Journal of Engineering and Applied Sciences

Year: 2018
Volume: 13
Issue: 13
Page No. 5019 - 5026

Secure Big Data Storage in Cloud and Data Computing Using Cryptographic Techniques

Authors : N. Madhusudhana Reddy, C. Nagaraju and A. Ananda Rao

References

Ateniese, G., R. Burns, R. Curtmola, J. Herring and L. Kissner et al., 2007. Provable data possession at untrusted stores. Proceedings of the 14th ACM Conference on Computer and Communications Security, October 28-31, 2007, ACM, Whistler, Canada, ISBN:978-1-59593-703-2, pp: 598-609.

Bowers, K.D., A. Juels and A. Oprea, 2009. HAIL: A high-availability and integrity layer for cloud storage. Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS’09), November 09-13, 2009, ACM, Chicago, Illinois, ISBN:978-1-60558-894-0, pp: 187-198.

Donald, A.C., S.A. Oli and L. Arockiam, 2013. Mobile cloud protection issue and challenge: A perspective. Intl. J. Eng. Innovative Technol., 3: 401-406.
Direct Link  |  

Donald, A.C., S.A. Oli and L. Arockiam, 2013. Mobile cloud security issues and challenges: A perspective. Intl. J. Electron. Inf. Technol., 3: 1-6.

Gampala, V., S. Inuganti and S. Muppidi, 2012. Data security in cloud computing with elliptic curve cryptography. Intl. J. Soft Comput. Eng., 2: 138-141.

Garg, P. and V. Sharma, 2013. Secure data storage in mobile cloud computing. Intl. J. Sci. Eng. Res., 4: 1154-1159.
Direct Link  |  

Guha, V. and M. Shrivastava, 2013. Review of information authentication in mobile cloud over SaaS and PaaS layers. Intl. J. Adv. Comput. Res., 3: 116-121.
Direct Link  |  

Hendricks, J., G.R. Ganger and M.K. Reiter, 2007. Verifying distributed erasure-coded data. Proceedings of the 26th Annual ACM Symposium on Principles of Distributed Computing, August 12-15, 2007, ACM, Portland, Oregon, ISBN:978-1-59593-616-5, pp: 139-146.

Juels, A. and B.S.Jr. Kaliski, 2007. PORs: Proofs of retrievability for large files. Proceedings of the 14th ACM Conference on Computer and Communications Security, October 29-November 2, 2007, ACM, New York, USA., ISBN:978-1-59593-703-2, pp: 584-597.

Ma, L., J. Sum and Y. Li, 2012. Comparing general paradigm on data secrecy protection for outsourced file in mobile cloud computing. J. Netw., 7: 1449-1455.
Direct Link  |  

Murugesan, K. and S. Sudheendran, 2013. Ensuring user security and data integrity in multi-cloud. Intl. J. Soft Comput. Eng., 3: 355-358.
Direct Link  |  

Purushothaman, D. and S. Abburu, 2012. An approach for data storage security in cloud computing. Intl. J. Comput. Sci. Issues, 9: 100-105.

Raju, V., R. Kumar and A. Raj, 2011. Techniques for efficiently ensuring data storage security in cloud computing. Intl. J. Comp. Tech. Appl., 2: 1717-1721.
Direct Link  |  

Schwarz, T.S. and E.L. Miller, 2006. Store, forget and check: Using algebraic signatures to check remotely administered storage. Proceedings of the 26th IEEE International Conference on Distributed Computing Systems (ICDCS’06), July 4-7, 2006, IEEE, Lisboa, Portugal, pp: 12-12.

Shah, M.A., M. Baker, J.C. Mogul and R. Swaminathan, 2007. Auditing to keep online storage services honest. Proceedings of the 11th USENIX Workshop on Hot Topics in Operating Systems, May 7-9, 2007, USENIX Association, Berkeley, California, USA., pp: 1-6.

Singh, K., I. Kharbanda and N. Kaur, 2012. Protection issue occurs in cloud computing and their solution. Intl. J. Comput. Sci. Eng., 4: 945-949.

Vijay, G.R. and A.R.M. Reddy, 2013. Data protection in cloud based on trusted computing environment. Intl. J. Soft Comput. Eng., 3: 187-191.
Direct Link  |  

Wang, C., Q. Wang, K. Ren and W. Lou, 2010. Privacy-preserving public auditing for data storage security in cloud computing. Proceedings of the 2010 IEEE Conference on INFOCOM, March 14-19, 2010, IEEE, San Diego, California, pp: 1-9.

Wang, C., Q. Wang, K. Ren and W. Lou, 2009. Ensuring data storage security in cloud computing. Proceedings of the 2009 17th International Workshop on Quality of Service IWQoS09, July 13-15, 2009, IEEE, Charleston, South Carolina, USA., ISBN:978-1-4244-3875-4, pp: 1-9.

Wang, C., Q. Wang, K. Ren, N. Cao and W. Lou, 2012. Toward secure and dependable storage services in cloud computing. IEEE. Trans. Serv. Comput., 5: 220-232.
CrossRef  |  Direct Link  |  

Wang, Q., C. Wang, J. Li, K. Ren and W. Lou, 2009. Enabling public verifiability and data dynamics for storage security in cloud computing. In: Computer Security-ESORICS 2009, Backes, M. and P. Ning (Eds.). Springer, Berlin, Germany, ISBN:978-3-642-04443-4, pp: 355-370.

Zhou, Z. and D. Huang, 2012. Efficient and secure data storage operations for mobile cloud computing. Proceedings of the 8th International Conference on Network and Service Management (CNSM) and 2012 Workshop on Systems Virtualiztion Management (SVM), October 22-26, 2012, IEEE, Nevada, USA., ISBN:978-1-4673-3134-0, pp: 37-45.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved