A Cloud Computing Platform On File Storage And Sharing Using Rijndeal Algorithms
暂无分享,去创建一个
Olayiwola Abisola Ayomide | Ikedilo Obiora Emeka | Okafor Loveth Ijeoma | Anozie Ekenechukwu Lilian | Royransom Nzeh | Udenze Loveth Ifunanya | Uzo Blessing Chimezie | R. Nzeh
[1] Oladeji P. Akomolafe,et al. A Hybrid Cryptographic Model for Data Storage in Mobile Cloud Computing , 2017 .
[2] Tuncay Ercan,et al. Effective use of cloud computing in educational institutions , 2010 .
[3] Judith Hurwitz,et al. Cloud Computing for Dummies , 2009 .
[4] Marco Mellia,et al. Personal Cloud Storage Benchmarks and Comparison , 2017, IEEE Transactions on Cloud Computing.
[5] Farhad Soleimanian Gharehchopogh,et al. Security Challenges In Cloud Computing With More Emphasis on Trust And Privacy , 2012 .
[6] Naresh Vurukonda,et al. A Study on Data Storage Security Issues in Cloud Computing , 2016 .
[7] Meihong Wang,et al. Energy storage technologies and real life applications – A state of the art review , 2016 .
[8] Yashpal Kadam. Security Issues in Cloud Computing A Transparent View , 2011 .
[9] Brij Bhooshan Gupta,et al. Cross-Site Scripting (XSS) attacks and defense mechanisms: classification and state-of-the-art , 2017, Int. J. Syst. Assur. Eng. Manag..
[10] Chonho Lee,et al. A survey of mobile cloud computing: architecture, applications, and approaches , 2013, Wirel. Commun. Mob. Comput..
[11] Michael D. Hogan,et al. NIST Cloud Computing Standards Roadmap , 2013 .
[12] A. Umamakeswari,et al. Secure Data Storage and Data Retrieval in Cloud Storage using Cipher Policy Attribute based Encryption , 2015 .
[13] Dan Lin,et al. Data protection models for service provisioning in the cloud , 2010, SACMAT '10.
[14] Jasmeet Singh,et al. Survey on Enhancing Cloud Data Security using EAP with Rijndael Encryption Algorithm , 2013 .
[15] V. Kavitha,et al. A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..
[16] Gurpreet Singh,et al. A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security , 2013, International Journal of Computer Applications.
[17] N. B. Anuar,et al. The rise of "big data" on cloud computing: Review and open research issues , 2015, Inf. Syst..