Cloud Data Security and Integrity using Sack of Cryptographic Algorithms through Trusted Third Party (TTP)
Abstract
Full Text:
PDFReferences
Syed Rizvi, Katie Cover, Christopher Gates, A Trusted Third Party (TTP)
based Encryption Scheme for Ensuring Data Confidentiality in Cloud
Environment, ScienceDirect ELSEVIER, journal Procedia Computer Science
, 2014, 381-386.
. S. Arul Oli, L. Arockiam ,A Novel Approach for Ensuring Data Con-
fidentiality in Public Cloud Storage, International Journal of Computer
Applications (0975 8887).Advanced Computing and Communication
Techniques for High Performance Applications (ICACCTHPA-2014),
, 1-5.
Muralikrishnan Ramane, Bharath Elangovan,A Metadata Verification
Scheme ForData Auditing In Cloud Environment, International Journal
on Cloud Computing: Services and Architecture(IJCCSA),Vol.2, No.4,
August 2012, 1-10.
Priyadarshini Patil, Prashant Narayankar, Narayan D G, Meena S M,A
Comprehensive Evaluation of Cryptographic Algorithms: DES,3DES,
AES, RSA and Blowfish., ScienceDirect ELSEVIER, journal Procedia
Computer Science 78, 2016, 617-624.
Qian Wang, Cong Wang, Kui Ren, Wenjing Lou, and Jin Li,Enabling
Public Auditability and Data Dynamics for Storage Security in Cloud
Computing, IEEE Transactions on parallel and Distributed System,vol.22,
no.5, May2011, 847-859.
Dilli Ravilla, Chandra Shekar Reddy Putta, Enhancing the Security of
MANETs Using Hash Algorithms, ScienceDirect ELSEVIER, journal
Procedia Computer Science 54, 2015, 196-206.
Triveni A. Bhalerao, Prof. N. P. Kulkarni, Survey on Secure Cloud Data
Sharing Using Trusted Third Party, International Journal of Innovative
Research in Computer and Communication Engineering (An ISO 3297:
Certified Organization) Vol. 4, Issue 10, October 2016, 1-4.
Mr. Manish M Potey, Dr C A Dhote, Mr Deepak H Sharma, Homomorphic
Encryption for Security of Cloud Data, ScienceDirect ELSEVIER,
journal Procedia Computer Science 79, 2016, 175 181.
Naresh vurukonda, B.Thirumala Rao, A Study on Data Storage Security
Issues in Cloud Computing, ScienceDirect ELSEVIER, journal Procedia
Computer Science 92, 2016, 128 135.
Akashdeep Bhardwaj, GVB Subrahmanyam, Vinay Avasthi, Hanumat
Sastry, Security Algorithms for Cloud Computing, ScienceDirect ELSEVIER,
journal Procedia Computer Science 85, 2016, 535 542.
K.Devika, M.Jawahar, Review On: Cryptographic Algorithms for Data
Integrity Proofs in Cloud Storage, International Journal of Engineering
Trends and Applications (IJETA) Volume 2 Issue 1, Jan-Feb 2015, 14-19.
Niels Ferguson, Richard Schroeppel, and Doug Whiting, A simple
algebraic representation of Rijndael, Proceeding of Selected Areas in
Cryptography, 2001, Lecture notes in computer science, Springer-Verlag,
, 103-111.
Refbacks
- There are currently no refbacks.
Copyright © IJETT, International Journal on Emerging Trends in Technology