A Survey over the Various Techniques Which used for Security of the Data in Cloud Storage
暂无分享,去创建一个
[1] Aarthi,et al. Towards Secure and Dependable Storage Services in Cloud Computing , 2014 .
[2] Laurence T. Yang,et al. Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing , 2015, IEEE Transactions on Parallel and Distributed Systems.
[3] Jian Liu,et al. Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage , 2015, IEEE Transactions on Information Forensics and Security.
[4] Xiaohua Jia,et al. An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing , 2013, IEEE Transactions on Parallel and Distributed Systems.
[5] Priya Deshpande,et al. Enhancing Distributed Data Storage Security for Cloud Computing Using TPA and AES Algorithm , 2015, 2015 International Conference on Computing Communication Control and Automation.
[6] Larry A. Dunning,et al. Privacy Preserving Data Sharing With Anonymous ID Assignment , 2013, IEEE Transactions on Information Forensics and Security.
[7] Dr Tirumala Rao,et al. Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud , 2017 .
[8] Qiang Yue,et al. G-Cloud: A Highly Reliable and Secure IaaS Platform , 2015, 2015 International Conference on Network and Information Systems for Computers.
[9] Slawomir Grzonkowski,et al. Sharing cloud services: user authentication for social enhancement of home networking , 2011, IEEE Transactions on Consumer Electronics.
[10] Jadhav Poonam,et al. Data sharing security and privacy preservation in cloud computing , 2015, 2015 International Conference on Green Computing and Internet of Things (ICGCIoT).
[11] W. Marsden. I and J , 2012 .
[12] Osmanbey Uzunkol,et al. An efficient ID-based message recoverable privacy-preserving auditing scheme , 2015, 2015 13th Annual Conference on Privacy, Security and Trust (PST).
[13] Randy H. Katz,et al. Above the Clouds: A Berkeley View of Cloud Computing , 2009 .
[14] Athanasios V. Vasilakos,et al. The design of a redundant array of independent net-storages for improved confidentiality in cloud computing , 2012, Journal of Cloud Computing: Advances, Systems and Applications.
[15] D. Kumar,et al. Anonymous Authentication for Decentralized Access Control of Cloud Data , 2015 .
[16] N. Shanmugakani,et al. An explicit integrity verification scheme for cloud distributed systems , 2015, 2015 IEEE 9th International Conference on Intelligent Systems and Control (ISCO).
[17] Kai Hwang,et al. Trusted Cloud Computing with Secure Resources and Data Coloring , 2010, IEEE Internet Computing.