Asian Journal of Information Technology

Year: 2016
Volume: 15
Issue: 20
Page No. 4102 - 4105

Effective Storing and Managing of Data in a Multicast Communication Over Cloud Environment

Authors : Lino Abraham Varghese and S. Bose

References

Ateniese, G., R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson and D. Song, 2007. Provable data possession at untrusted stores. Proceedings of the 14th ACM Conference on Computer and Communications Security, October 29, 2007, Alexandria, Virginia, USA., pp: 598-609.

Dean, J. and S. Ghemawat, 2008. Map Reduce: Simplified data processing on large clusters. Commun. ACM., 51: 107-113.
CrossRef  |  Direct Link  |  

Gutmann, P., 1996. Secure deletion of data from magnetic and solid-state memory. Proceedings of the 6th USENIX Symposium on Security Symposium, July 22-25, 1996, USENIX, San Jose, California, pp: 77-90.

Juels, A. and B.S.Jr. Kaliski, 2007. PORs: Proofs of retrievability for large files. Proceedings of the 14th ACM Conference on Computer and Communications Security, October 29-November 2, 2007, ACM, New York, USA., ISBN:978-1-59593-703-2, pp: 584-597.

Tang, Y., P.P.C. Lee, J.C.S. Lui and R. Perlman, 2012. Secure overlay cloud storage with file assured deletion. IEEE. Trans. Dependable Secure Comput., 9: 903-916.

Zeng, L., S. Chen, Q. Wei and D. Feng, 2012. Sedas: A self-destructing data system based on active storage framework. Proceedings of the IEEE Conference on APMRC 2012 Digest, October 31- November 2, 2012, IEEE, New York, USA., ISBN:978-1-4673-4734-1, pp: 1-8.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved