:5ffdc7df05d2d5b357a5fa246b440b77636672ae43f876b07946829931c6d3a9","target":"record","created_at":"2026-05-18T04:08:22Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"a4d4060dddb5f8322e1e8baccb012beaf71680e156e3c80801d04538c4ec0b84","cross_cats_sorted":["cs.CR"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.DC","submitted_at":"2011-11-14T10:28:59Z","title_canon_sha256":"df27e65d2778dc3bebab4bbda0734c4fe2499b10c138521c2cea92a807af883e"},"schema_version":"1.0","source":{"id":"1111.3165","kind":"arxiv","version":1}},"canonical_sha256":"3e1bc143e3cbebd4e3528bd63e58b0d268ec587635289e91b0460aa26f00dc2d","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"3e1bc143e3cbebd4e3528bd63e58b0d268ec587635289e91b0460aa26f00dc2d","first_computed_at":"2026-05-18T04:08:22.874981Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T04:08:22.874981Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"4QAt9aZmg9yiSoY2JKnEN72+tA7HbFdnnSbL6f/hTMVma4nuVHeVB2+ggflKUHkZkl/ID9E2aAWD9/ezvsgDCw==","signature_status":"signed_v1","signed_at":"2026-05-18T04:08:22.875585Z","signed_message":"canonical_sha256_bytes"},"source_id":"1111.3165","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:5ffdc7df05d2d5b357a5fa246b440b77636672ae43f876b07946829931c6d3a9","sha256:17f01c619abb9b5a27fe9491cdd76b56fbe921330432e96746a3592f389dacf1"],"state_sha256":"622928f598c7a981e81b230a5bfdfd249af49d139a625b1347644311c956b892"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"lCpB9NOYb8TiCy2wbUVcFCKJmwYoAYikngB1KWW6PhdRVErSF1n0HW9vibicGYyVMn0MnSX9wbKl2HGm+xd0AA==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-20T18:04:18.613904Z","bundle_sha256":"a9303a7a0dc65603b1153336b222ee55c381ec082a7bc0b840a965d4b3fd9358"}}