메뉴 건너뛰기




Volumn 2014, Issue , 2014, Pages

Data Security and Privacy in Cloud Computing

Author keywords

[No Author keywords available]

Indexed keywords

CLOUD COMPUTING; DATA PRIVACY; HARDWARE; HARDWARE SECURITY; MOBILE SECURITY;

EID: 84935007320     PISSN: 15501329     EISSN: 15501477     Source Type: Journal    
DOI: 10.1155/2014/190903     Document Type: Review
Times cited : (216)

References (55)
  • 1
    • 59849089966 scopus 로고    scopus 로고
    • Is cloud computing really ready for prime time?
    • N. Leavitt, "Is cloud computing really ready for prime time?" Computer, vol. 42, no. 1, pp. 15-25, 2009.
    • (2009) Computer , vol.42 , Issue.1 , pp. 15-25
    • Leavitt, N.1
  • 5
    • 84877272118 scopus 로고    scopus 로고
    • Security and privacy in cloud computing
    • Z. Xiao and Y. Xiao, "Security and privacy in cloud computing", IEEE Communications Surveys & Tutorials, vol. 15, no. 2, pp. 843-859, 2013.
    • (2013) IEEE Communications Surveys & Tutorials , vol.15 , Issue.2 , pp. 843-859
    • Xiao, Z.1    Xiao, Y.2
  • 6
    • 84874224563 scopus 로고    scopus 로고
    • Privacy and security issues in cloud computing: The role of institutions and institutional evolution
    • N. Kshetri, "Privacy and security issues in cloud computing: the role of institutions and institutional evolution", Telecommunications Policy, vol. 37, no. 4-5, pp. 372-386, 2013.
    • (2013) Telecommunications Policy , vol.37 , Issue.4-5 , pp. 372-386
    • Kshetri, N.1
  • 7
    • 84899798215 scopus 로고    scopus 로고
    • Cloud computing risk assessment: A systematic literature review
    • Springer, Berlin, Germany
    • R. Latif, H. Abbas, S. Assar, and Q. Ali, "Cloud computing risk assessment: a systematic literature review", in Future Information Technology, pp. 285-295, Springer, Berlin, Germany, 2014.
    • (2014) Future Information Technology , pp. 285-295
    • Latif, R.1    Abbas, H.2    Assar, S.3    Ali, Q.4
  • 15
    • 84857170570 scopus 로고    scopus 로고
    • Emerging security challenges in cloud computing: An insight to cloud security challenges and their mitigation
    • IEEE, December
    • A. Behl, "Emerging security challenges in cloud computing: an insight to cloud security challenges and their mitigation", in Proceedings of the World Congress on Information and Communication Technologies (WICT'11), pp. 217-222, IEEE, December 2011.
    • (2011) Proceedings of the World Congress on Information and Communication Technologies (WICT'11) , pp. 217-222
    • Behl, A.1
  • 23
    • 84947778144 scopus 로고    scopus 로고
    • The decision Diffie-Hellman problem
    • Springer
    • D. Boneh, "The decision Diffie-Hellman problem", in Algorithmic Number Theory, vol. 1423, pp. 48-63, Springer, 1998.
    • (1998) Algorithmic Number Theory , vol.1423 , pp. 48-63
    • Boneh, D.1
  • 43
    • 67650320950 scopus 로고    scopus 로고
    • A survey of computational location privacy
    • J. Krumm, "A survey of computational location privacy", Personal and Ubiquitous Computing, vol. 13, no. 6, pp. 391-399, 2009.
    • (2009) Personal and Ubiquitous Computing , vol.13 , Issue.6 , pp. 391-399
    • Krumm, J.1
  • 46
    • 77953614890 scopus 로고    scopus 로고
    • Identifying the security risks associated with governmental use of cloud computing
    • S. Paquette, P. T. Jaeger, and S. C. Wilson, "Identifying the security risks associated with governmental use of cloud computing", Government Information Quarterly, vol. 27, no. 3, pp. 245-253, 2010.
    • (2010) Government Information Quarterly , vol.27 , Issue.3 , pp. 245-253
    • Paquette, S.1    Jaeger, P.T.2    Wilson, S.C.3
  • 47
    • 78649322624 scopus 로고    scopus 로고
    • A survey on security issues in service delivery models of cloud
    • S. Subashini and V. Kavitha, "A survey on security issues in service delivery models of cloud", Journal of Network and Computer Applications, vol. 34, no. 1, pp. 1-11, 2011.
    • (2011) Journal of Network and Computer Applications , vol.34 , Issue.1 , pp. 1-11
    • Subashini, S.1    Kavitha, V.2
  • 48
    • 82455221304 scopus 로고    scopus 로고
    • A cloud you can trust
    • C. Cachin and M. Schunter, "A cloud you can trust", IEEE Spectrum, vol. 48, no. 12, pp. 28-51, 2011.
    • (2011) IEEE Spectrum , vol.48 , Issue.12 , pp. 28-51
    • Cachin, C.1    Schunter, M.2
  • 55
    • 77956356055 scopus 로고    scopus 로고
    • Trusted cloud computing with secure resources and data coloring
    • K. Hwang and D. Li, "Trusted cloud computing with secure resources and data coloring", IEEE Internet Computing, vol. 14, no. 5, pp. 14-22, 2010.
    • (2010) IEEE Internet Computing , vol.14 , Issue.5 , pp. 14-22
    • Hwang, K.1    Li, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.