메뉴 건너뛰기




Volumn , Issue , 2011, Pages 619-624

A secured cost-effective multi-cloud storage in cloud computing

Author keywords

Cloud computing; cloud service provider; cost effective; customer; security; storage

Indexed keywords

CLOUD DATA; CLOUD SERVICE PROVIDER; COST-EFFECTIVE; CUSTOMER; DATA AVAILABILITY; DATA BLOCKS; PARADIGM SHIFTS; PAY-PER-USE; SECURE STORAGE; SECURITY; SECURITY ISSUES; SERVICE BUSINESS; THRESHOLD NUMBERS;

EID: 79960567871     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOMW.2011.5928887     Document Type: Conference Paper
Times cited : (75)

References (19)
  • 8
    • 78149428615 scopus 로고    scopus 로고
    • March
    • The Official Google Blog, "A new approach to China: an update", online at http://googleblog.blogspot.com/2010/03/new-approach-to-chinaupdate. html, March 2010.
    • (2010) A new approach to China: An update
  • 13
    • 77953309043 scopus 로고    scopus 로고
    • processor breach may b.html, Jan
    • B. Krebs, "Payment Processor Breach May Be Largest Ever", Online at http://voices.washingtonpost.com/securityfix/2009/01/payment processor breach may b.html, Jan, 2009.
    • (2009) Payment Processor Breach May Be Largest Ever
    • Krebs, B.1
  • 14
    • 84969931080 scopus 로고    scopus 로고
    • On the impossibility of cryptography alone for privacy-preserving cloud computing
    • M. Dijk, A. Juels, "On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing", HotSec 2010.
    • (2010) HotSec
    • Dijk, M.1    Juels, A.2
  • 17
    • 0018545449 scopus 로고
    • How to share a secret
    • November
    • A. Shamir, "How to share a secret", Commun. ACM 22, 11(November 1979).
    • (1979) Commun. ACM , vol.22 , pp. 11
    • Shamir, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.