Efficient Cloud Storage with Data Partitioning and Replication Using Advanced Encryption Standard

[1]  Eduardo B. Fernández,et al.  An analysis of security issues for cloud computing , 2013, Journal of Internet Services and Applications.

[2]  Yves Deswarte,et al.  Intrusion tolerance in distributed computing systems , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.

[3]  W. K. Hale Frequency assignment: Theory and applications , 1980, Proceedings of the IEEE.

[4]  Jin Tong,et al.  NIST cloud computing standards roadmap :: version 1.0 , 2011 .

[5]  Wayne A. Jansen,et al.  Cloud Hooks: Security and Privacy Issues in Cloud Computing , 2011, 2011 44th Hawaii International Conference on System Sciences.

[6]  Albert Y. Zomaya,et al.  Quantitative comparisons of the state‐of‐the‐art data center architectures , 2013, Concurr. Comput. Pract. Exp..

[7]  Ari Juels,et al.  New approaches to security and availability for cloud data , 2013, CACM.

[8]  Albert Y. Zomaya,et al.  On the Characterization of the Structural Robustness of Data Center Networks , 2013, IEEE Transactions on Cloud Computing.

[9]  Bernd Grobauer,et al.  Understanding Cloud Computing Vulnerabilities , 2011, IEEE Security & Privacy.

[10]  Albert Y. Zomaya,et al.  Energy-efficient data replication in cloud computing datacenters , 2013, 2013 IEEE Globecom Workshops (GC Wkshps).