A Comprehensive Methodology for Data Security and Privacy in Cloud Computing Systems
Abstract
Full Text:
PDFReferences
Xie Minqi, Zhou Rong, Zhang Wei, et al. Security and privacy in cloud computing: A survey. Sixth International Conference on Semantics Knowledge and Grid (SKG). 2010.
What is Cloud Computing? Retrieved April 6, 2011, available at: http://www.microsoft.com/business/engb/solutions/Pages/Cloud.aspx
What is Cloud Computing? Retrieved April 6, 2011, available at: http://www.ibm.com/developerworks/cloud/newto.ht ml#WHATIS
What is Cloud? Retrieved April 6, 2011, Available at: http://www.rackspace.co.uk/cloud-hosting/learn- more/whatis-cloud/
Recession is good for Cloud Computing Microsoft Agrees. Available at: http://www.cloudave.com/2425/recession-is- goodfor- cloud-computing-microsoft-agrees/
De Capitani di Vimercati S, Foresti S, Paraboschi S, et al. Ecient and private access to outsourced data. In Proc. of the 31st International Conference on Distributed Computing Systems (ICDCS 2011), Minneapolis, Minnesota, USA, June 2011.
Chow R, Golle P, Jakobsson M, et al. controlling data in the cloud: Outsourcing computation without outsourcing control. In ACM Workshop on Cloud Computing Security, 2009.
Subashini S, Kavitha V. A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications. 2011; 34(1): 1–11p.
IT Cloud Services User Survey, pt.2: Top Benefits & Challenges. http://blogs.idc.com/ie/?p=210.
New IDC IT Cloud Services Survey: Top Benefits and Challenges. Retrieved April 8, 2011. Available at: http://blogs.idc.com/ie/?p=730
Maheshwari Rohit. International Journal of Recent Technology and Engineering (IJRTE). March 27, 2012.
Cong Wang, Qian Wang, Kui Ren. International Journal of Recent Technology and Engineering (IJRTE). April 12, 2011.
An Information-Centric Approach to Information Security. http://virtualization.sys- con.com/node/171199.
EMC, Information-Centric Security. http://www.idc.pt/resources/PPTs/2007/IT&Internet_ Security/12.EMC.pdf.
End-User Privacy in Human-Computer Interaction. Available at:http://www.cs.cmu.edu/~jasonh/publications/fnt-end-
user-privacy-in-human-computer-interaction-final.pdf.
ESG White Paper, the Information-Centric Security Architecture. Available at:http://japan.emc.com/collateral/analyst- reports/emc-white-paper-v4-4-21-2006.pdf.
Latest Cloud Storage Hiccups Prompt Data Security Questions. http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9130682&sourc e=NLT_PM.
Danwei Chen, Yanjun He. Computer technology. Journal of Convergence Information Technology. September 2010; 5(7).
DOI: https://doi.org/10.37591/ijowns.v1i2.851
Refbacks
- There are currently no refbacks.