Asian Journal of Information Technology

Year: 2013
Volume: 12
Issue: 9
Page No. 305 - 311

A Novel Approach to Enhance Cloud Data Defense

Authors : Sudha Devi and Thila gavathy

References

AWS., 2013. Amazon web services: Overview of security processes. June, 2013, pp: 1-48. http://media.amazonwebservices.com/pdf/AWS_Security_Whitepaper.pdf.

Amazon, 2009. Amazon elastic compute cloud (Amazon EC2). Amazon Web Services. http://aws.amazon.com/ec2/.

Armbrust, M., A. Fox, R. Griffith, A.D. Joseph and R.H. Katz et al., 2009. Above the clouds: A Berkeley view of cloud computing. Technical Report No. UCB/EECS-2009-28, Department of Electrical Engineering and Computer Science, University of California, Berkeley, February 10, 2009. http://www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.html.

CSA, 2009. Security guidance for critical areas of focus in cloud computing V2.1. Cloud Security Alliance, Security Alliance, USA., December 2009. https://cloudsecurityalliance.org/csaguide.pdf.

Chow, R., P. Golle, M. Jakobsson, E. Shi, J. Staddon, R. Masuoka and J. Molina, 2009. Controlling data in the cloud: Outsourcing computation without outsourcing control. Proceedings of the ACM Workshop on Cloud Computing Security, November 13, 2009, Chicago, Illinois, USA., pp: 85-90.

Dang, T.K., 2006. Security protocols for outsourcing database services. Inform. Sec. Int. J., 18: 85-108.
Direct Link  |  

Dorey, P.G. and A. Leite, 2011. Commentary: Cloud computing-A security problem or solution? Inform. Sec. Technical Rep., 16: 89-96.
CrossRef  |  Direct Link  |  

Hurwitz, J. and M. Kaufman, 2010. The journey to cloud computing: From experimentatiion to business reality. Hurwitz and Associates, IBM. http://de.slideshare.net/IBMIndiaSS/2010-09-hurwitzibmcloudonpowerfinalv2.

Hurwitz, J., 2010. The journey to cloud computing: From experimentation to business reality. Hurwitz White Paper. Highland Avenue, Needham, MA.

Hyde, D., 2009. A survey on the security of virtual machines. http://www.cs.wustl.edu/~jain/cse571-09/ftp/vmsec.pdf.

Mell, P. and T. Grance, 2011. The NIST definition of cloud computing. NIST Special Publication No. 800-145, National Institute of Standard and Technology, U.S. Department of Commerce, September 2011.

Oracle®: Database, 2010. Oracle database VLDB and partitioning guide, 11g Release 2 (11.2). E16541-05, August, 2010. http://docs.oracle.com/cd/E18283_01/server.112/e16541.pdf.

RSA Security, 2012. Securing data at rest: Developing a database encryption strategy. A White Paper for Developers, e-Business Managers and IT.

Ren, K., C. Wang and Q. Wang, 2012. Security challenges for the public cloud. IEEE Internet Comput., 16: 69-73.
CrossRef  |  Direct Link  |  

YamunaDevi, L., P. Aruna, D.D. Sudha and N. Priya, 2011. Security in virtual machine live migration for KVM. Proceedings of the International Conference on Process Automation, Control and Computing, July 20-22, 2011, Coimbatore, pp: 1-6.

Zissis, D. and D. Lekkas, 2012. Addressing cloud computing security issues. Future Gener. Comput. Syst., 28: 583-592.
CrossRef  |  Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved