Asian Journal of Information Technology

Year: 2016
Volume: 15
Issue: 16
Page No. 2937 - 2942

Proxy Server for Secure Document Retrieval in Cloud Computing

Authors : R. Kalaiselvi, K. Kousalya and S. Chandramathi

References

Almulla, S.A. and C.Y. Yeun, 2010. Cloud computing security management. Proceedings of the 2nd International Conference on Engineering Systems Management and its Applications, March 30-April 1, Sharjah, pp: 1-7.

Anuchart, T. and G. Gong, 2011. ABE based authorization in semi-trusted cloud computing proceeding data cloud. Proceedings of the Second International Workshop on Data Intensive Computing in the Clouds, November 12-18, 2011, ACM, Seattle, Washington, USA., ISBN:978-1-4503-1144-1, pp: 41-50.

Bethencourt, J., A. Sahai and B. Waters, 2007. Ciphertext-policy attribute-based encryption. Proceedings of the IEEE Symposium on Security and Privacy, May 20-23, 2007, Berkeley, CA., USA., pp: 321-334.

Bhisikar, P. and A. Sahu, 2013. Security in data storage and transmission in cloud computing. Int. J. Adv. Res. Comput. Sci. Software Eng., 3: 410-415.

Inbarani, W.S., G.S. Moorthy and C.K.C. Paul, 2013. An approach for storage security in cloud computing-a survey. Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET.), 2: 174-179.
Direct Link  |  

Jung, T., X.Y. Li, Z. Wan and M. Wan, 2015. Control cloud data access privilege and anonymity with fully anonymous attribute-based encryption. IEEE. Trans. Inf. Forensics Security, 10: 190-199.
CrossRef  |  Direct Link  |  

Kandias, M., N. Virvilis and D. Gritzalis, 2011. The Insider Threat in Cloud Computing. In: Critical Information Infrastructure Security. Sandro, B., B. Hammerli, D. Gritzalis and S. Wolthusen (Eds.). Springer, Berlin, Germany, ISBN:978-3-642-41475-6, pp: 93-103.

Pothumani, B. and A. Gosh, 2015. Literature survey on collaborative cloud computing for sharing resource in trustworthy manner. Int. J. Innovative Res. Comput. Commun. Eng., 3: 2391-2397.
Direct Link  |  

Prakash, G.L., M. Prateek and I. Singh, 2014. Data encryption and decryption algorithms using key rotations for data security in cloud system. Proceedings of the 2014 International Conference on Signal Propagation and Computer Technology (ICSPCT.), July 12-13, 2014, IEEE, New York, USA., ISBN:978-1-4799-3140-8, pp: 624-629.

Priyadharshini, B., C.M. Belinda and M.R. Kumar, 2013. A secure code based cloud storage system using proxy re-encryption scheme in cloud computing. IOSR. J. Comput. Eng. (IOSR-JCE.), 9: 22-27.
Direct Link  |  

Purohit, B. and P.P. Singh, 2013. Data leakage analysis on cloud computing. Int. J. Eng. Res. Appl. (IJERA.), 3: 1311-1316.
Direct Link  |  

Santosh, L. and S. Dudhani, 2015. Secure key for authentication and secret sharing in cloud computing. Int. J. Adv. Res. Comput. Sci. Software Eng., 5: 1008-1011.
Direct Link  |  

Shaikh, F.B. and S. Haider, 2011. Security threats in cloud computing. Proceedings of the International Conference on Internet Technology and Secured Transactions, December 11-14, 2011, Abu Dhabi, pp: 214-219.

Soofi, A.A. and M.I. Khan, 2014. Encryption techniques for cloud data confidentiality. Int. J. Grid Distrib. Comput., 7: 11-20.
Direct Link  |  

Sun, Y., J. Zhang, Y. Xiong and G. Zhu, 2014. Data security and privacy in cloud computing. Int. J. Distrib. Sensor Networks, 2014: 1-9.
Direct Link  |  

Tebaa, M., S. El Hajji and A. El Ghazi, 2012. Homomorphic encryption applied to the cloud computing security. Proceedings of the World Congress on Engineering, Volume 1, July 4-6, 2012, London, UK., pp: 1-4.

Yan, L., C. Rong and G. Zhao, 2009. Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography. Proceedings of the IEEE International Conference on Cloud Computing, December 1-4, 2009, Springer, Berlin, Germany, ISBN:978-3-642-10664-4, pp: 167-177.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved