INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET)

Cloud computing has gained a lot of publicity in the current IT world. After the internet, Cloud computing is the next big thing in the computer world. Cloud computing is the use of the Internet for the tasks performed on the computer and it is the next- generation architecture of IT Industry. Cloud computing is related to different technologies and the convergence of various technologies has emerged to be called cloud computing. Cloud Computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. This design mechanisms that not only protect sensitive data with encrypted data, but also protect customers from malicious behaviors by enabling the validation of the computation result.

[1]  P. Dhanalakshmi,et al.  PERCEIVING AND RECOVERING DEGRADED DATA ON SECURE CLOUD , 2013 .

[2]  Mikhail J. Atallah,et al.  Secure outsourcing of sequence comparisons , 2005, International Journal of Information Security.

[3]  Anna Lysyanskaya,et al.  How to Securely Outsource Cryptographic Computations , 2005, TCC.

[4]  Wenliang Du,et al.  Uncheatable grid computing , 2004, 24th International Conference on Distributed Computing Systems, 2004. Proceedings..

[5]  Andrew Chi-Chih Yao,et al.  Protocols for Secure Computations (Extended Abstract) , 1982, FOCS.

[6]  Abhishek Pandey,et al.  DATA SECURITY FRAMEWORK FOR CLOUD COMPUTING NETWORKS , 2013 .

[7]  Cong Wang,et al.  Ensuring data storage security in Cloud Computing , 2009, 2009 17th International Workshop on Quality of Service.

[8]  Mikhail J. Atallah,et al.  Secure and Private Collaborative Linear Programming , 2006, 2006 International Conference on Collaborative Computing: Networking, Applications and Worksharing.

[9]  Mikhail J. Atallah,et al.  Securely outsourcing linear algebra computations , 2010, ASIACCS '10.

[10]  Eugene H. Spafford,et al.  Secure outsourcing of scientific computations , 2001, Adv. Comput..

[11]  Mikhail J. Atallah,et al.  Private and Cheating-Free Outsourcing of Algebraic Computations , 2008, 2008 Sixth Annual Conference on Privacy, Security and Trust.

[12]  Wenliang Du,et al.  Secure multi-party computation problems and their applications: a review and open problems , 2001, NSPW '01.

[13]  Cong Wang,et al.  Secure and practical outsourcing of linear programming in cloud computing , 2011, 2011 Proceedings IEEE INFOCOM.

[14]  Philippe Golle,et al.  Uncheatable Distributed Computations , 2001, CT-RSA.