Asian Journal of Information Technology

Year: 2016
Volume: 15
Issue: 7
Page No. 1199 - 1206

Examining the Security and Privacy Practices in Cloud Computing

Authors : P. Thinakaran and S. Chitra

References

Ateniese, G., R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson and D. Song, 2007. Provable data possession at untrusted stores. Proceedings of the 14th ACM Conference on Computer and Communications Security, October 29, 2007, Alexandria, Virginia, USA., pp: 598-609.

Ateniese, G., R. di Pietro, L.V. Mancini and G. Tsudik, 2008. Scalable and efficient provable data possession. Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, September 22-25, 2008, New York, USA., pp: 1-11.

Buyya, R., C.S. Yeo and S. Venugopal, 2008. Market-Oriented cloud computing: Vision, Hype and reality for delivering IT services as computing utilities. Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications, September 26-28, 2008, Houston, USA., pp: 5-13.

Dodis, Y., S. Vadhan and D. Wichs, 2009. Proofs of Retrievability via Hardness Amplification. In: Theory of Cryptography. Reingold, O. (Ed.). Springer Berlin Heidelberg, Heidelberg, Germany, ISBN: 978-3-642-00456-8, pp: 109.

Foster, I., Y. Zhao, I. Raicu and S. Lu, 2008. Cloud computing and grid computing 360-degree compared. Proceedings of the Grid Computing Environments Workshop, November 12-16, 2008, Austin, TX., USA., pp: 1-10.

Geelan, J., 2009. Twenty-one experts define cloud computing. Cloud Comput. J., 2: 1-5.

Gruschka, N. and M. Jensen, 2010. Attack surfaces: A taxonomy for attacks on cloud services. Proceedings of the IEEE 3rd International Conference on Cloud Computing, July 05-10, Miami, Florida, pp: 276-279.

Juels, A. and B.S. Kaliski Jr, 2007. PORs: Proofs of retrievability for large files. Proceedings of the 14th ACM Conference on Computer and Communications Security, October 29-November 02, 2007, ACM, New York, USA, ISBN: 978-1-59593-703-2, pp: 584-597.

Lombardi, F.and R.D. Pietro, 2010. Transparent security for cloud. Proceedings of the ACM Symposium on Applied Computing, March 22-26, 2010, ACM, New York, NY, USA., ISBN: 978-1-60558-639-7, pp: 414-415.

Pearson, S., 2009. Taking account of privacy when designing cloud computing services. Proceedings of the ICSE Workshop on Software Engineering Challenges of Cloud Computing, May 22-23, 2009, Vancouver, Canada, pp: 44-52.

Ristenpart, T., E. Tromer, H. Shacham and S. Savage, 2009. Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds. Proceedings of the the 16th ACM Conference on Computer and Communications Security, November 9-13, 2009, Chicago, IL., USA., pp: 199-212.

Squicciarini, A., S. Sundareswaran and D. Lin, 2010. Preventing information leakage from indexing in the cloud. Proceeding of the 3rd International IEEE Conference on Cloud Computing, July 5-10, 2010, IEEE, Miami, Florida, ISBN: 978-1-4244-8207-8, pp: 188-195.

Vaquero, L.M., L. Rodero-Merino and D. Moran, 2011. Locking the sky: A survey on IaaS cloud security. Computing, 91: 93-118.
CrossRef  |  

Vimercati, S.D.C.D., S. Foresti, S. Jajodia, S. Parabosch and P. Samarati, 2007. A data outsourcing architecture combining cryptography and access control. Proceedings of the ACM Workshop on Computer Security Architecture, October29-November 02, 2007, ACM, Alexandria, VA, USA., ISBN: 978-1-59593-890-9, pp: 63-69.

Xiao, Z. and Y. Xiao, 2013. Security and privacy in cloud computing. Commun. Surv. Tutorials IEEE., 15: 843-859.
CrossRef  |  Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved