A Hybrid Framework for Security in Cloud Computing Based on Different Algorithms
暂无分享,去创建一个
Karim Mohammed Rezaul | Jannatul Ferdous | Md. Fuad Newaz Khan | Maruf Ahmed Tamal | Md. Abdul Aziz | Pabel Miah
[1] Eric Jui-Lin Lu,et al. Cryptanalysis of the Batch Verifying Multiple DSA-Type Digital Signature , 2001 .
[2] Deepak R Bharadwaj,et al. Cloud Threat Defense – A Threat Protection and Security Compliance Solution , 2018, 2018 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM).
[3] Min-Shiang Hwang,et al. A Survey of Public Auditing for Shared Data Storage with User Revocation in Cloud Computing , 2016, Int. J. Netw. Secur..
[4] Luigi Coppolino,et al. Cloud security: Emerging threats and current solutions , 2017, Comput. Electr. Eng..
[5] Shraddha Kulkarni. Study of Modern Cryptographic Algorithms , 2017 .
[6] Valentina Casola,et al. On the Adoption of Security SLAs in the Cloud , 2014, A4Cloud.
[7] Lahdir Mourad,et al. Meteosat Images Encryption based on AES and RSA Algorithms , 2015 .
[8] I. George Amalarethinam,et al. Enhanced RSA Algorithm with Varying Key Sizes for Data Security in Cloud , 2017, 2017 World Congress on Computing and Communication Technologies (WCCCT).
[9] Nazim Agoulmine,et al. State of the art and challenges of security SLA for cloud computing , 2017, Comput. Electr. Eng..
[10] M. Arun Fera,et al. Enhancing Security in Cloud Using Trusted Monitoring Framework , 2015 .
[11] Majid Bayat,et al. A Lightweight and Efficient Data Sharing Scheme for Cloud Computing , 2018 .
[12] Mohammad V. Malakooti,et al. A Two Level-Security Model for Cloud Computing based on the Biometric Features and Multi-Level Encryption , 2015 .
[13] Amit Asthana,et al. Three step data security model for cloud computing based on RSA and steganography , 2015, 2015 International Conference on Green Computing and Internet of Things (ICGCIoT).
[14] Andrew Warfield,et al. Cloud security: a gathering storm , 2014, CACM.
[15] Neeraj Suri,et al. Leveraging the Potential of Cloud Security Service-Level Agreements through Standards , 2015, IEEE Cloud Computing.
[16] Min-Shiang Hwang,et al. A Survey of Public Auditing for Secure Data Storage in Cloud Computing , 2016, Int. J. Netw. Secur..
[17] Qiyu Chen,et al. Fine-Grained Outsourced Data Deletion Scheme in Cloud Computing , 2019 .
[18] Kailas Devadkar,et al. Understanding DDoS Attack & its Effect in Cloud Environment , 2015 .
[19] Amir Herzberg,et al. CDN-on-Demand: An affordable DDoS Defense via Untrusted Clouds , 2016, NDSS.
[20] B. B. Zaidan,et al. Novel Framework for Hidden Data in the Image Page within Executable File Using Computation between Advanced Encryption Standard and Distortion Techniques , 2009, ArXiv.
[21] D. K. Lakhtaria,et al. New robust and secure alphabet pairing Text Steganography Algorithm , 2016 .
[22] Dimitris Gritzalis,et al. The Insider Threat in Cloud Computing , 2011, CRITIS.
[23] Kim-Kwang Raymond Choo,et al. Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework , 2016, J. Netw. Comput. Appl..