IMPLEMENTING MULTILEVEL DATA SECURITY IN CLOUD COMPUTING
Abstract
Keywords
Full Text:
PDFReferences
REFERENCES
A. T. Velte, T. J. Velte, R. Elsenpeter, “Cloud Computing, A Practical approach” First Edition, 2009.
M. E. Whiteman, H. J. Mattord, "Principles of Information Security ,"Fourth Edition,Chapter-8.P.no-349-395.
N. Vurukonda, B. T. Rao, "A Study on Data Storage Security Issues in Cloud Computing," 877-0509 © 2016 DOI: 10.1016/j.procs.2016.07.335.
Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, “Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing,”IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 5, pp. 847–859, May 2011.
S. Kumar and R.Subramanian , “An Efficient and Secure Protocol for Ensuring Data Storage Security in Cloud Computing,” IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 6, No 1, November 2011.
Dr. S. A. Abbas, A. A. B. Maryoosh, “Improving Data Storage Security in Cloud Computing Using Elliptic Curve Cryptography,” Journal of Computer Engineering, Volume 17, Issue 4, Ver. I, PP 48-53 DOI: 10.9790/0661-17414853 (July – Aug. 2015).
K.Govinda, Dr. E. Sathiyamoorthy, "Identity Anonymization and Secure Data Storage using Group Signature in Private Cloud", Published by Elsevier Ltd., Procedia Technology, April, 2012.
Z .C. Nxumalo, P. Tarwireyi, M. O. Adigun," Towards Privacy with Tokenization as a Service," Department of Computer Science, University of Zululand ,Empangeni, South Africa IEEE-©2014.
S. Subashini, V. Kavitha -Anna University Tirunelveli, India,” A survey on security issues in service delivery models of cloud computing“ ELSEVIER- Journal of Network and Computer Applications Volume 34, Issue 1, January 2011, Pages 1–11.
Prof. S. R. Pardeshi, Prof. V. J. Pawar, Prof. K. D. Kharat," Enhancing Information Security in Cloud Computing Environment Using Cryptographic Techniques",
C. Modi, D. Patel, B. Borisaniya, H. Patel, A. Patel, and M. Rajarajan, “A survey of intrusion detection techniques in Cloud,” Journal of Network and Computer Applications, vol. 36, no. 1, pp. 42–57, Jan. 2013.
P. Gupta, A. Seetharaman, J. R. Raj, “The usage and adoption of cloud computing by small and medium businesses,” International Journal of Information Management, vol. 33, no. 5, pp. 861 – 874, 2013.
A. Chonka, Y. Xiang, W. Zhou, and A. Bonti, “Cloud security defense to protect cloud computing against HTTP-DoS and XML-DoS attacks, Journal of Network and Computer Applications, vol. 34, no. 4, pp. 1097 – 1107, 2011.
M. Alouane, H. E. Bakkali,"Security, Privacy and Trust in Cloud Computing: A Comparative Study" 00 ©2015 IEEE
M. P. Babitha, K. Remesh Babu," Secure Cloud Storage Using AES Encryption", (ICACDOT) ©2016 IEEE
S. Bugiel, S. Nürnberger, A. R. Sadeghi, and T. Schneider, “Twin clouds: An architecture for secure cloud computing,” in Workshop on Cryptography and Security in Clouds, WCSC, 2011, vol. 2011.
A.-R. Sadeghi, T. Schneider, and M. Winandy, “Token-Based Cloud Computing,” in Trust and Trustworthy Computing, vol. 6101, Eds. Springer Berlin Heidelberg, pp. 417–429, 2010.
U. Somani, K. Lakhani, and M. Mundra, “Implementing digital signature with RSA encryption algorithm to enhance the Data Security of cloud in Cloud Computing,” in Parallel Distributed and Grid Computing (PDGC), 1st International Conference on, pp-2010.
M. k. Sarakar, S. Kumar, "A Framework to Ensure Data Storage Security in Cloud Computing," IEEE 1–216, 2016.
H. Ziglari, S. Yaahiya," Deployment Models: Enhancing Security in Cloud Computing Environment," IEEE ©2016.
A. Albugmi, Madini , A. R. Walters and G. Wills," Data Security in Cloud Computing," IEEE ©2016.
M. Abdelhamid, PhD thesis, “Privacy-preserving Personal Information Management”, School of Computer Science, McGill University, Montreal, August 2009.
Y. Tabbii, I. Enjajjar, A. bankaddour," Security in Cloud Computing approaches and solutions," IEEE ©2014.
P. Garg, V. Sharma, "An Efficient and Secure Data Storage in Mobile Cloud Computing through RSA and Hash Function", IEEE ©2014.
M. Batra, A. Arora, "Implementing Data Security in Cloud Computing," International Journal of Advance Research in Computer Science and Management Studies Volume 4, Issue 6, pg. 213-218,ISSN: 2321-7782, June 2016.
Mr. V. Biksham, Dr. D. Vasumathi, "Query based computations on encrypted data through homomorphic encryption in cloud computing security," International Conference on Electrical, Electronics, and optimization Techniques (ICEEOT) ©2016.
S. Bollavarapu and B. Gupta, “Data Security in Cloud Computing”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 3, March 2014.
A. Kumar, H. Prasad, S. Chandra, "Homomorphic Token and Distributed Erasure-Code for cloud," International Journal of Research in Computer and Communication Technology, Vol 2, Issue 10, ISSN (Online) 2278- 5841, October- 2013.
DOI: https://doi.org/10.26483/ijarcs.v8i8.4636
Refbacks
- There are currently no refbacks.
Copyright (c) 2017 International Journal of Advanced Research in Computer Science

