Journal of Engineering and Applied Sciences

Year: 2019
Volume: 14
Issue: 10
Page No. 3359 - 3365

An Updated Hybrid Cryptography Based Security for Cloud Computing System

Authors : G. Narmadhai and S. Vijay Bhanu

References

Cao, N., C. Wang, M. Li, K. Ren and W. Lou, 2014. Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE. Transac. parallel Distrib. Syst., 25: 222-233.
CrossRef  |  Direct Link  |  

Choi, C., J. Choi and P. Kim, 2014. Ontology-based access control model for security policy reasoning in cloud computing. J. Supercomput., 67: 711-722.
CrossRef  |  Direct Link  |  

Chu, C.K., S.S. Chow, W.G. Tzeng, J. Zhou and R.H. Deng, 2014. Key-aggregate cryptosystem for scalable data sharing in cloud storage. IEEE. Trans. Parallel Distrib. Syst., 25: 468-477.
CrossRef  |  Direct Link  |  

Darwazeh, N.S., R.S. Al-Qassas and F. AlDosari, 2015. A secure cloud computing model based on data classification. Procedia Comput. Sci., 52: 1153-1158.
CrossRef  |  Direct Link  |  

Darwazeh, N.S., R.S. Al-Qassas and F. AlDosari, 2015. A secure cloud computing model based on data classification. Procedia Comput. Sci., 52: 1153-1158.
CrossRef  |  Direct Link  |  

Do, J.M., Y.J. Song and N. Park, 2011. Attribute based proxy re-encryption for data confidentiality in cloud computing environments. Proceedings of the 1st ACIS/JNU International Conference on Computers, Networks, Systems and Industrial Engineering, May 23-25, 2011, IEEE, Jeju Island, South Korea, ISBN:978-1-4577-0180-1, pp: 248-251.

Fabian, B., T. Ermakova and P. Junghanns, 2014. Collaborative and secure sharing of healthcare data in multi-clouds. Inform. Syst., 48: 132-150.
Direct Link  |  

Hong, H. and Z. Sun, 2016. An efficient and traceable KP-ABS scheme with untrusted attribute authority in cloud computing. J. Cloud Comput., 5: 1-8.
CrossRef  |  Direct Link  |  

Jiang, T., X. Chen, Q. Wu, J. Ma and W. Susilo et al., 2017. Secure and efficient cloud data deduplication with randomized tag. IEEE. Trans. Inf. Forensics Secur., 12: 532-543.
CrossRef  |  Direct Link  |  

King, N.J. and V.T. Raja, 2012. Protecting the privacy and security of sensitive customer data in the cloud. Comput. Law Secur. Rev., 28: 308-319.
Direct Link  |  

Lacuesta, R., J. Lloret, M. Garcia and L. Penalver, 2011. Two secure and energy-saving spontaneous ad-hoc protocol for wireless mesh client networks. J. Netw. Comput. Appl., 34: 492-505.
CrossRef  |  Direct Link  |  

Li, J., X. Huang, J. Li, X. Chen and Y. Xiang, 2014. Securely outsourcing attribute-based encryption with checkability. IEEE. Trans. Parallel Distrib. Syst., 25: 2201-2210.
CrossRef  |  Direct Link  |  

Li, M., S. Yu, Y. Zheng, K. Ren and W. Lou, 2013. Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans. Parallel Distrib. Syst., 24: 131-143.
CrossRef  |  Direct Link  |  

Modi, C., D. Patel, B. Borisaniya, A. Patel and M. Rajarajan, 2013. A survey on security issues and solutions at different layers of Cloud computing. J. Supercomputing, 63: 561-592.
CrossRef  |  Direct Link  |  

Ranchal, R., B. Bhargava, L.B. Othmane, L. Lilien and A. Kim et al., 2010. An approach for preserving privacy and protecting personally identifiable information in cloud computing. Proceedings of the 29th IEEE International Symposium on Reliable Distributed Systems (SRDS 2010), October 31-November 3, 2010, IEEE, New Delhi, India, pp: 368-372.

Ruj, S., M. Stojmenovic and A. Nayak, 2012. Privacy preserving access control with authentication for securing data in clouds. Proceeding of the 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid), May13-16, 2012, IEEE, Ontario, Canada, ISBN:978-1-4673-1395-7, pp: 556-563.

Ruj, S., M. Stojmenovic and A. Nayak, 2014. Decentralized access control with anonymous authentication of data stored in clouds. Parallel Distrib. Syst. IEEE. Trans., 25: 384-394.
CrossRef  |  Direct Link  |  

Samanthula, B.K., Y. Elmehdwi, G. Howser and S. Madria, 2015. A secure data sharing and query processing framework via federation of cloud computing. Inf. Syst., 48: 196-212.
CrossRef  |  Direct Link  |  

Singh, S., Y.S. Jeong and J.H. Park, 2016. A survey on cloud computing security: Issues, threats and solutions. J. Network Comput. Appl., 75: 200-222.
Direct Link  |  

Wang, H., S. Wu, M. Chen and W. Wang, 2014. Security protection between users and the mobile media cloud. IEEE. Commun. Mag., 52: 73-79.
CrossRef  |  Direct Link  |  

Wei, L., H. Zhu, Z. Cao, X. Dong and W. Jia et al., 2014. Security and privacy for storage and computation in cloud computing. Inf. Sci., 258: 371-386.
CrossRef  |  Direct Link  |  

Xu, Z., W. Kang, R. Li, K. Yow and C.Z. Xu, 2012. Efficient multi-keyword ranked query on encrypted data in the cloud. Proceedings of the IEEE 18th International Conference on Parallel and Distributed Systems, December 17-19, 2012, Singapore, pp: 244-251.

Yan, Q. and F.R. Yu, 2015. Distributed denial of service attacks in software-defined networking with cloud computing. IEEE. Commun. Mag., 53: 52-59.
CrossRef  |  Direct Link  |  

Younis, Y.A., K. Kifayat and M. Merabti, 2014. An access control model for cloud computing. J. Inf. Secur. Appl., 19: 45-60.
Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved