메뉴 건너뛰기




Volumn 9, Issue 1, 2013, Pages 37-51

Data confidentiality using fragmentation in cloud computing

Author keywords

Cloud computing; Computing; Data confidentiality; Data fragmentation; Data management; Data outsourcing; Privacy preserving

Indexed keywords


EID: 84878829696     PISSN: 17427371     EISSN: 1742738X     Source Type: Journal    
DOI: 10.1108/17427371311315743     Document Type: Article
Times cited : (20)

References (31)
  • 2
    • 78149305944 scopus 로고    scopus 로고
    • available at:, (accessed May 1, 2012), Amazon
    • Amazon (2006), Amazon Elastic Compute Cloud (amazon ec2), available at: http://aws.amazon.com/ec2/ (accessed May 1, 2012).
    • (2006) Amazon Elastic Compute Cloud (Amazon ec2)
  • 4
    • 63649117166 scopus 로고    scopus 로고
    • Cloud computing and emerging it platforms: Vision, hype, and reality for delivering computing as the 5th utility
    • Buyya, R., Yeo, C.S., Venugopal, S., Broberg, J., Brandic, I. (2009), "Cloud computing and emerging it platforms: vision, hype, and reality for delivering computing as the 5th utility" in Future Gener. Comput. Syst., Vol. 25, No. 6, pp. 599-616.
    • (2009) Future Gener. Comput. Syst. , vol.25 , Issue.6 , pp. 599-616
    • Buyya, R.1    Yeo, C.S.2    Venugopal, S.3    Broberg, J.4    Brandic, I.5
  • 5
    • 79751511212 scopus 로고    scopus 로고
    • Tech. Report UCB/EECS-2010-5, EECS Department, University of California, Berkeley, CA
    • Chen, Y., Paxson, V., Katz, R.H. (2010), "Whats new about cloud computing security?", EECS Department, University of California, Berkeley, CA, Tech. Report UCB/EECS-2010-5.
    • (2010) Whats new about cloud computing security?
    • Chen, Y.1    Paxson, V.2    Katz, R.H.3
  • 7
    • 77955210832 scopus 로고    scopus 로고
    • Combining fragmentation and encryption to protect privacy in data storage
    • De Capitani Di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P
    • Ciriani, V., De Capitani Di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P. (2010), "Combining fragmentation and encryption to protect privacy in data storage" in ACM Trans. Inf. Syst. Secur., Vol. 13, No. 3, pp. 22:1-22:33.
    • (2010) ACM Trans. Inf. Syst. Secur. , vol.13 , Issue.3 , pp. 1-22
    • Ciriani, V.1
  • 8
    • 84866163270 scopus 로고    scopus 로고
    • Security issues in cloud computing
    • Curran, K., Carlin, S., Adams, M. (2011), "Security issues in cloud computing" in Elixir, Vol. 38, No. 1, pp. 4069-72.
    • (2011) Elixir , vol.38 , Issue.1 , pp. 4069-4072
    • Curran, K.1    Carlin, S.2    Adams, M.3
  • 10
    • 84878855647 scopus 로고
    • available at:, (accessed March 8, 2012), Center Electronic Privacy Information
    • Electronic Privacy Information Center (1972), The Code of Fair Information Practices, available at: www.epic.org/privacy/consumer (accessed March 8, 2012).
    • (1972) The Code of Fair Information Practices
  • 11
    • 77957936026 scopus 로고    scopus 로고
    • available at:, (accessed July 1, 2011), Google
    • Google (2008), "Google app engine", available at: http://code.google.com/appengine/ (accessed July 1, 2011).
    • (2008) Google app engine
  • 12
    • 74949093980 scopus 로고    scopus 로고
    • The cost of a cloud: Research problems in data center networks
    • Greenberg, A., Hamilton, J., Maltz, D.A., Patel, P. (2008), "The cost of a cloud: research problems in data center networks" in SIGCOMM Comput. Commun. Rev., Vol. 39, No. 1, pp. 68-73.
    • (2008) SIGCOMM Comput. Commun. Rev. , vol.39 , Issue.1 , pp. 68-73
    • Greenberg, A.1    Hamilton, J.2    Maltz, D.A.3    Patel, P.4
  • 13
  • 14
    • 84878849861 scopus 로고    scopus 로고
    • available at:, (accessed November 8, 2011), IBM
    • IBM (2011), IBM Smart Cloud, available at: www.ibm.com/cloud-computing/us/en/ (accessed November 8, 2011).
    • (2011) IBM Smart Cloud
  • 17
    • 70349309706 scopus 로고    scopus 로고
    • Data security in the world of cloud computing
    • Kaufman, L.M. (2009), "Data security in the world of cloud computing" in IEEE Security and Privacy, Vol. 7, No. 4, pp. 61-4.
    • (2009) IEEE Security and Privacy , vol.7 , Issue.4 , pp. 61-64
    • Kaufman, L.M.1
  • 18
    • 84878861010 scopus 로고    scopus 로고
    • available at:, (accessed May 8, 2012), Microsoft
    • Microsoft (2011), "Microsoft cloud", available at: www.microsoft.com/en us/cloud/default.aspx? fbid=K0xFa7eU XmQ (accessed May 8, 2012).
    • (2011) Microsoft cloud
  • 20
    • 84866253432 scopus 로고    scopus 로고
    • Aligning security and privacy to support the development of secure information systems, special issue security in information systems
    • Mouratidis, H., Kalloniatis, C., Islam, S., Philippe Huget, M., Gritzalis, S. (2012), "Aligning security and privacy to support the development of secure information systems, special issue security in information systems" in Journal of Universal Computer Science (JUCS), Vol. 18, No. 12, pp. 1608-27.
    • (2012) Journal of Universal Computer Science (JUCS) , vol.18 , Issue.12 , pp. 1608-1627
    • Mouratidis, H.1    Kalloniatis, C.2    Islam, S.3    Philippe Huget, M.4    Gritzalis, S.5
  • 22
    • 84878871861 scopus 로고    scopus 로고
    • available at:, (accessed October 14, 2012), Oracle
    • Oracle (2010), Oracle Cloud Computing White Paper, available at: www.oracle.com/us/technologies/cloud/oracle-cloud-computing-wp-076373.pdf (accessed October 14, 2012).
    • (2010) Oracle Cloud Computing White Paper
  • 23
    • 77954051808 scopus 로고    scopus 로고
    • The NIST definition of cloud computing (draft)
    • NIST Special Publication 800-145, National Institute of Standards and Technology, Gaithersburg, MD
    • Peter, M., Grance, T. (2011), "The NIST definition of cloud computing (draft)", National Institute of Standards and Technology, Gaithersburg, MD, NIST Special Publication 800-145.
    • (2011)
    • Peter, M.1    Grance, T.2
  • 25
    • 50249180682 scopus 로고
    • A note on storage fragmentation and program segmentation
    • Randell, B. (1969), "A note on storage fragmentation and program segmentation" in Communications of the ACM, Vol. 12, No. 4, pp. 365-9.
    • (1969) Communications of the ACM , vol.12 , Issue.4 , pp. 365-369
    • Randell, B.1
  • 26
    • 0027642008 scopus 로고
    • Efficient storage techniques for digital continuous multimedia
    • Rangan, P.V., Vin, H.M. (1993), "Efficient storage techniques for digital continuous multimedia" in IEEE Trans. Knowl. Data Eng., Vol. 5, No. 4, pp. 564-73.
    • (1993) IEEE Trans. Knowl. Data Eng. , vol.5 , Issue.4 , pp. 564-573
    • Rangan, P.V.1    Vin, H.M.2
  • 27
    • 78650065157 scopus 로고    scopus 로고
    • Security and privacy challenges in cloud computing environments
    • Takabi, H., Joshi, J.B.D., Ahn, G.-J. (2010), "Security and privacy challenges in cloud computing environments" in IEEE Security and Privacy, Vol. 8, No. 6, pp. 24-31.
    • (2010) IEEE Security and Privacy , vol.8 , Issue.6 , pp. 24-31
    • Takabi, H.1    Joshi, J.B.D.2    Ahn, G.-J.3
  • 30
    • 84878821547 scopus 로고    scopus 로고
    • available at:, (accessed July 8, 2012)
    • Widman, J. (2011), "10 massive security breaches", available at: www.informationweek.com/news/galleries/security/attacks/229300675 (accessed July 8, 2012).
    • (2011) 10 massive security breaches
    • Widman, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.