A symmetric-based framework for securing cloud data at rest
暂无分享,去创建一个
[1] Jin Li,et al. A Hybrid Cloud Approach for Secure Authorized Deduplication , 2015, IEEE Transactions on Parallel and Distributed Systems.
[2] Prerna Agarwal,et al. Issues and challenges of data security in a cloud computing environment , 2017, 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON).
[3] Dimitrios Zissis,et al. Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..
[4] S. Monikandan,et al. Data Security and Privacy in Cloud Storage using Hybrid Symmetric Encryption Algorithm , 2013 .
[5] S. Manikandan,et al. Enhanced security for multi-cloud storage using cryptographic data splitting with dynamic approach , 2014, 2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies.
[6] Sushil Kumar Saroj,et al. A New Security Framework for Cloud Data , 2018 .
[7] Guruh Fajar Shidik,et al. Design and implementation of self encryption method on file security , 2017, 2017 International Seminar on Application for Technology of Information and Communication (iSemantic).
[8] Huan Liu,et al. Big Data Drives Cloud Adoption in Enterprise , 2013, IEEE Internet Computing.
[9] Hung-Min Sun,et al. Dual RSA and Its Security Analysis , 2007, IEEE Transactions on Information Theory.
[10] Keke Gai,et al. Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry , 2018, Future Gener. Comput. Syst..
[11] Touraj Khodadadi,et al. Cloud computing: Vision, architecture and Characteristics , 2015, 2015 IEEE 6th Control and System Graduate Research Colloquium (ICSGRC).
[12] Jaya Sharma,et al. A hybrid encryption algorithm based on RSA and Diffie-Hellman , 2012, 2012 IEEE International Conference on Computational Intelligence and Computing Research.
[13] Debasis Das,et al. Secure algorithm for cloud computing and its applications , 2016, 2016 6th International Conference - Cloud System and Big Data Engineering (Confluence).
[14] Sandor Imre,et al. An advanced timing attack scheme on RSA , 2008, Networks 2008 - The 13th International Telecommunications Network Strategy and Planning Symposium.
[15] Chun-I Fan,et al. Controllable Privacy Preserving Search Based on Symmetric Predicate Encryption in Cloud Storage , 2011, 2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery.
[16] Ritu Patidar,et al. Modified RSA cryptosystem based on offline storage and prime number , 2013, 2013 IEEE International Conference on Computational Intelligence and Computing Research.
[17] G. Karagiannis,et al. Cloud computing services: taxonomy and comparison , 2011, Journal of Internet Services and Applications.
[18] Peng Xu,et al. Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email , 2016, IEEE Transactions on Computers.
[19] Michael O. Rabin,et al. Efficient dispersal of information for security, load balancing, and fault tolerance , 1989, JACM.
[20] Xiaohua Jia,et al. DAC-MACS: Effective Data Access Control for Multiauthority Cloud Storage Systems , 2013, IEEE Transactions on Information Forensics and Security.
[21] Jie Wu,et al. Secure and privacy preserving keyword searching for cloud storage services , 2012, J. Netw. Comput. Appl..
[22] Sawan Kumar,et al. Ensuring data storage security in Cloud Computing , 2009, 2009 17th International Workshop on Quality of Service.
[23] Raouf Boutaba,et al. Cloud computing: state-of-the-art and research challenges , 2010, Journal of Internet Services and Applications.
[24] Krishna P. Gummadi,et al. Towards Trusted Cloud Computing , 2009, HotCloud.
[25] Kai Hwang,et al. Trusted Cloud Computing with Secure Resources and Data Coloring , 2010, IEEE Internet Computing.
[26] Purnima Gupta,et al. Improving RSA Algorithm Using Multi-Threading Model for Outsourced Data Security in Cloud Storage , 2018, 2018 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence).
[27] Zaigham Mahmood. Cloud Computing: Characteristics and Deployment Approaches , 2011, 2011 IEEE 11th International Conference on Computer and Information Technology.
[28] Kai Miao,et al. A Simple Technique for Securing Data at Rest Stored in a Computing Cloud , 2009, CloudCom.
[29] Ibrahim M. Al-Jabri. The Perceptions of Adopters and Non-Adopters of Cloud Computing: Application of Technology-Organization-Environment Framework , 2014 .
[30] Erik Elmroth,et al. Connecting Fog and Cloud Computing , 2017, IEEE Cloud Comput..