A Survey on Various Cloud Storage Schemes for Preserving Privacy and Preventing Data Loss
暂无分享,去创建一个
[1] Yulin Wang,et al. Homomorphic cloud computing scheme based on hybrid homomorphic encryption , 2017, 2017 3rd IEEE International Conference on Computer and Communications (ICCC).
[2] Ajey Singh,et al. Evaluating a cryptographic Overview of Attacks on Cloud Computing , 2012 .
[3] Xu Tao,et al. Data privacy protection using multiple cloud storages , 2013, Proceedings 2013 International Conference on Mechatronic Sciences, Electric Engineering and Computer (MEC).
[4] Atulay Mahajan,et al. The Malicious Insiders Threat in the Cloud , 2015 .
[5] Yau-Hwang Kuo,et al. An effective privacy protection scheme for cloud computing , 2011, 13th International Conference on Advanced Communication Technology (ICACT2011).
[6] Xiao Liu,et al. Time-Series Pattern Based Effective Noise Generation for Privacy Protection on Cloud , 2015, IEEE Transactions on Computers.
[7] Khandakar Ahmed,et al. Identity and Access Management in Cloud Computing , 2011 .
[8] Peidong Sha,et al. The modification of RSA algorithm to adapt fully homomorphic encryption algorithm in cloud computing , 2016, 2016 4th International Conference on Cloud Computing and Intelligence Systems (CCIS).
[9] James A. Thom,et al. Cloud Computing Security: From Single to Multi-clouds , 2012, 2012 45th Hawaii International Conference on System Sciences.
[10] Deepak H. Sharma,et al. Managed data loss prevention security service in cloud , 2016 .
[11] Junsheng Zhang,et al. Data Security and Privacy in Cloud Computing , 2014 .
[12] M. Somasundaram,et al. Data loss protection and data security using agents for cloud environment , 2016, 2016 International Conference on Computing Technologies and Intelligent Data Engineering (ICCTIDE'16).
[13] Yue Wang,et al. Privacy protection based access control scheme in cloud-based services , 2016, 2016 IEEE/CIC International Conference on Communications in China (ICCC).
[14] Neha Thakur,et al. Data Integrity Techniques in Cloud Computing: An Analysis , 2017 .
[15] Dr.Richa Purohit. Comparative Analysis of few Cloud Service Providers Considering Their Distinctive Properties , 2017 .
[16] Anfeng Liu,et al. A Three-Layer Privacy Preserving Cloud Storage Scheme Based on Computational Intelligence in Fog Computing , 2018, IEEE Transactions on Emerging Topics in Computational Intelligence.
[17] Manas Ranjan Patra,et al. Cloud Computing: Security Issues and Research Challenges , 2011 .
[18] . K.V.KMaheshKumar,et al. SOFTWARE AS A SERVICE FOR EFFICIENT CLOUD COMPUTING , 2014 .
[19] Jae-Woo Chang,et al. A Privacy-Preserving kNN Classification Algorithm Using Yao's Garbled Circuit on Cloud Computing , 2017, 2017 IEEE 10th International Conference on Cloud Computing (CLOUD).
[20] Hong Zhao,et al. Data Security and Privacy Protection Issues in Cloud Computing , 2012, 2012 International Conference on Computer Science and Electronics Engineering.
[21] Nitin Pandey,et al. Information Leakage Prevention In Cloud Computing , 2014 .
[22] Khalid Alshafee. Encryption Techniques in the Cloud , 2016 .