security challenges faced in cloud computing environment
Abstract
Keywords
Full Text:
PDFReferences
Zaigham Mahmood and Richard Hill, Cloud Computing for enterprise architectures, Springer,2011
Peter Mell and Tim Grance,”The NIST definition of cloud computing” 53(6):50, 2009. 7, 9
http://en.wikipedia.org/wiki/Cloud_computing
T. Dillon, Chen Wu, and E. Chang, “Cloud computing: Issues and challenges”,
In 2010 24th IEEE International Conference on Advanced Information Networking and Applications (AINA), pages 27 {33, April 2010.
Geva Perry. How cloud and utility computing are different, Feb 2008.
Amazon. Amazon Elastic Compute Cloud(EC2). .
Joo Lee Hong . “Analysis of business attributes in information technology environments”. J Inform Process Syst 2011;7(2):385–96.
Yang Jian feng,Chen Zhi bin , ”Cloud computing research and security issues”, 2010 IEEE international conference on advance information networking and application
T. Dillon, C. Wu, and E. Chang, “Cloud Computing: Issues and Challenges,” in Advanced Information Networking and Applications (AINA), 2010 24th IEEE International Conference , pp. 27–33.
B. Grobauer, T. Walloschek, and E. Stocker, “Understanding Cloud Computing
Vulnerabilities,” Security Privacy, IEEE, vol. 9, no. 2, pp. 50–57, Mar. 2011.
Dropbox’s Blog. Privacy, security & yourdropbox;2011.http://blog.dropbox.com/?p=735 > [retrieved 25.04.11].
Chunming Rong, S.T.Nguyen, M.G.Jaatun, “Beyond Lighting:A servey on security challenges in cloud computing”, Elsevier ;2012.
Eken Hamm,”Security Threats and solutions in cloud computing”.IEEE 2013.
X. Li, X. Jiang, P. Huang, and K. Ye, Dartcsim: An enhanced user-friendly cloud simulation system based on cloudsim with better performance," in Cloud Computing and Intelligent Systems (CCIS), 2012 IEEE 2nd Interna- tional Conference on, vol. 1, pp. 392{396, IEEE, 2012.
A. Li, X. Yang, S. Kandula, and M. Zhang, Cloudcmp: comparing public cloud providers," in Proceedings of the 10th ACM SIGCOMM conference on Internet measurement, pp. 1{14, ACM, 2010.
R Madhubala. An illustrative study on cloud computing. International journal of soft computing and engineering, 1(6):286{290, 2012.
Feng Zhao,Chao Li,Chun Feng liu,”A cloud computing security solution based on fully homomorphic encryption”.feb,19,2014.
R. L. Rivest, L. Adleman, and M. L. Dertouzos, On data banks and privacy homomorphisms," Foundations of secure computation, vol. 4, no. 11, pp. 169-180, 1978.
T. ElGamal, A public key cryptosystem and a signature scheme based on discrete logarithms," in Advances in Cryptology, pp. 10{18, Springer, 1985.
P. Paillier, Public-key cryptosystems based on composite degree residuosity classes," in Advances in cryptology EUROCRYPT99, pp. 223-238, Springer,1999.
C. Gentry, A fully homomorphic encryption scheme. PhD thesis, Stanford University, 2009.
DOI: https://doi.org/10.26483/ijarcs.v8i5.3209
Refbacks
- There are currently no refbacks.
Copyright (c) 2017 International Journal of Advanced Research in Computer Science

