Exploring Data Security Issues and Solutions in Cloud Computing

[1]  Rajkumar Buyya,et al.  Dynamic remote data auditing for securing big data storage in cloud computing , 2017, Inf. Sci..

[2]  William Allen,et al.  Data Security, Privacy, Availability and Integrity in Cloud Computing: Issues and Current Solutions , 2016 .

[3]  Kire Jakimoski Security Techniques for Data Protection in Cloud Computing , 2016 .

[4]  Balamurugan Balusamy,et al.  Enhanced Security Framework for Data Integrity Using Third-party Auditing in the Cloud System , 2015 .

[5]  A Survey of Cloud Computing Security: Issues, Challenges and Solutions , 2015 .

[6]  Ejaz Ahmed,et al.  A review on remote data auditing in single cloud server: Taxonomy and open issues , 2014, J. Netw. Comput. Appl..

[7]  Junsheng Zhang,et al.  Data Security and Privacy in Cloud Computing , 2014 .

[8]  Salve Bhagyashri Salve Bhagyashri,et al.  Privacy-Preserving Public Auditing For Secure Cloud Storage , 2014 .

[9]  Michael D. Hogan,et al.  NIST Cloud Computing Standards Roadmap , 2013 .

[10]  Zhifeng Xiao,et al.  Security and Privacy in Cloud Computing , 2013, IEEE Communications Surveys & Tutorials.

[11]  Sugata Sanyal,et al.  Survey on Security Issues in Cloud Computing and Associated Mitigation Techniques , 2012, ArXiv.

[12]  Farzad Sabahi,et al.  Secure Virtualization for Cloud Environment Using Hypervisor-based Technology , 2012 .

[13]  Cong Wang,et al.  Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.

[14]  Reza Curtmola,et al.  Remote data checking using provable data possession , 2011, TSEC.

[15]  V. Kavitha,et al.  A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..

[16]  Daniele Catteddu,et al.  Cloud Computing: Benefits, Risks and Recommendations for Information Security , 2009 .

[17]  Roberto Di Pietro,et al.  Scalable and efficient provable data possession , 2008, IACR Cryptol. ePrint Arch..

[18]  Reza Curtmola,et al.  Provable data possession at untrusted stores , 2007, CCS '07.

[19]  D. DeMets,et al.  Data integrity. , 2020, Controlled clinical trials.

[20]  Introduction to Information Security the History of Information Security , 2022 .