Security and privacy in cloud computing
Z Xiao, Y Xiao - IEEE communications surveys & tutorials, 2012 - ieeexplore.ieee.org
Recent advances have given rise to the popularity and success of cloud computing.
However, when outsourcing the data and business application to a third party causes the …
However, when outsourcing the data and business application to a third party causes the …
[PDF][PDF] Light weight encryption technique for group communication in cloud computing environment
DC Verma, AK Mohapatra, K Usmani - International Journal of Computer …, 2012 - Citeseer
Cloud computing is a typical example of distributed computing and emerged as a new
paradigm that moves computing and data away from desktop and portable PCs into large …
paradigm that moves computing and data away from desktop and portable PCs into large …
[PDF][PDF] Towards secure services in an untrusted environment
M Huber - Fifteenth International Workshop on Component …, 2010 - Citeseer
Software services offer many opportunities like reduced cost for IT infrastructure. However,
they also introduce new risks, for example losing control over data. While data can be …
they also introduce new risks, for example losing control over data. While data can be …
[PDF][PDF] Technical report: Secure cloud computing through a separation of duties
C Henrich, M Huber, C Kempka… - … für Kryptographie und …, 2010 - researchgate.net
Cloud Computing offers many opportunities but also introduces new risks. A user who
outsources a database into the Cloud loses control over his data. While the data can be …
outsources a database into the Cloud loses control over his data. While the data can be …
[PDF][PDF] Double key encryption method (DKEM) algorithms using ANN for data storing and retrieval in cloud computing
TJ Singh, S Jeya - IOSR J. Comput. Eng, 2013 - academia.edu
Cloud computing is generally recognized as a technology which will have a significant
impact on Information Technology in the future. The cloud computing data security has …
impact on Information Technology in the future. The cloud computing data security has …
An approach to Completely Searchable Encryption
R Haynberg, FPDJ Müller-Quade - Tagungsband des 12. Kryptotags - scholar.archive.org
Bei der bloßen Speicherung bietet Verschlüsselung einen ausreichenden Schutz, sollen die
Daten aber vom Dienstleister durchsucht werden, ist dies mit den meisten …
Daten aber vom Dienstleister durchsucht werden, ist dies mit den meisten …
[PDF][PDF] Cyber Times International Journal of Technology & Management
Cyber espionage has increased dramatically over the last few years at the government,
corporate and individual levels. The cyberspace has become the latest domain of …
corporate and individual levels. The cyberspace has become the latest domain of …
[图书][B] Risk Analysis for Exploring the Opportunities in Cloud Outsourcing
M Kommineni, R Parvathi - 2013 - diva-portal.org
ABSTRACT Context: Cloud Outsourcing is a new form of outsourcing which is not more
under implementation and yet to be implemented. It is a form of outsourcing in which …
under implementation and yet to be implemented. It is a form of outsourcing in which …
Methods to secure services in an untrusted environment
M Huber, J Müller-Quade - 2011 - dl.gi.de
Software services offer many opportunities like reduced cost for IT infrastructure. They also
introduce new risks, for example the clients lose control over their data. While data can be …
introduce new risks, for example the clients lose control over their data. While data can be …