References
[1]. Chu, C. K., Chow, S. S., Tzeng, W. G., Zhou, J., & Deng,
R. H. (2014). Key-aggregate cryptosystem for scalable
data sharing in cloud storage. IEEE Transactions on
Parallel and Distributed Systems, 25(2), 468-477.
[2]. Kandukuri, B. R., & Rakshit, A. (2009, September).
Cloud security issues. In Services Computing, 2009. SCC'09. IEEE International Conference on (pp. 517-520).
IEEE.
[3]. Kaufman, L. M. (2009). Data security in the world of
cloud computing. IEEE Security & Privacy, 7(4), 62-64.
[4]. Khedkar, S. V., & Gawande, A. D. (2014). Data
partitioning technique to improve cloud data storage
security. International Journal of Computer Science and
Information Technologies, 5(3), 3347-50.
[5]. López-Alt, A., Tromer, E., & Vaikuntanathan, V. (2012,
May). On-the-fly multiparty computation on the cloud via
multikey fully homomorphic encryption. In Proceedings of
the 44th Annual ACM Symposium on Theory of Computing
(pp. 1219-1234). ACM.
[6]. Mohamed, E. M., Abdelkader, H. S., & El-Etriby, S.
(2012, May). Enhanced data security model for cloud
computing. In Informatics and Systems (INFOS), 2012 8th
International Conference on (pp. CC-12). IEEE.
[7]. Ren, K., Wang, C., & Wang, Q. (2012). Security
challenges for the public cloud. IEEE Internet Computing,
16(1), 69-73.
[8]. Sood, S. K. (2012). A combined approach to ensure
data security in cloud computing. Journal of Network and
Computer Applications, 35(6), 1831-1838.
[9]. Wang, B., Chow, S. S., Li, M., & Li, H. (2013, July).
Storing shared data on the cloud via security-mediator. In Distributed Computing Systems (ICDCS), 2013 IEEE 33rd
International Conference on (pp. 124-133). IEEE.
[10]. Wang, Q., Wang, C., Li, J., Ren, K., & Lou, W. (2009).
Enabling public verifiability and data dynamics for
storage security in cloud computing. Computer
Security–ESORICS 2009, 355-370.
[11]. Ye, Y., Xiao, L., Yen, I. L., & Bastani, F. (2010,
December). Cloud storage design based on hybrid of
replication and data partitioning. In Parallel and
Distributed Systems (ICPADS), 2010 IEEE 16th International
Conference on (pp. 415-422). IEEE.