메뉴 건너뛰기




Volumn , Issue , 2015, Pages

A novel security model for cloud using trusted third party encryption

Author keywords

cloud computing; data security model; encryption in cloud computing; third party

Indexed keywords

CLOUD COMPUTING; CRYPTOGRAPHY; DISTRIBUTED DATABASE SYSTEMS; EMBEDDED SYSTEMS; TRUSTED COMPUTING;

EID: 84957015713     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICIIECS.2015.7193199     Document Type: Conference Paper
Times cited : (13)

References (15)
  • 1
    • 80055122520 scopus 로고    scopus 로고
    • Ensuring data security security through a novel third party auditor scheme in cloud computing
    • Shuai Han, Jianchuan Xing, "Ensuring data security security through a novel third party auditor scheme in cloud computing", Proceedings of IEEE CCIS2011
    • Proceedings of IEEE CCIS2011
    • Han, S.1    Xing, J.2
  • 2
    • 84956992725 scopus 로고    scopus 로고
    • http://en. wikipedia.org/wiki/Cloud-computing
  • 3
    • 84957018522 scopus 로고    scopus 로고
    • http://www.cloud-lounge.org/how-do-clouds-work.html
  • 4
    • 84956977488 scopus 로고    scopus 로고
    • http://thoughtsoncloud.com/2014/02/top-7-most-commonuses-of-cloud-computing/
  • 14
    • 84957012788 scopus 로고    scopus 로고
    • Figure Retrieved from
    • Figure Retrieved from http://en. wikipedia.org/wiki/Cloud-computing
  • 15
    • 84861959172 scopus 로고    scopus 로고
    • Privacy-preserving public auditing for secure cloud storage
    • December
    • Cong Wang, Sherman S.-M. , Qian Wang, Kui Ren, Wenjing Lou, "Privacy-Preserving Public Auditing for Secure Cloud Storage", IEEE Transactions on Computers, Volume:62, Issue: 2, December 2011, pp. 362-375. ISSN: 0018-9340
    • (2011) IEEE Transactions on Computers , vol.62 , Issue.2 , pp. 362-375
    • Wang, C.1    Sherman, S.-M.2    Wang, Q.3    Ren, K.4    Lou, W.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.