Cloud Computing Security: A Survey
Abstract
Keywords
Full Text:
PDFReferences
A. Sangroya, “Towards Analyzing Data Security Risks In Cloud Computing Environments,” JULY, August 2010.
Ch. Modi, D. Patel, B. Borisaniya, H. Patel, A. Patel, and M. Rajarajan, “A Survey Of Intrusion Detection Techniques In Cloud,” Journal of Network and Computer Applications, pp. 42–57, 2013.
Grobauer, T. Walloschek, and E. Stocker, "Understanding Cloud Computing Vulnerabilities," IEEE Security and Privacy, vol. 99, 2010.
K. J. Harauz. “Data security in the world of cloud computing,” IEEE Computer and Reliability Society, 2010.
K. S. Wagh, R. Jathar, S. Bangar, and A. Bhakthadas, “Securing Data Transfer in Cloud Environment,” International Journal of Engineering Research and Applications, Vol. 4, pp. 189-193, 2014.
M. A. Morsy, J. Grundy, and I. Muller, “An Analysis of the Cloud Computing Security Problem,” In ProcApsec 2010 Cloud Workshop, 2010.
M. Firdhous, O. Ghazali, and S. Hassan, “Trust Management in Cloud Computing: A Critical Review,” International Journal on Advances in ICT for Emerging Regions, vol 04 (02), pp. 24 – 36, 2011.
P. Kresimir and H. Zeljko, "Cloud Computing Security Issues And Challenges," In PROC Third International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services, pp. 344-349, 2010.
S. Kumar, and N. K. Dogra, “Cloud Storage and its Secure Overlay Techniques,” International Journal of Engineering Research and Applications, Vol. 4, pp. 33-37, 2014.
S. Ramgovind, M. M. Eloff, and E. Smith, “The Management of Security in Cloud Computing,” In PROC 2010 IEEE International Conference on Cloud Computing, 2010.
S. S. Kumar R, “Data integrity proofs in cloud storage,” 2011.
S. SHARMA, and A. CHUGH, “Survey Paper on Cloud Storage Security,” International Journal of Innovative Research in Computer and Communication Engineering, vol. 1, 2013.
S. Subashini, and V. Kavitha, “A Survey on Security Issues in Service Delivery Models of Cloud Computing,” J Network ComputAppl doi:10.1016/j.jnca.2010.07.006, 2010.
T. Ch. Dai Yuefa, and Wu Bo, “Data Security Model for Cloud Computing,” pp. 21-22, 2009.
V. Gampala, “Data Security in Cloud Computing with Elliptic Curve Cryptography,” International Journal of Soft Computing and Engineering (IJSCE), vol.2, 2012.
Zh. Xiao, and Y. Xiao, “Security and Privacy in Cloud Computing,” IEEE COMMUNICATIONS SURVEYS and TUTORIALS, 2015.
I. M. Khalil, A. Khreishah, & M. Azeem, “Cloud Computing Security: A Survey,” Computers, 3, 1-35; doi:10.3390/computers3010001, 2014.
Refbacks
- There are currently no refbacks.
Copyright (c) 2015 Journal of Information Sciences and Computing Technologies
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Copyright © 2014 Journal of Information Sciences and Computing Technologies. All rights reserved.
ISSN: 2394-9066
For any help/support contact us at jiscteditor@scitecresearch.com.