Security and privacy in cloud computing

Z Xiao, Y Xiao - IEEE communications surveys & tutorials, 2012 - ieeexplore.ieee.org
Recent advances have given rise to the popularity and success of cloud computing.
However, when outsourcing the data and business application to a third party causes the …

[PDF][PDF] Light weight encryption technique for group communication in cloud computing environment

DC Verma, AK Mohapatra, K Usmani - International Journal of Computer …, 2012 - Citeseer
Cloud computing is a typical example of distributed computing and emerged as a new
paradigm that moves computing and data away from desktop and portable PCs into large …

[PDF][PDF] Towards secure services in an untrusted environment

M Huber - Fifteenth International Workshop on Component …, 2010 - Citeseer
Software services offer many opportunities like reduced cost for IT infrastructure. However,
they also introduce new risks, for example losing control over data. While data can be …

[PDF][PDF] Technical report: Secure cloud computing through a separation of duties

C Henrich, M Huber, C Kempka… - … für Kryptographie und …, 2010 - researchgate.net
Cloud Computing offers many opportunities but also introduces new risks. A user who
outsources a database into the Cloud loses control over his data. While the data can be …

[PDF][PDF] Double key encryption method (DKEM) algorithms using ANN for data storing and retrieval in cloud computing

TJ Singh, S Jeya - IOSR J. Comput. Eng, 2013 - academia.edu
Cloud computing is generally recognized as a technology which will have a significant
impact on Information Technology in the future. The cloud computing data security has …

An approach to Completely Searchable Encryption

R Haynberg, FPDJ Müller-Quade - Tagungsband des 12. Kryptotags - scholar.archive.org
Bei der bloßen Speicherung bietet Verschlüsselung einen ausreichenden Schutz, sollen die
Daten aber vom Dienstleister durchsucht werden, ist dies mit den meisten …

[PDF][PDF] Cyber Times International Journal of Technology & Management

A Girdhar, S Madan, AK Saini, MM Girdhar, MK Trehan… - journal.cybertimes.in
Cyber espionage has increased dramatically over the last few years at the government,
corporate and individual levels. The cyberspace has become the latest domain of …

[图书][B] Risk Analysis for Exploring the Opportunities in Cloud Outsourcing

M Kommineni, R Parvathi - 2013 - diva-portal.org
ABSTRACT Context: Cloud Outsourcing is a new form of outsourcing which is not more
under implementation and yet to be implemented. It is a form of outsourcing in which …

Methods to secure services in an untrusted environment

M Huber, J Müller-Quade - 2011 - dl.gi.de
Software services offer many opportunities like reduced cost for IT infrastructure. They also
introduce new risks, for example the clients lose control over their data. While data can be …