References
[1]. Pei-ShanChung, MinShiang, and Chi-Wei LiuHwang.,
(2014). ”A Study of Attribute-based Proxy Re
encryption Scheme in Cloud Environments”, International
Journal of Network Security, Vol.16, No.1, pp.1-13.
[2]. J.Geelan., (2008). ”Twenty one experts define
cloud
computing Virtualization”. ElectronicMag.
[3]. R.Buyya,C.S.Yeo, and S.Venugopal.,(2008).
”Market
oriented cloud computing: Vision, hype, and reality for
delivering it services as computing utilities”, 10th IEEE
International Conference on High performance
computing and communications, pp. 5-13.
[4]. Luis M. Vaquero, Luis Rodero Merino and Daniel
Mora´n.,(2010). ”Locking the sky:a survey on IaaS cloud
security”, Computing, DOI:10.1007/s00607-010-0140-x.
[5].Vascellaro JE (2009). ”Google disclose privacy
glitch”.
http://blogs.wsj.com/digits/2009/03/08/1214/
[6]. Aized Amin Soofi, M.Irfan Khan and Fazal-e-
Amin.,(2014). “Encryption Techniques for Cloud Data
Confidentiality”, International Journal of Grid Distribution
Computing, Vol.7, No.4, pp.11-20.
[7]. Heiser J, Nicolett M.,(2009). ”Assessing the
security
risks of cloud computing”. Gartner Report.
[8]. http://whatis.tech target. com/ definition/
Confidentiality-integrity-and-availability-CIA
[9]. http://www.cloud-competence-center.com/
understanding /cloud-computing-security/
[10]. Eckert, Claudia.,(2009). IT-Sicherheit. Oldenbourg,
th 6 .edition, pp. 1-981.
[11]. Aleksandar Hudic, Shareeful Islam, Peter Kieseberg,
Edgar R. Weippl. (2012). ”Data Confidentiality using
Fragmentation in Cloud Computing”,Int J.Communication Network and
Distributed systems, Vol. 1,
No. 3/4.
[12]. Yanpei Chen, Vern Paxson, and Randy H.
Katz.,(2010). “Whats new about cloud computing
security?”, Tech. Report UCB/EECS-2010-5, EECS
Department, University of California, Berkeley.
[13]. Wood K, Pereira E., (Nov.2010). “An
Investigation into
CLoud Configuration and Security ”, International
Conference for Internet Technology and Secured
Transactions, pp. 1-6.
[ 1 4 ] . Venkata Sravan Kumar Maddineni, Shivashanker
Ragi. (2011). “Security Techniques for
Protecting Data in Cloud Computing”, Master Thesis
Electrical Engineering, pp. 1-75.
[15].
http://www.vormetric.com/sites/default/files/wpdata-
security-in-the-cloud.pdf
[16]. U. Somani, K. Lakhani and M. Mundra.,(2010).
”Implementing digital signature with RSA encryption
algorithm to enhance the Data Security of cloud in Cloud
Computing”, Parallel Distributed and Grid Computing
(PDGC), 2010 1st International Conference, pp. 211-216.
[17]. W. Cong, C. Ning, L. Jin, R. Kui and L.
Wenjing.,(2010). “Secure Ranked Keyword Search over
Encrypted Cloud Data”, Distributed Computing Systems
(ICDCS), IEEE 30th International Conference, pp. 253-
262.
[18]. H. Shuai and X. Jianchuan. (2011). ”Ensuring
data
storage security through a novel third party auditor
scheme in cloud computing”, Cloud Computing and
Intelligence Systems (CCIS), IEEE International
Conference, pp. 264-268.
[19]. Vamsee and Sriram. (2011). “Data Security in
Cloud
Computing”, Journal of Mathematics and computer
sciences”, Vol. 2, No. 1, pp. 15- 23.
[20]. S. K. Sood.,(2012). “A combined approach to
ensure
data security in cloud computing”, Journal of Network
and Computer Applications, Vol. 35, No. 6, pp. 1831-
1838.
[21]. E. M. Mohamed, H. S. Abdelkader and S. El-
Etriby.,(2012). ”Enhanced data security model for cloud
computing”, Informatics and Systems (INFOS), 2012 8th
International Conference, pp. 12-17.
[22]. J. Singh, B. Kumar and A. Khatri.,(2012).
“Improving
stored data security in Cloud using Rc5 algorithm”,
Engineering (NUiCONE), Nirma University International
Conference, pp. 1-5.
[23]. Z. Lan, V. Varadharajan and M. Hitchens.,(2013).
“Achieving Secure Role-Based Access Control on
Encrypted Data in Cloud Storage”, Information Forensics
and Security, IEEE Transactions on, Vol. 8, No. 12, pp.
1947-1960.
[24]. J. Taeho, L. Xiang-Yang, W. Zhiguo and W.
Meng.,(2013). “Privacy preserving cloud data access
with multi-authorities”, INFOCOM, Proceedings IEEE, pp.
2625-2633.
[25]. Y. Ching-Nung and L. Jia-Bin. (2013).
“Protecting
Data Privacy and Security for Cloud Computing Based on
Secret Sharing”, Biometrics and Security Technologies
(ISBAST), International Symposium, pp. 259-266.
[26]. P. Rewagad and Y. Pawar,.(2013). “Use of
Digital Signature with Diffie Hellman Key Exchange and AES
Encryption Algorithm to Enhance Data Security in Cloud
Computing”, Proceedings IEEE, pp. 437-439.
[27]. M. S. Abolghasemi, M. M. Sefidab and R. E.
Atani,.(2013). “Using location based encryption to
improve the security of data access in cloud computing”,
Advances in Computing, Communications and
Informatics (ICACCI), International Conference, pp.261-
265.