An efficient security solution for cloud environment

作者: Subhash Chandra Pandey

DOI: 10.1109/SCOPES.2016.7955583

关键词:

摘要: Cloud Computing has been visualized as the next generation technology of IT industries. The cloud is a platform where data owner can remotely store their in to avail high quality applications and services. model services are provided user through service provider (CSP) on pay per use basis. CSP manages client at centre. security safety issues major challenge before computing technology. well managed issue provides better build trust consumers transfer into cloud. There many aspects pertaining such integrity, confidentiality, privacy. These components affect performance environment. In this paper attempt made review from point view challenges more specifically storage

参考文章(45)
Lars Braubach, Alexander Pokahr, Kai Jander, JadexCloud - An Infrastructure for Enterprise Cloud Applications Multiagent System Technologies. pp. 3- 15 ,(2011) , 10.1007/978-3-642-24603-6_3
Mohammad Hamdaqa, Ladan Tahvildari, Cloud Computing Uncovered: A Research Landscape Advances in Computers. ,vol. 86, pp. 41- 85 ,(2012) , 10.1016/B978-0-12-396535-6.00002-8
Hovav Shacham, Brent Waters, Compact Proofs of Retrievability international conference on the theory and application of cryptology and information security. pp. 90- 107 ,(2008) , 10.1007/978-3-540-89255-7_7
Yuval Elovici, Ronen Waisenberg, Erez Shmueli, Ehud Gudes, A Structure Preserving Database Encryption Scheme Lecture Notes in Computer Science. pp. 28- 40 ,(2004) , 10.1007/978-3-540-30073-1_3
Tariq Ehsan Elahi, Siani Pearson, Privacy assurance: bridging the gap between preference and practice trust and privacy in digital business. pp. 65- 74 ,(2007) , 10.1007/978-3-540-74409-2_9
Krishna P. Gummadi, Nuno Santos, Rodrigo Rodrigues, Towards trusted cloud computing ieee international conference on cloud computing technology and science. pp. 1- 5 ,(2009)
CR Attanasio, None, Virtual machines and data security Proceedings of the workshop on virtual computer systems on -. pp. 206- 209 ,(1973) , 10.1145/800122.803960
Rajkumar Buyya, Chee Shin Yeo, Srikumar Venugopal, James Broberg, Ivona Brandic, None, Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility Future Generation Computer Systems. ,vol. 25, pp. 599- 616 ,(2009) , 10.1016/J.FUTURE.2008.12.001
Guomin Yang, Duncan S. Wong, Huaxiong Wang, Xiaotie Deng, Two-factor mutual authentication based on smart cards and passwords Journal of Computer and System Sciences. ,vol. 74, pp. 1160- 1172 ,(2008) , 10.1016/J.JCSS.2008.04.002
Al-kindy Athman Abdalla, Al-Sakib Khan Pathan, On Protecting Data Storage in Mobile Cloud Computing Paradigm IETE Technical Review. ,vol. 31, pp. 82- 91 ,(2014) , 10.1080/02564602.2014.891382