Journal of Engineering and Applied Sciences

Year: 2019
Volume: 14
Issue: 15
Page No. 5250 - 5257

Data Security between Challenges and Solutions: Cryptography as a Solution in Cloud Computing

Authors : NancyAwadallah Awad

References

Abbadi, I.M. and A. Martin, 2011. Trust in the cloud [Elektronische versie]. Inform. Security Tech. Rep., 16: 108-114.

Ahmed, M. and M.A. Hossain, 2014. Cloud computing and security issues in the cloud. Int. J. Network Secur. Applic., 6: 25-36.
Direct Link  |  

Bellwood, T., S. Capell, L. Clement, J. Colgrave and M.J. Dovey et al., 2004. UDDI version 3.0.2. UDDI Spec Technical Committee Draft, OASIS, Billerica, MA., USA.

Boneh, D., A. Sahai and B. Waters, 2011. Functional encryption: Definitions and challenges. Proceedings of the International Conference on Theory of Cryptography, March 28-30, 2011, Springer, Berlin, Germany, ISBN:978-3-642-19570-9, pp: 253-273.

Chatterjee, R., S. Roy and U.G. Scholar, 2017. Cryptography in cloud computing: A basic approach to ensure security in cloud. Intl. J. Eng. Sci., 7: 11818-11821.
Direct Link  |  

Harnik, D., B. Pinkas and A. Shulman-Peleg, 2010. Side channels in cloud services: Deduplication in cloud storage. IEEE Secur. Privacy, 8: 40-47.
CrossRef  |  

Jensen, M. and N. Gruschka, 2008. Flooding attack issues of web services and service-oriented architectures. Proceedings of the International Workshop on Security for Web Services and Service-Oriented Architectures (SWSOA), September 8-13, 2008, Munich, Germany, pp: 117-122.

Jensen, M., J. Schwenk, N. Gruschka and L.L. Iacono, 2009. On technical security issues in cloud computing. Proceedings of the IEEE Conference on Cloud Computing ICCC, September 21-25, 2009, IEEE, Bangalore, India, ISBN:978-1-4244-5199-9, pp: 109-116.

Kandukuri, B.R. and A. Rakshit, 2009. Cloud security issues. Proceedings of the IEEE International Conference on Services Computing (SCC'09), September 21-25, 2009, IEEE, Bangalore, India, ISBN:978-1-4244-5183-8, pp: 517-520.

Ko, R.K., 2010. Cloud computing in plain English. XRDS., 16: 5-6.
CrossRef  |  Direct Link  |  

Kormann, D.P. and A.D. Rubin, 2000. Risks of the passport single signon protocol. Comput. Networks, 33: 51-58.
Direct Link  |  

Kumar, V., S. Chasiri and R. Ko, 2017. A Data-Centric View of Cloud Security. In: Data Security in Cloud Computing, Kumar, V., S. Chaisiri and R. Ko (Eds.). The Institution of Engineering and Technology, Michael Faraday House, Stevenage, ISBN:9781785612206, pp: 1-13.

Kuyoro, S., 2011. Cloud computing security issues and challenges. Int. J. Comput. Networks, 3: 247-255.

McIntosh, M. and P. Austel, 2005. XML signature element wrapping attacks and countermeasures. Proceedings of the 2nd ACM Workshop on Secure Web Services, Fairfax, VA, USA., November 11, 2005, ACM, New York, USA., pp: 20-27.

Mulazzani, M., S. Schrittwieser, M. Leithner, M. Huber and E. Weippl, 2011. Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space. Proceedings of the 20th USENIX Symposium on Security, August 10-12, 2011, San Francisco, California, USA., pp: 65-76.

Plossl, K., H. Federrath and T. Nowey, 2005. Protection mechanisms against phishing attacks. Proceedings of the International Conference on Trust, Privacy and Security in Digital Business, August 22-26, 2005, Springer, Berlin, Germany, ISBN:978-3-540-28224-2, pp: 20-29.

Rahaman, M.A., A. Schaad and M. Rits, 2006. Towards secure SOAP message exchange in a SOA. Proceedings of the 3rd ACM Workshop On Secure Web Services, Alexandria, VA, USA., November 3, 2006, ACM, New York, USA., pp: 77-84.

Ristenpart, T., E. Tromer, H. Shacham and S. Savage, 2009. Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds. Proceedings of the 16th ACM International Conference on Computer and Communications Security (CCS '09), November 9-13, 2009, ACM, Chicago, Illinois, USA., ISBN:978-1-60558-894-0, pp: 199-212.

Ryan, P. and S. Falvey, 2012. Trust in the clouds. Comput. Law Security Rev., 28 : 513-521.
CrossRef  |  

Scoon, C. and R.K. Ko, 2016. The data privacy matrix project: Towards a global alignment of data privacy laws. Proceedings of the 2016 IEEE International Conference on Trustcom/BigDataSE/ISPA, August 23-26, 2016, IEEE, Tianjin, China, pp: 1998-2005.

Sosinsky, B., 2011. Understanding Cloud Architecture. In: Cloud Computing Bible, Sosinsky, B.A. (Ed.). John Wiley & Sons, ‎Hoboken, New Jersey, USA., ISBN:9788126529803, pp: 45-65.

Squicciarini, A., S. Sundareswaran and D. Lin, 2010. Preventing information leakage from indexing in the cloud. Proceeding of the 3rd International IEEE Conference on Cloud Computing, July 5-10, 2010, IEEE, Miami, Florida, ISBN: 978-1-4244-8207-8, pp: 188-195.

Tan, A.Y.S., R.K.L. Ko, G. Holmes and B. Rogers, 2015. Provenance for Cloud Data Accountability. In: The Cloud Security Ecosystem: Technical, Legal, Business and Management Issues, Ko, R. and R. Choo (Eds.). Elsevier, ‎Amsterdam, Netherlands, ISBN:9780128017807, pp: 171-185.

Tan, Y.S., R.K. Ko and G. Holmes, 2013. Security and data accountability in distributed systems: A provenance survey. Proceedings of the 2013 IEEE 10th Joint International Conference on High Performance Computing and Communications and Embedded and Ubiquitous Computing, November 13-15, 2013, IEEE, Zhangjiajie, China, pp: 1571-1578.

Teneyuca, D., 2011. Internet cloud security: The illusion of inclusion. Inf. Secur. Tech. Rep., 16: 102-107.
CrossRef  |  Direct Link  |  

Timothy, D.P. and A.K. Santra, 2017. A hybrid cryptography algorithm for cloud computing security. Proceedings of the 2017 International Conference on Microelectronic Devices, Circuits and Systems (ICMDCS), August 10-12, 2017, IEEE, Vellore, India, ISBN:978-1-5386-1717-5, pp: 1-5.

Ukil, A., D. Jana and A. De Sarkar, 2013. A security framework in cloud computing infrastructure. Intl. J. Netw. Secur. Appl., 5: 11-24.
CrossRef  |  Direct Link  |  

Yu, S., W. Lou and K. Ren, 2012. Data Security in Cloud Computing. In: Handbook on Securing Cyber-Physical Critical Infrastructure, Das, S.K., K. Kant and N. Zhang (Eds.). Elsevie, Amsterdam, Netherlands, ISBN:9780124159105, pp: 392-409.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved