STABLE - Study on Trusted Authentication Scheme using M-RSA based Blockchain Technique for Legacy Environment (A Novel Method to Enhance Cloud Security)
Abstract
Full Text:
PDFReferences
Ravi Kant Sahu and Abhishek Mohta, L.K. Awasthi. Robust Data Integration While Using Third Party Auditor for Cloud Data Storage Services. conf. IJARCSSE, 2012.2(2).ISSN: 2277 128X
Qian Wang and Cong Wang and Kui Ren, Wenjing Lou, Jin Li. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing in IEEE transactions on parallel and distributed systems, 2011.22(5).
M.Ashah, R. Swaminathan, M. Baker. Privacy-Preserving Audit and Extraction of Digital Contents. 2011.
Farzad Sabahi. Cloud Computing Security Threats and Responses. IEEE confer. 2011, 978-1-61284-486-2/111
Govinda V, Gurunathaprasad, H Sathshkumar. Third Party Auditing for Security Data Storage in cloud through digital signature using RSA” IJASATR, 2012.2(4). ISSN: 2249-9954.
Clock Skew Based Client Device Identification in Cloud Environments Wei-Chung Teng Dept. of Computer Science & Info. Eng. National Taiwan University of Sci. & Tech.
Phil Lageschulte, Sailesh Gadia. Cloud Computing: Risks and Auditing.
A. Juels, B. S. Kaliski Jr. Pors: proofs of retrievability for large files. Proceedings of the 14th ACM conference on Computer and communications security (CCS): 584–597p, New York, NY, USA, 2007. ACM.
W. Enck, P. Gilbert, B. Chun, L. P. Cox, J. Jung, P. McDaniel, A.N. Sheth. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. In Proc. of the USENIX Symposium on Operating Systems Design and Implementation (OSDI), Vancouver, Canada, October. 4-6, 2010.
Supraja.Y, T.V.Sai Krishna, P.VenkataSubbaReddy, Dr.M.A.D.Swamy, Dr.P.Srinivasulu .Random Forest (RF) Machine Learning Algorithm to Detect Abnormal Behaviour in Cloud – Based Mobile Services.
Refbacks
- There are currently no refbacks.