Cloud Computing Security Issues and Challenges: A Review
Abstract
Full Text:
PDFReferences
Danan Thilakanatha, Shiping Chen,Surya Nepal, Rafael A. Calvo and Leila Alem, “A platform for secure monitoring and sharing of generic health data in the Cloud”, Elsevier Ltd, 2013.
Pardeep Sharma, Sandeep K. Sood, Sumeet Kaur, “Cloud Implementation Issues and What to Compute on Cloud”, International Journal of Advances in Computer Networks and its Security, vol.1, no. 1, pp. 130-135, 2011.
Jingwei Li, Jin Li, Zheli Liu and Chunfu Jia “Enabling efficient and secure data sharing in cloud computing” Concurrency Computat.:Pract Exper.,John Wiley & Sons, Ltd.,2013.
Jing-Jang Hwang, Hung-Kai Chuang, Yi-Chang Hsu and Chien-Hsing Wu, “A Business Model for Cloud Computing Based on a Separate Encryption and Decryption Service”, National Science Council of Taiwan Government.
Tao Jiang et. al.“Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation” IEEE 2015
Eman M.Mohamed et. Al. “Enhanced Data Security Model for Cloud Computing”, INFOS2012 - 14-16 May
Mazhar Ali et al “SeDaSC: Secure Data Sharing in Clouds”, IEEE SYSTEMS JOURNAL 2015
Dr. L. Arockiam et. al. “Efficient Cloud Storage Confidentiality to Ensure Data Security” ICCCI -2014, Jan. 03 – 05, 2014, Coimbatore, INDIA.
Ayad F. Barsoum et. al.” Provable Multicopy Dynamic Data Possession in Cloud Computing Systems”, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 10, NO. 3, MARCH 2015
Zhen Chen et al. “Collaborative Network Security in Multi-Tenant Data Center for Cloud Computing”, TSINGHUA SCIENCE AND TECHNOLOGY ISSNl l1007-0214l l09/10l lpp82-94, Volume 19, Number 1, February 2014
Dharmendra S. Raghuwanshi et al. “MS2: Practical Data Privacy and Security Framework for Data at Rest in Cloud”, IEEE 2014
Cindhamani.J et. al. “An enhanced data security and trust management enabled framework for cloud computing systems”, 5th ICCCNT – 2014
Aws Naser Jaber1 et. al. “A Study in Data Security in Cloud Computing”, IC4T 2014.
Sandeep K. Sood, “A Highly Secure Hybrid Security model for Data Security at Cloud ”, Submitted to Security and Communication Networks, John Wiley and Sons (Interscience), Special Issue on Trust and Security in Cloud Computing, 2012.
P.Varalakshmi and Hamsavardhini Deventhiran, “Integrity Checking for Cloud Environment Using Encryption Algorithm”, IEEE, 2012.
Eman M.Mohamed and Sherif EI-Etriby, “Randomness Testing of Modem Encryption Techniques in Cloud Environment”, 8th International Conference on Informatics and Systems, 2012.
Zhiqian Xu and Keith M. Martin, “Dynamic User Revocation and Key Refreshing for Attribute-Based Encryption in Cloud Storage”, International Conference on Trust, Security and Privacy in Computing and Communications, IEEE, 2012.
DOI: https://doi.org/10.23956/ijarcsse.v8i1.526
Refbacks
- There are currently no refbacks.