Chaotic NHCP: Building an Efficient Secure Framework for Cloud Computing Environment Based on Chaos Theory
暂无分享,去创建一个
[1] Omkhar Arasaratnam,et al. Introduction to Cloud Computing , 2011 .
[2] S. Balamurali,et al. Performance Analysis of Classifier Models to Predict Diabetes Mellitus , 2015 .
[3] V. Suma,et al. An Efficient Approach to Enhance Data Security in Cloud Using Recursive Blowfish Algorithm , 2014 .
[4] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[5] Fahd M. Al-Dosari,et al. A Secure Cloud Computing Model based on Data Classification , 2015, ANT/SEIT.
[6] Ting Peng,et al. Secure and Efficient Cloud Data Deduplication Supporting Dynamic Data Public Auditing , 2018, Int. J. Netw. Secur..
[7] Anantha Chandrakasan,et al. JouleTrack: a web based tool for software energy profiling , 2001, DAC '01.
[8] S. Manikandan,et al. Enhanced security for multi-cloud storage using cryptographic data splitting with dynamic approach , 2014, 2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies.
[9] Mostafa Belkasmi,et al. Applying Encryption Algorithm for Data Security in Cloud Storage , 2015, UNet.
[10] Nagesh Kumar,et al. DES, AES and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysis , 2011 .
[11] Khalid M. Hosny,et al. AN IMPROVED SECURITY SCHEMA FOR MOBILE CLOUD COMPUTING USING HYBRID CRYPTOGRAPHIC ALGORITHMS , 2018 .
[12] M. Sulochana,et al. Preserving Data Confidentiality Using Multi-cloud Architecture , 2015 .
[13] Fatiha Merazka,et al. Speech encryption based on hybrid chaotic key generator for AMR-WB G.722.2 codec , 2017, 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST).
[14] Anshu Parashar,et al. Secure User Data in Cloud Computing Using Encryption Algorithms , 2013 .
[15] Pratap Chandra Mandal,et al. Superiority of Blowfish Algorithm , 2012 .
[16] Chonho Lee,et al. A survey of mobile cloud computing: architecture, applications, and approaches , 2013, Wirel. Commun. Mob. Comput..
[17] Alan O. Freier,et al. Internet Engineering Task Force (ietf) the Secure Sockets Layer (ssl) Protocol Version 3.0 , 2022 .
[18] Deepak H. Sharma,et al. Homomorphic Encryption for Security of Cloud Data , 2016 .
[19] Nandita Sengupta,et al. Contriving Hybrid DESCAST Algorithm for Cloud Security , 2015 .
[20] Said E. El-Khamy,et al. Classification of multi-user chirp modulation signals using higher order cumulant features and four types of classifiers , 2011, 2011 28th National Radio Science Conference (NRSC).
[21] P. Vijaya Bharati,et al. Data Storage Security in Cloud Using a Functional Encryption Algorithm , 2016 .
[22] Klaus Hansen,et al. On the Efficiency of Fast RSA Variants in Modern Mobile Phones , 2010, ArXiv.
[23] Ashwin Machanavajjhala,et al. Blowfish privacy: tuning privacy-utility trade-offs using policies , 2013, SIGMOD Conference.
[24] Jean-Pierre Deschamps,et al. Modular Multiplication and Exponentiation Architectures for Fast RSA Cryptosystem Based on Digit Serial Computation , 2011, IEEE Transactions on Industrial Electronics.
[25] Guangchun Luo,et al. An Image Encryption Scheme Based on The Three-dimensional Chaotic Logistic Map , 2019, Int. J. Netw. Secur..
[26] Syam Kumar,et al. An Efficient and Secure Protocol for Ensuring Data Storage Security in Cloud Computing , 2011 .
[27] William Stallings,et al. Cryptography and network security - principles and practice (3. ed.) , 2014 .
[28] Latha Tamilselvan,et al. Encryption for Massive Data Storage in Cloud , 2015 .
[29] Fahad Saeed,et al. A New Cryptography Algorithm to Protect Cloud-Based Healthcare Services , 2017, 2017 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE).
[30] Priyadarshini Patila,et al. A Comprehensive Evaluation of Cryptographic Algorithms : DES , 3 DES , AES , RSA and Blowfish , 2016 .
[31] Tzonelih Hwang,et al. On the traceability on RSA-based partially signature with low computation , 2005, Appl. Math. Comput..
[32] Min-Shiang Hwang,et al. A Survey of Public Auditing for Secure Data Storage in Cloud Computing , 2016, Int. J. Netw. Secur..
[33] Junbeom Hur,et al. Improving Security and Efficiency in Attribute-Based Data Sharing , 2013, IEEE Transactions on Knowledge and Data Engineering.
[34] Sagar Naik,et al. Software implementation strategies for power-conscious systems , 1999, Mobile Networks and Computing.
[35] Dan Dragomir,et al. Measuring the performance and energy consumption of AES in wireless sensor networks , 2015, 2015 Federated Conference on Computer Science and Information Systems (FedCSIS).
[36] Zhengquan Xu,et al. A secure re‐encryption scheme for data services in a cloud computing environment , 2015, Concurr. Comput. Pract. Exp..
[37] L. Chua,et al. Chaos: A tutorial for engineers , 1987, Proceedings of the IEEE.
[38] Mohit Bhansali,et al. Enhancing Cloud Computing Security using AES Algorithm , 2013 .
[39] Dimitrios Zissis,et al. Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..
[40] Jaime Raigoza,et al. Evaluating Performance of Symmetric Encryption Algorithms , 2016, 2016 International Conference on Computational Science and Computational Intelligence (CSCI).
[41] Subhadra Sahoo,et al. An Optimized Encryption Technique using an Arbitrary Matrix with Probabilistic Encryption , 2015 .
[42] Tiegang Gao,et al. Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data by Chaos Based Arithmetic Coding and Confusion , 2019, Int. J. Netw. Secur..
[43] Anil Kumar,et al. Overview of Information Security Using Genetic Algorithm and Chaos , 2009, Inf. Secur. J. A Glob. Perspect..
[44] André L. M. dos Santos,et al. Implementation of fast RSA key generation on smart cards , 2002, SAC '02.
[45] Mohey M. Hadhoud,et al. Evaluating the Effects of Symmetric Cryptography Algorithms on Power Consumption for Different Data Types , 2010, Int. J. Netw. Secur..
[46] Guangchun Luo,et al. A Novel Scheme for the Preview of the Image Encryption Based on Chaotic Ikeda Map , 2018, Int. J. Netw. Secur..
[47] Abdellah Ezzati,et al. Fast Cloud-RSA Scheme for Promoting Data Confidentiality in the Cloud Computing , 2017, EUSPN/ICTH.
[48] Rajkumar Buyya,et al. CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms , 2011, Softw. Pract. Exp..
[49] Sushil Kumar Saroj,et al. A New Security Framework for Cloud Data , 2018 .