-
1
-
-
80051655205
-
A survey on cloud storage
-
J. JU, J. WU, J. FU, and Z. LIN, "A Survey on Cloud Storage," Journal of Computers, vol. 6. 2011
-
(2011)
Journal of Computers
, vol.6
-
-
Ju, J.1
Wu, J.2
Fu, J.3
Lin, Z.4
-
2
-
-
77958450169
-
Cloud storage as the infrastructure of cloud computing
-
J. Wu, L. Ping, X. Ge, W. Ya, and J. Fu, "Cloud storage as the infrastructure of Cloud Computing," in Proceedings-2010 International Conference on Intelligent Computing and Cognitive Informatics, ICICCI 2010, 2010, pp. 380-383
-
(2010)
Proceedings-2010 International Conference on Intelligent Computing and Cognitive Informatics, ICICCI 2010
, pp. 380-383
-
-
Wu, J.1
Ping, L.2
Ge, X.3
Ya, W.4
Fu, J.5
-
4
-
-
78649322624
-
A survey on security issues in service delivery models of cloud computing
-
Jan.
-
S. Subashini and V. Kavitha, "A survey on security issues in service delivery models of cloud computing," J. Netw. Comput. Appl. , vol. 34, no. 1, pp. 1-11, Jan. 2011
-
(2011)
J. Netw. Comput. Appl.
, vol.34
, Issue.1
, pp. 1-11
-
-
Subashini, S.1
Kavitha, V.2
-
5
-
-
79959557055
-
Addressing cloud computing security issues
-
Mar.
-
D. Zissis and D. Lekkas, "Addressing cloud computing security issues," Futur. Gener. Comput. Syst. , vol. 28, no. 3, pp. 583-592, Mar. 2012
-
(2012)
Futur. Gener. Comput. Syst.
, vol.28
, Issue.3
, pp. 583-592
-
-
Zissis, D.1
Lekkas, D.2
-
6
-
-
84893451886
-
-
November
-
M. T. Jones, "Anatomy of a cloud storage infrastructure Models , features , and internals," no. November, pp. 1-11, 2010
-
(2010)
Anatomy of A Cloud Storage Infrastructure Models , Features , and Internals
, pp. 1-11
-
-
Jones, M.T.1
-
7
-
-
85015946462
-
Data storage security in cloud computing and verification of metadata by encryption
-
V. S. Suntharam, K. V Reddy, and N. Puspalatha, "Data Storage Security in Cloud Computing and Verification of Metadata by Encryption," Int. J. Comput. Sci. Electron. Eng. , vol. 2, no. 3, 2013
-
(2013)
Int. J. Comput. Sci. Electron. Eng.
, vol.2
, Issue.3
-
-
Suntharam, V.S.1
Reddy, K.V.2
Puspalatha, N.3
-
8
-
-
84867459885
-
Improving information security management: An analysis of ID-password usage and a new login vulnerability measure
-
Oct.
-
Y. Bang, D.-J. Lee, Y.-S. Bae, and J.-H. Ahn, "Improving information security management: An analysis of ID-password usage and a new login vulnerability measure," Int. J. Inf. Manage. , vol. 32, no. 5, pp. 409-418, Oct. 2012
-
(2012)
Int. J. Inf. Manage.
, vol.32
, Issue.5
, pp. 409-418
-
-
Bang, Y.1
Lee, D.-J.2
Bae, Y.-S.3
Ahn, J.-H.4
-
9
-
-
84905241561
-
Toward a secure and usable cloud-based password manager for web browsers
-
Oct.
-
R. Zhao and C. Yue, "Toward a secure and usable cloud-based password manager for web browsers," Comput. Secur. , vol. 46, pp. 32-47, Oct. 2014
-
(2014)
Comput. Secur.
, vol.46
, pp. 32-47
-
-
Zhao, R.1
Yue, C.2
-
10
-
-
70449688216
-
Password cracking using probabilistic context-free grammars
-
M. Weir, S. Aggarwal, B. De Medeiros, and B. Glodek, "Password cracking using probabilistic context-free grammars," in Proceedings-IEEE Symposium on Security and Privacy, 2009, pp. 391-405
-
(2009)
Proceedings-IEEE Symposium on Security and Privacy
, pp. 391-405
-
-
Weir, M.1
Aggarwal, S.2
De Medeiros, B.3
Glodek, B.4
-
11
-
-
84865012140
-
Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms
-
P. G. Kelley, S. Komanduri, M. L. Mazurek, R. Shay, T. Vidas, L. Bauer, N. Christin, L. F. Cranor, and J. López, "Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms," in Proceedings-IEEE Symposium on Security and Privacy, 2012, pp. 523-537
-
(2012)
Proceedings-IEEE Symposium on Security and Privacy
, pp. 523-537
-
-
Kelley, P.G.1
Komanduri, S.2
Mazurek, M.L.3
Shay, R.4
Vidas, T.5
Bauer, L.6
Christin, N.7
Cranor, L.F.8
López, J.9
-
12
-
-
84861610379
-
A privacy preserving authorisation system for the cloud
-
D. W. Chadwick and K. Fatema, "A privacy preserving authorisation system for the cloud," in Journal of Computer and System Sciences, 2012, vol. 78, pp. 1359-1373
-
(2012)
Journal of Computer and System Sciences
, vol.78
, pp. 1359-1373
-
-
Chadwick, D.W.1
Fatema, K.2
-
13
-
-
84937839221
-
-
December
-
J. M. A. Calero, N. Edwards, J. Kirschnik, L. Wilcock, and M. Wray, "Toward a Multi-Tenancy Authorization System for Cloud Services," no. December, 2010
-
(2010)
Toward A Multi-Tenancy Authorization System for Cloud Services
-
-
Calero, J.M.A.1
Edwards, N.2
Kirschnik, J.3
Wilcock, L.4
Wray, M.5
-
14
-
-
84937830620
-
-
H. M. Al-sabri and S. M. Al-saleem, "Building a Cloud Storage Encryption ( CSE ) Architecture for Enhancing Cloud Security," vol. 10, no. 2, pp. 259-266, 2013
-
(2013)
Building A Cloud Storage Encryption ( CSE ) Architecture for Enhancing Cloud Security
, vol.10
, Issue.2
, pp. 259-266
-
-
Al-Sabri, H.M.1
Al-Saleem, S.M.2
-
17
-
-
84874109689
-
Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage
-
Jan.
-
D. Koo, J. Hur, and H. Yoon, "Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage," Comput. Electr. Eng. , vol. 39, no. 1, pp. 34-46, Jan. 2013
-
(2013)
Comput. Electr. Eng.
, vol.39
, Issue.1
, pp. 34-46
-
-
Koo, D.1
Hur, J.2
Yoon, H.3
-
18
-
-
84874187267
-
A dynamic cryptographic access control scheme in cloud storage services
-
R. Zhang and P. Chen, "A dynamic cryptographic access control scheme in cloud storage services," in Proceedings-2012 8th International Conference on Computing and Networking Technology (INC, ICCIS and ICMIC), ICCNT 2012, 2012, pp. 50-55
-
(2012)
Proceedings-2012 8th International Conference on Computing and Networking Technology (INC, ICCIS and ICMIC), ICCNT 2012
, pp. 50-55
-
-
Zhang, R.1
Chen, P.2
-
19
-
-
84865815069
-
K2C: Cryptographic cloud storage with lazy revocation and anonymous access
-
LNICST
-
S. Zarandioon, D. Yao, and V. Ganapathy, "K2C: Cryptographic cloud storage with lazy revocation and anonymous access," in Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, 2012, vol. 96 LNICST, pp. 59-76
-
(2012)
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering
, vol.96
, pp. 59-76
-
-
Zarandioon, S.1
Yao, D.2
Ganapathy, V.3
-
20
-
-
74049103479
-
PORs : Proofs of retrievability for large files
-
Alexandra, Virginia, USA
-
A. Juels and B. S. K. Jr, "PORs : Proofs of Retrievability for Large Files," CCS '07, Alexandra, Virginia, USA, pp. 584-597, 2007
-
(2007)
CCS '07
, pp. 584-597
-
-
Juels, A.1
-
21
-
-
74049102823
-
Provable data possession at untrusted stores
-
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, "Provable data possession at untrusted stores," Proc. 14th ACM Conf. Comput. Commun. Secur.-CCS '07, no. 1, p. 598, 2007
-
(2007)
Proc. 14th ACM Conf. Comput. Commun. Secur.-CCS '07
, Issue.1
, pp. 598
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
22
-
-
74049095755
-
Compact proofs of retrievability
-
Springer Berlin Heidelberg.
-
H. Shacham, "Compact Proofs of Retrievability," Adv. Cryptology-ASIACRYPT 2008, Springer Berlin Heidelberg. , pp. 90-107, 2006
-
(2006)
Adv. Cryptology-ASIACRYPT 2008
, pp. 90-107
-
-
Shacham, H.1
-
23
-
-
74049144464
-
HAIL : A high-availability and integrity layer for cloud storage
-
K. D. Bowers, A. Juels, and A. Oprea, "HAIL : A High-Availability and Integrity Layer for Cloud Storage," in CCS, 2009, vol. 489, pp. 187-198
-
(2009)
CCS
, vol.489
, pp. 187-198
-
-
Bowers, K.D.1
Juels, A.2
Oprea, A.3
-
24
-
-
84885645897
-
Using algebraic signatures to check data possession in cloud storage
-
Sep.
-
L. Chen, "Using algebraic signatures to check data possession in cloud storage," Futur. Gener. Comput. Syst. , vol. 29, no. 7, pp. 1709-1715, Sep. 2013
-
(2013)
Futur. Gener. Comput. Syst.
, vol.29
, Issue.7
, pp. 1709-1715
-
-
Chen, L.1
-
25
-
-
84905266159
-
Improved security of a dynamic remote data possession checking protocol for cloud storage
-
Dec.
-
Y. Yu, J. Ni, M. H. Au, H. Liu, H. Wang, and C. Xu, "Improved security of a dynamic remote data possession checking protocol for cloud storage," Expert Syst. Appl. , vol. 41, no. 17, pp. 7789-7796, Dec. 2014
-
(2014)
Expert Syst. Appl.
, vol.41
, Issue.17
, pp. 7789-7796
-
-
Yu, Y.1
Ni, J.2
Au, M.H.3
Liu, H.4
Wang, H.5
Xu, C.6
-
26
-
-
79953294892
-
Enabling public auditability and data dynamics for storage security in cloud computing
-
Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, "Enabling public auditability and data dynamics for storage security in cloud computing," IEEE Trans. Parallel Distrib. Syst. , vol. 22, pp. 847-859, 2011
-
(2011)
IEEE Trans. Parallel Distrib. Syst.
, vol.22
, pp. 847-859
-
-
Wang, Q.1
Wang, C.2
Ren, K.3
Lou, W.4
Li, J.5
-
27
-
-
79959325063
-
Dynamic audit services for integrity verification of outsourced storages in clouds
-
Y. Zhu, H. Wang, Z. Hu, G.-J. Ahn, H. Hu, and S. S. Yau, "Dynamic audit services for integrity verification of outsourced storages in clouds," Proc. 2011 ACM Symp. Appl. Comput.-SAC '11, p. 1550, 2011
-
(2011)
Proc. 2011 ACM Symp. Appl. Comput.-SAC '11
, pp. 1550
-
-
Zhu, Y.1
Wang, H.2
Hu, Z.3
Ahn, G.-J.4
Hu, H.5
Yau, S.S.6
-
28
-
-
84889087663
-
Security and privacy for storage and computation in cloud computing
-
Feb.
-
L. Wei, H. Zhu, Z. Cao, X. Dong, W. Jia, Y. Chen, and A. V. Vasilakos, "Security and privacy for storage and computation in cloud computing," Inf. Sci. (Ny). , vol. 258, pp. 371-386, Feb. 2014
-
(2014)
Inf. Sci. (Ny).
, vol.258
, pp. 371-386
-
-
Wei, L.1
Zhu, H.2
Cao, Z.3
Dong, X.4
Jia, W.5
Chen, Y.6
Vasilakos, A.V.7
-
29
-
-
84866619747
-
Secure overlay cloud storage with access control and assured deletion
-
Y. Tang, P. P. C. Lee, J. C. S. Lui, and R. Perlman, "Secure overlay cloud storage with access control and assured deletion," IEEE Trans. Dependable Secur. Comput. , vol. 9, pp. 903-916, 2012
-
(2012)
IEEE Trans. Dependable Secur. Comput.
, vol.9
, pp. 903-916
-
-
Tang, Y.1
Lee, P.P.C.2
Lui, J.C.S.3
Perlman, R.4
-
30
-
-
84874249821
-
Accountability for cloud and other future Internet services
-
Dec.
-
S. Pearson, V. Tountopoulos, D. Catteddu, M. Sudholt, R. Molva, C. Reich, S. Fischer-Hubner, C. Millard, V. Lotz, M. G. Jaatun, R. Leenes, C. Rong, and J. Lopez, "Accountability for cloud and other future Internet services," 4th IEEE Int. Conf. Cloud Comput. Technol. Sci. Proc. , pp. 629-632, Dec. 2012
-
(2012)
4th IEEE Int. Conf. Cloud Comput. Technol. Sci. Proc.
, pp. 629-632
-
-
Pearson, S.1
Tountopoulos, V.2
Catteddu, D.3
Sudholt, M.4
Molva, R.5
Reich, C.6
Fischer-Hubner, S.7
Millard, C.8
Lotz, V.9
Jaatun, M.G.10
Leenes, R.11
Rong, C.12
Lopez, J.13
-
31
-
-
78650777991
-
-
August 2010
-
R. N. Calheiros, R. Ranjan, A. Beloglazov, and A. F. De Rose, "CloudSim : A toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms," no. August 2010, pp. 23-50, 2011
-
(2011)
CloudSim : A Toolkit for Modeling and Simulation of Cloud Computing Environments and Evaluation of Resource Provisioning Algorithms
, pp. 23-50
-
-
Calheiros, R.N.1
Ranjan, R.2
Beloglazov, A.3
De Rose, A.F.4
-
32
-
-
82655182931
-
Windows azure storage : A highly available cloud storage service with strong consistency
-
B. Calder, J. Wang, A. Ogus, N. Nilakantan, A. Skjolsvold, S. Mckelvie, Y. Xu, S. Srivastav, J. Wu, H. Simitci, J. Haridas, C. Uddaraju, H. Khatri, A. Edwards, V. Bedekar, S. Mainali, R. Abbasi, A. Agarwal, M. Fahim, M. Ikram, D. Bhardwaj, S. Dayanand, A. Adusumilli, M. Mcnett, S. Sankaran, K. Manivannan, and L. Rigas, "Windows Azure Storage : A Highly Available Cloud Storage Service with Strong Consistency," SOSP, vol. 20, pp. 143-157, 2011.
-
(2011)
SOSP
, vol.20
, pp. 143-157
-
-
Calder, B.1
Wang, J.2
Ogus, A.3
Nilakantan, N.4
Skjolsvold, A.5
McKelvie, S.6
Xu, Y.7
Srivastav, S.8
Wu, J.9
Simitci, H.10
Haridas, J.11
Uddaraju, C.12
Khatri, H.13
Edwards, A.14
Bedekar, V.15
Mainali, S.16
Abbasi, R.17
Agarwal, A.18
Fahim, M.19
Ikram, M.20
Bhardwaj, D.21
Dayanand, S.22
Adusumilli, A.23
McNett, M.24
Sankaran, S.25
Manivannan, K.26
Rigas, L.27
more..
|