Security Enhancement for Data Migration in the Cloud
暂无分享,去创建一个
[1] S. Balamurugan,et al. ESSAO: Enhanced Security Service Algorithm using Data Obfuscation Technique to Protect Data in Public Cloud Storage , 2016 .
[2] Jayesh Patel,et al. EncryScation: A novel framework for cloud IaaS, DaaS security using encryption and Obfuscation techniques , 2015, 2015 5th Nirma University International Conference on Engineering (NUiCONE).
[3] Prashant Pandey,et al. Cloud computing , 2010, ICWET.
[4] Vinod Kumar,et al. Secured user's authentication and private data storage- access scheme in cloud computing using Elliptic curve cryptography , 2015, 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom).
[5] Kheng Kok Mar,et al. Secure personal cloud storage , 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST).
[6] Mingqiang Li. On the Confidentiality of Information Dispersal Algorithms and Their Erasure Codes , 2012, ArXiv.
[7] Michael O. Rabin,et al. Efficient dispersal of information for security, load balancing, and fault tolerance , 1989, JACM.
[8] Shruti Gupta,et al. Enhancement of security mechanism for confidential data using AES-128, 192 and 256bit encryption in cloud , 2015, 2015 1st International Conference on Next Generation Computing Technologies (NGCT).
[9] Tadashi Minowa,et al. Secure Distributed Storage for Bulk Data , 2012, ICONIP.
[10] L. Arockiam,et al. Efficient cloud storage confidentiality to ensure data security , 2014, 2014 International Conference on Computer Communication and Informatics.
[11] Rahul Kamble,et al. Framework for client side AES encryption technique in cloud computing , 2015, 2015 IEEE International Advance Computing Conference (IACC).
[12] G. Manikandan,et al. A few new approaches for data masking , 2015, 2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015].
[13] Somayyeh Gholizadeh,et al. A 3-level re-encryption model to ensure data protection in cloud computing environments , 2014, 2014 IEEE Conference on Systems, Process and Control (ICSPC 2014).
[14] Debasish Jena,et al. Securing Files in the Cloud , 2016, 2016 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM).
[15] Xuesong Zhang,et al. Study on the Use of IDAs in Cloud Storage , 2013, BIC-TA.
[16] William Stallings,et al. Cryptography and network security - principles and practice (3. ed.) , 2014 .