Asian Journal of Information Technology

Year: 2014
Volume: 13
Issue: 11
Page No. 707 - 714

Proposal for a New Authentication and Encryption Algorithm for Data at Rest on Cloud Environments

Authors : Sreevidya Subramanian and Ananthi Seshasaayee

References

Bellare, M., A. Desai, D. Pointcheval and P. Rogaway, 1998. Relations among notions of security for public-key encryption schemes. Proceedings of the 18th Annual International Cryptology Conference, August 23-27, 1998, California, USA., pp: 26-45.

Blum, M., P. Feldman and S. Micali, 1990. Proving security against chosen ciphertext attacks. Proceedings of the18th Annual International Cryptology Conference, August 23-27, 1998, California, USA., pp: 256-268.

Buyya, R., C.S. Yeo, S. Venugopal, J. Broberg and I. Brandic, 2009. Cloud computing and emerging IT platforms: Vision, hype and reality for delivering computing as the 5th utility. Future Gener. Comput. Syst., 25: 599-616.
CrossRef  |  Direct Link  |  

Chow, R., P. Golle, M. Jakobsson, E. Shi, J. Staddon, R. Masuoka and J. Molina, 2009. Controlling data in the cloud: Outsourcing computation without outsourcing control. Proceedings of the ACM Workshop on Cloud Computing Security, November 13, 2009, Chicago, Illinois, USA., pp: 85-90.

ENISA., 2009. Cloud computing information assurance framework. European Network and information Security Agency. https://www.enisa.europa.eu/activities/risk-management/files/deliverables/cloud-computing-information-assurance-framework.

Francis, P., S. Jamin, C. Jin, Y. Jin, D. Raz, Y. Shavitt and L. Zhang, 2001. IDMaps: A global internet host distance estimation service. IEEE/ACM Trans. Networking, 9: 525-540.
CrossRef  |  Direct Link  |  

Furht, B. and A. Escalante, 2010. Handbook of Cloud Computing. Springer, USA., ISBN: 9781441965240, Pages: 653.

Gellman, R., 2009. Privacy in the clouds: Risks to privacy and confidentiality from cloud computing. The World Privacy Forum, pp: 1-26. http://www.worldprivacyforum.org/www/wprivacyforum/pdf/WPF_Cloud_Privacy_Report.pdf.

Ho, A.D., 2009. Cloud strikes all the right chords but security concerns keep it from hitting the perfect pitch. November 2009. http://www.ap.idc.asia/.

Huang, I., R. Guo, H. Xie and Z. Wu, 2012. The Convergence of Information and Communication Technologies Gains Momentum. In: The Global Information Technology Report 2012: Living in a Hyperconnected World, Dutta, S. and B. Bilbao-Osorio (Eds.). Chapter 1.2, The World Economic Forum and Insead, Geneva, pp: 35-46.

Kamara, S. and K. Lauter, 2010. Cryptographic Cloud Storage. In: Financial Cryptography and Data Security, Sion, R., R. Curtmola, S. Dietrich, A. Kiayias, J.M. Miret, K. Sako and F. Sebe (Eds.). Springer, New York, pp: 136-149.

Khorshed, M.T., A.B.M. Ali and S.A. Wasimi, 2012. A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing. Future Generation Comput. Syst., 28: 833-851.
CrossRef  |  Direct Link  |  

Krutz, R.L. and R.D. Vines, 2010. Cloud Security: A Comprehensive Guide to Secure Cloud Computing. Wiley, New York, ISBN: 9780470921449, Pages: 504.

Marks, E.A. and B. Lozano, 2009. Executive's Guide to Cloud Computing. Wiley, New York.

Mell, P. and T. Grance, 2011. NIST definition of cloud computing. Special Publication 800-145, Technical Report, National Institute of Standards and Technology, Gaithersburg, MD., USA.

Reese, G., 2009. Cloud Application Architectures: Building Applications and Infrastructure in the Cloud (Theory in Practice). O'Reilly Media, Canada.

Rittinghouse, J. and J. Ransome, 2010. Cloud Computing: Implementation, Management and Security. CRC Press, Florida, USA.

Roiter, N., 2009. How to secure cloud computing. Information Security Magazine, June 21, 2009. http://searchsecurity.techtarget.com/magazineContent/How-to-Secure-Cloud-Computing.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved