-
1
-
-
84966457078
-
Building trust and confidentiality in cloud computing distributed data storage
-
March
-
Uegebe Ikechukwu Valentine and Omenka Ugochukwu Enyinna," Building Trust and Confidentiality in Cloud computing Distributed Data Storage", West African Journal of Industrial & Academic Research, Vol. 6 No. 1 March 2013, pp78-83.
-
(2013)
West African Journal of Industrial & Academic Research
, vol.6
, Issue.1
, pp. 78-83
-
-
Valentine, U.I.1
Enyinna, O.U.2
-
2
-
-
79951609863
-
A view about cloud data security from data life cycle
-
Dec.
-
Xiaojun Yu, Qiaoyan Wen, "A View about Cloud Data Security from Data Life Cycle", International Conference on Computational Intelligence and Software Engineering (CiSE), IEEE, Dec 2010, pp 1-4.
-
(2010)
International Conference on Computational Intelligence and Software Engineering (CiSE), IEEE
, pp. 1-4
-
-
Yu, X.1
Wen, Q.2
-
4
-
-
78449282660
-
Security architecture for cloud computing
-
October
-
Masayuki Okuhara et al, "Security Architecture for Cloud Computing", FUJITSU Sci. Tech. J., Vol. 46, No. 4, October 2010, pp. 397-402.
-
(2010)
FUJITSU Sci. Tech. J.
, vol.46
, Issue.4
, pp. 397-402
-
-
Okuhara, M.1
-
5
-
-
84878003586
-
Database management system as a cloud service
-
June
-
Yvette E. Gelogo and Sunguk Lee," Database Management System as a Cloud Service, International Journal of Future Generation Communication and Networking Vol. 5, No. 2, June 2012, pp 71-76.
-
(2012)
International Journal of Future Generation Communication and Networking
, vol.5
, Issue.2
, pp. 71-76
-
-
Gelogo, Y.E.1
Lee, S.2
-
6
-
-
84911433675
-
Securing data storage in cloud computing
-
June
-
Hyun-Suk Yu, Yvette E. Gelogo, Kyung Jung Kim, "Securing Data Storage in Cloud Computing", Security Engineering Research Institute (Journal of Security Engineering), No. 9, No. 3, June 2012, pp 251-260.
-
(2012)
Security Engineering Research Institute (Journal of Security Engineering)
, vol.9
, Issue.3
, pp. 251-260
-
-
Yu, H.-S.1
Gelogo, Y.E.2
Kim, K.J.3
-
7
-
-
84878414071
-
A proposed model for enhancing data storage security in cloud computing systems
-
June
-
Nashaat el-Khameesy, Hossam Abdel Rahman," A Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems", Journal of Emerging Trends in Computing and Information Sciences, VOL. 3, NO. 6, June 2012, pp 970-974.
-
(2012)
Journal of Emerging Trends in Computing and Information Sciences
, vol.3
, Issue.6
, pp. 970-974
-
-
El-Khameesy, N.1
Rahman, H.A.2
-
8
-
-
84911382245
-
Data storage security in cloud using metadata
-
Kuala Lumpur (Malaysia), August
-
R. Anitha, P. Pradeepan, P. Yogesh, and Saswati Mukherjee, "Data Storage Security in Cloud using Metadata", 2nd International Conference on Machine Learning and Computer Science(IMLCS'2013), Kuala Lumpur (Malaysia), August 2013, pp 26-30.
-
(2013)
2nd International Conference on Machine Learning and Computer Science(IMLCS'2013)
, pp. 26-30
-
-
Anitha, R.1
Pradeepan, P.2
Yogesh, P.3
Mukherjee, S.4
-
9
-
-
84903608465
-
CP-ABE based encryption for secured cloud storage access
-
September
-
B. Raja Sekhar, B. Sunil Kumar, L. Swathi Reddy, and V. Poorna Chandar "CP-ABE Based Encryption for Secured Cloud Storage Access", International Journal of Scientific & Engineering Research, Volume 3, Issue 9, September 2012, pp 1-5.
-
(2012)
International Journal of Scientific & Engineering Research
, vol.3
, Issue.9
, pp. 1-5
-
-
Raja Sekhar, B.1
Sunil Kumar, B.2
Swathi Reddy, L.3
Poorna Chandar, V.4
-
10
-
-
70449569012
-
Ensuring data storage security in cloud computing
-
July
-
Cong Wang, Qian Wang, Kui Ren, and Wenjing Lou, "Ensuring Data Storage Security in Cloud Computing", 17th International Workshop on Quality of Service, IEEE, IWQoS, July 2009, pp 1-9.
-
(2009)
17th International Workshop on Quality of Service, IEEE, IWQoS
, pp. 1-9
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
11
-
-
84898429924
-
Survey paper on security & privacy issues in cloud storage systems
-
April
-
Anup Mathew, "Survey Paper on Security & Privacy Issues in Cloud Storage Systems", EECE, Term Survey Paper, April 2012, pp 1-13.
-
(2012)
EECE, Term Survey Paper
, pp. 1-13
-
-
Mathew, A.1
-
12
-
-
79955969463
-
Depot: Cloud storage with minimal trust
-
Prince Mahajan, Srinath Setty, Sangmin Lee, Allen Clement, Lorenzo Alvisi, Mike Dahlin, and Michael Walfish, "Depot: Cloud storage with minimal trust", 9th USENIX Symposium on Operating System Design and Implementation, 2010, pp 1-26.
-
(2010)
9th USENIX Symposium on Operating System Design and Implementation
, pp. 1-26
-
-
Mahajan, P.1
Setty, S.2
Lee, S.3
Clement, A.4
Alvisi, L.5
Dahlin, M.6
Walfish, M.7
-
13
-
-
80955144922
-
Enabling security in cloud storage SLAs with cloudproof
-
Raluca Ada Popa, Jacob R. Lorch, David Molnar, Helen J. Wang, and Li Zhuang, "Enabling Security in Cloud Storage SLAs with CloudProof", USENIX Annual Technical Conference, 2011, pp 1-12.
-
(2011)
USENIX Annual Technical Conference
, pp. 1-12
-
-
Popa, R.A.1
Lorch, J.R.2
Molnar, D.3
Wang, H.J.4
Zhuang, L.5
-
14
-
-
77949842100
-
-
O'Reilly Media, Inc., chapter 4, September
-
Tim Mather, Subra Kumaraswamy, and Shahed Latif, "Cloud Security and Privacy", O'Reilly Media, Inc., chapter 4, September 2009, pp 61-71.
-
(2009)
Cloud Security and Privacy
, pp. 61-71
-
-
Mather, T.1
Kumaraswamy, S.2
Latif, S.3
-
15
-
-
84911446820
-
Data security and privacy in cloud storage using hybrid symmetric encryption algorithm
-
August
-
Dr. L. Arockiam, S. Monikandan, "Data Security and Privacy in Cloud Storage using Hybrid Symmetric Encryption Algorithm", International Journal of Advanced Research in Computer and Communication Engineering, Vol. 2, Issue 8, August 2013, pp 3064-3070.
-
(2013)
International Journal of Advanced Research in Computer and Communication Engineering
, vol.2
, Issue.8
, pp. 3064-3070
-
-
Arockiam, L.1
Monikandan, S.2
-
16
-
-
77956137294
-
-
IFCA/LNCS 6054, Springer-verlag, Berlin Heidelberg
-
S Kamara, K Lauter, "Cryptographic Cloud Storage", IFCA/LNCS 6054, Springer-verlag, Berlin Heidelberg, 2010, pp 136-149.
-
(2010)
Cryptographic Cloud Storage
, pp. 136-149
-
-
Kamara, S.1
Lauter, K.2
|