Asian Journal of Information Technology

Year: 2016
Volume: 15
Issue: 23
Page No. 4732 - 4743

Secure Data Transaction and Forwarding in Cloud Environment

Authors : K.L. Neela and V. Kavitha

References

Ajoudanian, S. and M.R. Ahmadi, 2012. A novel data security model for cloud computing. Int. J. Eng. Technol., 4: 326-326.
Direct Link  |  

Baek, J., Q.H. Vu, J.K. Liu, X. Huang and Y. Xiang, 2015. A secure cloud computing based framework for big data information management of smart grid. IEEE. Trans. Cloud Comput., 3: 233-244.
CrossRef  |  Direct Link  |  

Bhoyar, R. and N. Chopde, 2013. Cloud computing: Service models, types, database and issues. Int. J. Adv. Res. Comput. Sci. Software Eng., Vol. 3,

Bonnecaze, A., P. Liardet, A. Gabillon and K. Blibech, 2006. Secure Time-Stamping Schemes: A Distributed Point of View. Ann. Telecommun., 61: 662-681.
CrossRef  |  Direct Link  |  

Chang, V. and M. Ramachandran, 2016. Towards achieving data security with the cloud computing adoption framework. IEEE. Trans. Serv. Comput., 9: 138-151.
CrossRef  |  Direct Link  |  

Geetanjali, C. and A. Jainul,. 2014. Modified secure two way authentication system in cloud computing using encrypted one time password. Int. J. Comput. Sci. Inf. Technol., 5: 4077-4080.

Gomathi, S. and D. Manimegalai, 2014. Keyless cryptography in grid computing using cyclic shift transposition algorithm. J. Theor. Appl. Inf. Technol., 63: 112-118.
Direct Link  |  

Gonzales, D., J. Kaplan, E. Saltzman, Z. Winkelman and D. Woods, 2015. Cloud-trust-a security assessment model for Infrastructure as a Service (IaaS) clouds. IEEE. Trans. J. Gonzales, 2015: 1-1.
CrossRef  |  Direct Link  |  

Grossman, R.L., 2009. The case for cloud computing. IT. Prof., 11: 23-27.
CrossRef  |  Direct Link  |  

Horwitz, J. and B. Lynn, 2002. Toward Hierarchical Identity-based Encryption. In: Advances in Cryptology, Knudsen, L. (Ed.). Springer, Berlin, Heidelberg, ISBN: 978-3-540-43553-2, pp: 466-481.

Inbarani, W.S., G. Shenbagamoorthy and C.K.C. Paul, 2013. Proxy re-encryption schemes for data storage security in cloud-a survey. Int. J. Eng. Res. Technol., Vol. 2,

Jegadeeswari, S., P. Dinadayalan and N. Gnanambigai, 2015. A neural data security model: Ensure high confidentiality and security in cloud datastorage environment. Proceedings of the 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI), August 10-13, 2015, IEEE, Puducherry, India, ISBN: 978-1-4799-8790-0, pp: 400-406.

Kalaikavitha and J. Ganaselvi, 2013. Secure login using encrypted One Time Password (OTP) and mobile based login methodology. Int. J. Eng. Sci., 2: 14-17.
Direct Link  |  

Kanade, M.A., M.R. Mule, M.M. Shuaib and N.M. Nagvekar, 2015. Improving cloud security using data partitioning and encryption technique. Int. J. Eng. Res. Gen. Sci., 3: 1245-1252.
Direct Link  |  

Kant, D.C. and Y. Sharma, 2013. Enhanced security architecture for cloud data security. Int. J. Adv. Res. Comput. Sci. Software Eng., 3: 571-575.

Lin, H.Y. and W.G. Tzeng, 2012. A secure erasure code-based cloud storage system with secure data forwarding. IEEE Transact. Parallel Distributed Syst., 23: 995-1003.
Direct Link  |  

Mambo, M. and E. Okamoto, 1997. Proxy cryptosystems: Delegation of the power to decrypt ciphertexts. IEICE Trans. Fund. Elect. Commun. Comput. Sci., E80-A/1: 54-63.
Direct Link  |  

Mell, P. and T. Grance, 2011. The NIST definition of cloud computing. NIST Special Publication No. 800-145, National Institute of Standard and Technology, U.S. Department of Commerce, September 2011.

Mohamed, E.M., H.S. Abdelkader and E.S. Etriby, 2013. Data security model for cloud computing. J. Commun. Comput., 10: 1047-1062.

Murthy, S., 2014. Cryptographic secure cloud storage model with anonymous authentication and automatic file recovery. J. Soft Comput., 5: 844-849.
Direct Link  |  

Nepal, S., R. Sinnott, C. Friedrich, C. Wise and S. Chen et al., 2015. TruXy: Trusted storage cloud for scientific workflows. IEEE. Trans. Cloud Comput., 2015: 1-14.
CrossRef  |  

Omar, M.N., M. Salleh and M. Bakhtiari, 2014. Biometric encryption to enhance confidentiality in cloud computing. Proceedings of the 2014 International Symposium on Biometrics and Security Technologies (ISBAST), August 26-27, 2014, IEEE, Johor Bahru, Malaysia, ISBN: 978-1-4799-6444-4, pp: 45-50.

Oppliger, R., 2011. Contemporary Cryptography. 2nd Edn., Artech House, Boston, Massachusetts, ISBN: 978-1-60807-145-6, Pages: 559.

Rajasekaran, S., 2013. Authentication based cloud storage and secure data forwarding. Int. J. Comput. Technol., 4: 106-110.

Rao, S., S. Gujrathi, M. Sanghvi and S. Shah, 2014. Analysis on data integrity in cloud environment. J. Comput. Eng., 16: 71-76.
Direct Link  |  

Richa, C. and R. Satyakshma, 2013. One time password for multi-cloud environment. Int. J. Adv. Res. Comput. Sci. Software Eng., 3: 594-597.
Direct Link  |  

Ruj, S., M. Stojmenovic and A. Nayak, 2014. Decentralized access control with anonymous authentication of data stored in clouds. Parallel Distrib. Syst. IEEE. Trans., 25: 384-394.
CrossRef  |  Direct Link  |  

Selvi, R.K. and V. Kavitha, 2012. Crypto system based authentication using CSTA in grid. Int. J. Comput. Appl., 48: 45-51.

Singh, N. and G. Raj, 2012. Security on bccp trough AES encryption technique. Spec. Issue Int. J. Eng. Sci. Adv. Technol., 2: 813-819.
Direct Link  |  

Sonali, A.W. and B. Tidke, 2015. Securely data forwarding and maintaining reliability of data in cloud computing. Int. J. Eng. Res. Appl., 5: 72-78.
Direct Link  |  

Srinivasulu, A., C.D. Subbarao and A. Bhudevi, 2014. Dynamic data storage publishing and forwarding in cloud using fusion security algorithms. Comput. Sci. Inf. Technol., 2: 203-210.
Direct Link  |  

Xia, Z., Y. Zhu, X. Sun, Z. Qin and K. Ren, 2015. Towards privacy-preserving content-based image retrieval in cloud computing. IEEE. Trans. Comput. Comput., 2015: 1-11.
CrossRef  |  Direct Link  |  

Yang, K., X. Jia, K. Ren, B. Zhang and R. Xie, 2013. DAC-MACS: Effective data access control for multiauthority cloud storage systems. IEEE. Trans. Inf. Forensics Secur., 8: 1790-1801.
CrossRef  |  Direct Link  |  

Zhao, F., T. Nishide and K. Sakurai, 2011. Realizing Fine-Grained and Flexible Access Control to Outsourced Data with Attribute-Based Cryptosystems. In: Information Security Practice and Experience. Feng, B. and J. Weng (Eds.). Springer Berlin Heidelberg, Berlin, Germany, ISBN: 978-3-642-21030-3, pp: 83-97.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved