共 18 条
[1]
Avram M.G., Advantages and challenges of adopting cloud computing from an enterprise perspective, 7th International Conference Interdisciplinarity in Engineering (INTER-ENG 2013), 12, pp. 529-534, (2014)
[2]
Deshmukh R.V., Devadkar K.K., Understanding DDoS Attack and Its Effect, In Cloud Environment, Procedia Computer Science, 49, pp. 202-210, (2015)
[3]
Subashini S., Kavitha V., A survey on security issues in service delivery models of cloud computing, Journal of Network and Computer Applications, 34, pp. 1-11, (2010)
[4]
Tanzim Khorshed M., Shawkat Ali A.B.M., Wasimi S.A., A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing
[5]
Shinde M.B., Design and Implementation of Asymmetric Cryptography Using AES Algorithm, IJARIIE-ISSN(O)-2395-4396, 1, 4, pp. 371-378, (2015)
[6]
Sugumar R., Sheik Imam S.B., Data Security in Public Cloud Storage Environment, In-ternational Journal of Engineering Research and Technology (IJERT), 4, 6, pp. 101-105, (2015)
[7]
Singla S., Singh J., Survey on Enhancing Cloud Data Security using EAP with Rijndael Encryption Algorithm, Global Journal of Computer Science and Technology Software and Data Engineering, 13, 5, (2013)
[8]
Masala G.L., Ruiu P., Brunetti A., Terzo O., Grosso E., Biometric Authentication and Data Security in Cloud Computing, Int'l Conf. Security and Management, SAM'15, pp. 9-15
[9]
Kaaniche N., Laurent M., Data Security and privacy preservations in cloud storage environments based on cryptographic mechanisms, Computer Commincations, 111, pp. 120-141, (2017)
[10]
Khan M.A., A survey on security issues for cloud computing, Journal of Network and Computer Applications, 71, pp. 11-29, (2016)