Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Reference :

    1. Chun-Ting Huang_, Lei Huangy, ZhongyuanQinz, Hang Yuan_, LanZhoux, Vijay Varadharajanx and C.-C. Jay Kuo”Survey on Securing Data Storage in the Cloud” Article inAPSIPA Transactions on Signal and Information Processing • January 2014
    2. ] H. Li, W. Sun, F. Li, and B. Wang, “Secure and privacy-preserving data storage service in public cloud,” J. Comput. Res. Develop., vol. 51, no. 7, pp. 1397–1409, 2014.
    3. Y. Li, T. Wang, G. Wang, J. Liang, and H. Chen, “Efficient data collection in sensor-cloud system with multiple mobile sinks,” in Proc. Adv. Serv. Comput., 10th Asia-Pac. Serv. Comput. Conf., 2016, pp. 130–143.
    4. FatemiMoghaddam F.; Karimi,O., &Alrashdan,M.T. “ A comparative study of applying realtime encryption in cloud computing environments. 2013 IEEE 2nd international conference on cloud networking
    5. Fu, Z., Wu, X., Guan, C., Sun, X., & Ren, K. (2016). “ Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement”. IEEE Transactions on Information Forensics and Security, 11(12), 2706–2716.
    6. Fu, Z., Huang, F., Ren, K., Weng, J., & Wang, C. (2017).” Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data” IEEE Transactions on Information Forensics and Security, 12(8), 1874–1884.
    7. Jing-Jang Hwang, Hung-Kai Chuang, Yi-Chang Hsu, &Chien-Hsing Wu. (2011). “A Business Model for Cloud Computing Based on a Separate Encryption and Decryption Servic”. 2011 International Conference on Information Science and Applications.
    8. Du meng “Data security in cloud computing” 8th International Conference on Computer Science & Education (ICCSE 2013) April 26-28, 2013. Colombo, Sri Lanka
    9. Tian Wang , Jiyuan Zhou, Xinlei Chen , Guojun Wang , Anfeng Liu , and Yang Liu” A Three-Layer Privacy Preserving Cloud Storage Scheme Based on Computational Intelligence in Fog Computing” IEEE transactions on emerging topics in computational intelligence,vol. 2, NO.1, February 2018
    10. Prakash, G. L., Prateek, M., & Singh, I. “Data encryption and decryption algorithms using key rotations for data security in cloud system”. 2014 International Conference on Signal Propagation and Computer Technology (ICSPCT 2014).
    11. Z. Reitermanov´a, Charles University, Faculty of Mathematics and Physics, Prague, Czech Republic. “WDS'10 Proceedings of Contributed Papers”, Part I, 31– 36, 2010

Recent Article