A Survey on Storage Techniques in Cloud Computing
暂无分享,去创建一个
[1] Manish R. Umale,et al. Public Auditing and Data Dynamics for Storage Security in Cloud Computing , 2014, ArXiv.
[2] Qinghua Zheng,et al. An optimized approach for storing and accessing small files on cloud storage , 2012, J. Netw. Comput. Appl..
[3] Ling Tian,et al. Identity-Based Authentication for Cloud Computing , 2009, CloudCom.
[4] Shobana,et al. Introducing Effective Third Party Auditing ( TPA ) for Data Storage Security in Cloud , .
[5] Cong Wang,et al. Toward Secure and Dependable Storage Services in Cloud Computing , 2012, IEEE Transactions on Services Computing.
[6] Rong,et al. [Lecture Notes in Computer Science] Cloud Computing Volume 5931 || Identity-Based Authentication for Cloud Computing , 2009 .
[7] P SyamKumar,et al. An Efficient and Secure Protocol for Ensuring Data Storage Security in Cloud Computing , 2011 .
[8] ZhengQinghua,et al. An optimized approach for storing and accessing small files on cloud storage , 2012 .
[9] M. Mrinalni Vaknishadh,et al. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2012 .
[10] C. Dinesh. Data Integrity and Dynamic Storage Way in Cloud Computing , 2011, ArXiv.
[11] Subhash C. Kak,et al. Online data storage using implicit security , 2009, Inf. Sci..
[12] Aarthi,et al. Towards Secure and Dependable Storage Services in Cloud Computing , 2014 .
[13] Sawan Kumar,et al. Ensuring data storage security in Cloud Computing , 2009, 2009 17th International Workshop on Quality of Service.