A Survey on Secure Cloud: Security and Privacy in Cloud Computing
暂无分享,去创建一个
[1] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[2] Lei Zhang,et al. Security Enhanced Anonymous Remote User Authentication and Key Agreement for Cloud Computing , 2014, 2014 IEEE 17th International Conference on Computational Science and Engineering.
[3] John W. Rittinghouse,et al. Cloud Computing: Implementation, Management, and Security , 2009 .
[4] Gao Xiaopeng,et al. VNSS: A network security sandbox for virtual computing environment , 2010, 2010 IEEE Youth Conference on Information, Computing and Telecommunications.
[5] Ronald L. Krutz,et al. Cloud Security: A Comprehensive Guide to Secure Cloud Computing , 2010 .
[6] M. Sethumadhavan,et al. Novel mutual authentication protocol for cloud computing using secret sharing and steganography , 2014, The Fifth International Conference on the Applications of Digital Information and Web Technologies (ICADIWT 2014).
[7] Shyam Nandan Kumar,et al. Review on Network Security and Cryptography , 2015 .
[8] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[9] Eduardo B. Fernandez,et al. Three Misuse Patterns for Cloud Computing , 2013 .
[10] Ramaswamy Chandramouli,et al. State of security readiness , 2010, CROS.
[11] Ravi Pendse,et al. Security in multi-tenancy cloud , 2010, 44th Annual 2010 IEEE International Carnahan Conference on Security Technology.
[12] Jonathan Katz,et al. Efficient cryptographic protocols preventing man-in-the-middle attacks , 2002 .
[13] Dustin Owens,et al. Securing Elasticity in the Cloud , 2010, ACM Queue.
[14] Jing Zhang,et al. Research on key technology for SaaS , 2012, 2012 7th International Conference on Computer Science & Education (ICCSE).
[15] Raheem A. Beyah,et al. MACA: A privacy-preserving multi-factor cloud authentication system utilizing big data , 2014, 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[16] Rafail Ostrovsky,et al. Attribute-based encryption with non-monotonic access structures , 2007, CCS '07.
[17] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.
[18] Shyam Nandan Kumar,et al. World towards Advance Web Mining: A Review , 2015 .
[19] Jörg Schwenk,et al. On Technical Security Issues in Cloud Computing , 2009, 2009 IEEE International Conference on Cloud Computing.
[20] Melissa Chase,et al. Multi-authority Attribute Based Encryption , 2007, TCC.
[21] Jia-Lun Tsai,et al. A Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services , 2015, IEEE Systems Journal.
[22] Daniel Mellado,et al. Security Analysis in the Migration to Cloud Environments , 2012, Future Internet.
[23] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[24] Matt Blaze,et al. Divertible Protocols and Atomic Proxy Cryptography , 1998, EUROCRYPT.
[25] Daniele Catteddu,et al. Cloud Computing: Benefits, Risks and Recommendations for Information Security , 2009 .
[26] Timothy Grance,et al. Guidelines on Security and Privacy in Public Cloud Computing | NIST , 2012 .
[27] Jie Wu,et al. Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers , 2011, Comput. Secur..
[28] Yi Ding,et al. Network security for virtual machine in cloud computing , 2010, 5th International Conference on Computer Sciences and Convergence Information Technology.
[29] V. Kavitha,et al. A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..
[30] Bernd Grobauer,et al. Understanding Cloud Computing Vulnerabilities , 2011, IEEE Security & Privacy.
[31] Hui Li,et al. The technical security issues in cloud computing , 2013, Int. J. Inf. Commun. Technol..
[32] Ling Cheung,et al. Provably secure ciphertext policy ABE , 2007, CCS '07.
[33] T. Grance,et al. SP 800-144. Guidelines on Security and Privacy in Public Cloud Computing , 2011 .
[34] Mazleena Salleh,et al. Biometric encryption to enhance confidentiality in Cloud computing , 2014, 2014 International Symposium on Biometrics and Security Technologies (ISBAST).
[35] Sakshi Kaushal,et al. Cloud Computing Security Issues and Challenges: A Survey , 2011, ACC.
[36] Sherman S. M. Chow,et al. Improving privacy and security in multi-authority attribute-based encryption , 2009, CCS.
[37] Cor-Paul Bezemer,et al. Multi-tenant SaaS applications: maintenance dream or nightmare? , 2010, IWPSE-EVOL '10.
[38] P. Praveen Chandar,et al. Hierarchical attribute based proxy re-encryption access control in cloud computing , 2014, 2014 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2014].
[39] Allison Bishop,et al. Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption , 2010, EUROCRYPT.
[40] Muttukrishnan Rajarajan,et al. Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption , 2012, IEEE Transactions on Parallel and Distributed Systems.
[41] Atsuko Miyaji,et al. A ciphertext-policy attribute-based encryption scheme with constant ciphertext length , 2009, Int. J. Appl. Cryptogr..
[42] John C. Grundy,et al. An Analysis of the Cloud Computing Security Problem , 2016, APSEC 2010.
[43] Krishnashree Achuthan,et al. Preventing Insider Attacks in the Cloud , 2011, ACC.
[44] B AmaneY.,et al. Security Issues in Cloud Computing , 2011, HPAGC.
[45] Duncan S. Wong,et al. Secure Outsourced Attribute-Based Signatures , 2014, IEEE Transactions on Parallel and Distributed Systems.
[46] Matthew Metheny,et al. Security and Privacy in Public Cloud Computing , 2013, CloudCom 2013.
[47] Rainer Steinwandt,et al. Multi-authority attribute-based encryption with honest-but-curious central authority , 2012, Int. J. Comput. Math..
[48] Gary Anthes,et al. Security in the cloud , 2010, Commun. ACM.
[49] Frank Gens,et al. Cloud Computing Benefits, risks and recommendations for information security , 2010 .
[50] Angelos Stavrou,et al. SQLProb: a proxy-based architecture towards preventing SQL injection attacks , 2009, SAC '09.
[51] Shyam Nandan Kumar. DecenCrypto Cloud: Decentralized Cryptography Technique for Secure Communication over the Clouds , 2015 .
[52] Harit Shah,et al. Security Issues on Cloud Computing , 2013, ArXiv.
[53] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[54] CaoZhenfu,et al. Secure threshold multi authority attribute based encryption without a central authority , 2008, Inf. Sci..
[55] Levent Ertaul,et al. Security Challenges in Cloud Computing , 2010, Security and Management.
[56] Tim Mather,et al. Cloud Security and Privacy , 2023, International Journal for Research in Applied Science and Engineering Technology.
[57] Jeremy M. Kaplan,et al. Cloud-Trust—a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds , 2017, IEEE Transactions on Cloud Computing.
[58] Balachandra Reddy Kandukuri,et al. Cloud Security Issues , 2009, 2009 IEEE International Conference on Services Computing.
[59] M. Mambo,et al. Proxy Cryptosystems: Delegation of the Power to Decrypt Ciphertexts (Special Section on Cryptography and Information Security) , 1997 .
[60] Shalini Kaleeswaran,et al. On covert channels between virtual machines , 2012, Journal in Computer Virology.
[61] Tatsuaki Okamoto,et al. Decentralized Attribute-Based Signatures , 2013, Public Key Cryptography.
[62] Craig Gentry,et al. A fully homomorphic encryption scheme , 2009 .
[63] Jen-Ho Yang,et al. An ID-Based User Authentication Scheme for Cloud Computing , 2014, 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[64] Justin Clarke,et al. SQL Injection Attacks and Defense , 2009 .
[65] Allison Bishop,et al. Revocation Systems with Very Small Private Keys , 2010, 2010 IEEE Symposium on Security and Privacy.
[66] Tal Garfinkel,et al. When Virtual Is Harder than Real: Security Challenges in Virtual Machine Based Computing Environments , 2005, HotOS.
[67] Hideki Imai,et al. Dual-Policy Attribute Based Encryption , 2009, ACNS.
[68] Ke Xu,et al. Mobile Mashup: Architecture, Challenges and Suggestions , 2009, 2009 International Conference on Management and Service Science.
[69] Trent Jaeger,et al. Outlook: Cloudy with a Chance of Security Challenges and Improvements , 2010, IEEE Security & Privacy.
[70] J. Reuben,et al. A Survey on Virtual Machine Security , 2007 .
[71] Hai Jin,et al. Towards Optimized Fine-Grained Pricing of IaaS Cloud Platform , 2015, IEEE Transactions on Cloud Computing.
[72] Shyam Nandan Kumar. Cryptography during Data Sharing and Accessing Over Cloud , 2015 .
[73] John Viega,et al. Cloud Computing and the Common Man , 2009, Computer.