Cloud Based Secure Data Segmentation Techniques
Abstract
Full Text:
PDFReferences
Hassan Takabi James B.D. Joshi, ”Security and Privacy Challenges in Cloud Computing Environments,”. IEEE Security Privacy Volume: 8, Issue: 6, Nov.-Dec. 2010
Farzad Sabahi, ”Cloud Computing Security Threats and Responses,”. Communication Software and Networks (ICCSN), IEEE 3rd International Conference 2011.
Ashish Agarwal, Aparna Agarwal,”The Security Risks Associated with Cloud Computing,” International Journal of Computer Applications in Engineering Sciences ,VOL I, SPECIAL ISSUE ON CNS, ISSN: 2231- 4946 ,JULY 2011.
Ashutosh Kumar Dubey, Animesh Kumar Dubey, Mayank Namdev, Shiv Shakti Shrivastava,”Cloud-User Security Based on RSA and MD5 Algorithm for Resource Attestation and Sharing in Java Environmen,”. Software Engineering (CONSEG), CSI Sixth International Conference,
Sept. 2012
M.Venkatesh, M.R.Sumalatha, Mr.C.SelvaKumar ,”Improving Public Auditability, Data Possession in Data Storage Security for Cloud Computing,” Recent Trends In Information Technology (ICRTIT), International Conference, April 2012
Prashant Rewagad, Yogita Pawar ,”Use of Digital Signature with Diffie Hellman Key Exchange and AES Encryption Algorithm to Enhance Data Security in Cloud Computing,” International Conference on Communica- tion Systems and Network Technologies 2013.
Kuyoro S. O, Ibikunle.F and Awodele O, ”Challenges and Security Issues in Cloud Computing,” International Journal of Computer Networks, Vol. 3, No. 5, 2011 pp. 247-255,
Aderemi A. Atayero, Oluwaseyi Feyisetan , ”Security Issues in Cloud Computing: The Potentials of Homomorphic Encryption,” Journal of Emerging Trends in Computing and Information Sciences, Vol. 2, No. 10, October 2011
[9] Hai Yan, Zhijie Jerry Shi. ,” Software Implementations of Elliptic Curve Cryptography. Information Technology: New Generations,” Third International Conference, April 2006.
Refbacks
- There are currently no refbacks.
Copyright © IJETT, International Journal on Emerging Trends in Technology