Security and privacy in cloud computing

Z Xiao, Y Xiao - IEEE communications surveys & tutorials, 2012 - ieeexplore.ieee.org
Recent advances have given rise to the popularity and success of cloud computing.
However, when outsourcing the data and business application to a third party causes the …

[PDF][PDF] Light weight encryption technique for group communication in cloud computing environment

DC Verma, AK Mohapatra, K Usmani - International Journal of Computer …, 2012 - Citeseer
Cloud computing is a typical example of distributed computing and emerged as a new
paradigm that moves computing and data away from desktop and portable PCs into large …

[PDF][PDF] Double key encryption method (DKEM) algorithms using ANN for data storing and retrieval in cloud computing

TJ Singh, S Jeya - IOSR J. Comput. Eng, 2013 - academia.edu
Cloud computing is generally recognized as a technology which will have a significant
impact on Information Technology in the future. The cloud computing data security has …

[PDF][PDF] Cyber Times International Journal of Technology & Management

A Girdhar, S Madan, AK Saini, MM Girdhar, MK Trehan… - journal.cybertimes.in
Cyber espionage has increased dramatically over the last few years at the government,
corporate and individual levels. The cyberspace has become the latest domain of …

[图书][B] Risk Analysis for Exploring the Opportunities in Cloud Outsourcing

M Kommineni, R Parvathi - 2013 - diva-portal.org
ABSTRACT Context: Cloud Outsourcing is a new form of outsourcing which is not more
under implementation and yet to be implemented. It is a form of outsourcing in which …