Running head: BIBLIOGRAPHY 1 Bibliography Pavan Kumar Kurra Submitted to Nathan
Running head: BIBLIOGRAPHY 1 Bibliography Pavan Kumar Kurra Submitted to Nathan Garrelts MISI-799- Capstone Project 02/14/2016 Ferris State University Spring 2016 BIBLIOGRAPHY 2 Problem Many third party users, employees etc. are allowed to access sensitive data in the cloud without proper accessibility and security. Question: What accountability does a service provider have for protecting confidential data that is stored in the cloud? BIBLIOGRAPHY 3 References Ayoleke, I. (2011). Cloud Computing Security Issues and Challenges. 3(5), 247-255. Retrieved from https://www.researchgate.net/profile/Ibikunle_Ayoleke/publication/259072387_Cloud_C omputing_Security_Issues_and_Challenges/links/0deec529df37a5aa28000000.pdf Chow, R., Golle, P., Jakobsson, M., Masuoka, R., & Molina, J. (2009). Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control. 85-90. Retrieved from http://markus-jakobsson.com/papers/jakobsson-ccsw09.pdf cloud-council.org. (2015, March). Security for Cloud Computing Ten Steps to Ensure Success. 4-35. Retrieved from http://www.cloud-council.org/deliverables/CSCC-Security-for- Cloud-Computing-10-Steps-to-Ensure-Success.pdf Dutta, A., Peng, G., & Choudhary, A. (2013). Risks in Enterprise Cloud Computing: The Perspective of IT Experts. 1-16. Retrieved from http://eprints.whiterose.ac.uk/79144/2/WRRO_79144.pdf Firdhous, M., Ghazali, O., & Hassan, S. (2011). Trust Management in Cloud Computing: A Critical Review. 4(2), 24-36. Retrieved from http://arxiv.org/ftp/arxiv/papers/1211/1211.3979.pdf G., Sehra, S. S., & Singh, J. (2013). Policy Specification in Role based Access Control on Clouds. 75, 39-43. Retrieved from http://arxiv.org/ftp/arxiv/papers/1308/1308.5177.pdf Huang, J., & Nicol, D. M. (2013, December). Trust mechanisms for cloud computing. Retrieved from http://link.springer.com/article/10.1186/2192-113X-2-9/fulltext.html BIBLIOGRAPHY 4 Hwang, K., & Li, D. (2010). Trusted Cloud Computing with Secure Resources and Data Coloring. 14-22. Retrieved from http://gridsec.usc.edu/hwang/papers/trusted-cloud- computing.pdf I, S., & P, J. (2013). International Journal of Advanced Research in Computer Science and Software Engineering. 3(11), 627-630. Retrieved from http://www.ijarcsse.com/docs/papers/Volume_3/11_November2013/V3I11-0400.pdf K, P., & S, J. P. (2012). Analysis of Different Access Control Mechanism in Cloud. 4, 34-39. Retrieved from http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.402.635&rep=rep1&type=pdf Kalyani, H., Rahul, P., & Ambika, P. (2014). Achieve Fine Grained Data Access Control in Cloud Computing using KP-ABE along-with Lazy and Proxy Re-encryption. 4(2), 457- 461. Retrieved from http://www.ijetae.com/files/Volume4Issue2/IJETAE_0214_76.pdf Karwasra, N., & Sharma, M. (2012). CLOUD COMPUTING: SECURITY RISKS AND ITS FUTURE. 5-9. Retrieved from http://static.ijcsce.org/wp- content/uploads/2012/12/IJCSCE.SI812110.pdf Khan, A. R. (2012). ACCESS CONTROL IN CLOUD COMPUTING ENVIRONMENT. 7, 613-615. Retrieved from http://www.arpnjournals.com/jeas/research_papers/rp_2012/jeas_0512_699.pdf Khan, K. M., & Malluhi, Q. (2010). Establishing Trust in Cloud Computing. 20-26. Retrieved from http://www.computer.org/cms/ComputingNow/HomePage/2010/1110/rW_IT_Establishin gTrustCloudComputing.pdf BIBLIOGRAPHY 5 Kharche, H., & Chouhan, D. S. (2012). Building Trust In Cloud Using Public Key Infrastructure. 3, 26-31. Retrieved from https://thesai.org/Downloads/Volume3No3/Paper5- Building_Trust_In_Cloud_Using_Public_Key_Infrastructure.pdf Mell, P., & Grance, T. (2009, July 10). Effectively and Securely Using the Cloud Computing Paradigm. 1-92. Retrieved from https://www.cs.purdue.edu/homes/bb/cs590/handouts/Cloud_NIST.pdf Morsy, M. A., Grundy, J., & Müller, I. (2010, November 30). An Analysis of The Cloud Computing Security Problem. Retrieved from https://www.cs.auckland.ac.nz/~john- g/papers/cloud2010_1.pdf N, J., Y, R. S., & R, H. (2013). Cloud Data Protection for the Masses. 4(4), 701-706. Retrieved from http://ijcttjournal.org/Volume4/issue-4/IJCTT-V4I4P153.pdf Onankunju, B. K. (2013). Access Control in Cloud Computing. 3(9), 1-3. Retrieved from http://www.ijsrp.org/research-paper-0913/ijsrp-p2107.pdf Pandith, M. Y. (2014). Data security and privacy concerns in cloud computing. 2(2), 6-11. Retrieved from http://article.sciencepublishinggroup.com/pdf/10.11648.j.iotcc.20140202.11.pdf Pearson, S. (2009, March 06). Taking Account of Privacy when Designing Cloud Computing Services. Retrieved from http://www.hpl.hp.com/techreports/2009/HPL-2009-54.pdf Pearson, S. (2012). Privacy, Security and Trust in Cloud Computing. 1-57. Retrieved from http://www.hpl.hp.com/techreports/2012/HPL-2012-80R1.pdf Rouse, M. (2012, December). Cloud computing security. Retrieved from http://searchcompliance.techtarget.com/definition/cloud-computing-security BIBLIOGRAPHY 6 S, R., MM, E., & E, S. (2010). The Management of Security in Cloud Computing. Retrieved from http://icsa.cs.up.ac.za/issa/2010/Proceedings/Full/27_Paper.pdf Sen, J. (n.d.). Security and Privacy Issues in Cloud Computing. 1-42. Retrieved from http://arxiv.org/ftp/arxiv/papers/1303/1303.4814.pdf Sherman, M. (2013, March). How can cloud providers offer sensitive data protection? Retrieved from http://searchtelecom.techtarget.com/answer/How-can-cloud-providers-offer- sensitive-data-protection Shrivastava, N., & Yadav, R. (2013). A Review of Cloud Computing Security Issues. 3(1), 550- 553. Retrieved from http://www.ijeit.com/Vol 3/Issue 1/IJEIT1412201307_104.pdf Takab, H., Joshi, J. B., & Ahn, G. (2010). Security and Privacy Challenges in Cloud Computing Environments. 24-31. Retrieved from http://csis.pace.edu/~marchese/SE765/Paper/security2.pdf Tavizi, T., Shajari, M., & Dodangeh, P. (2012). A Usage Control Based Architecture for Cloud Environments. 1534-1539. Retrieved from http://user.das.ufsc.br/~dsboger/doutorado/wesley/Tavizi-2012-A Usage Control Base.pdf Weber, R. H., & Staiger, D. N. (2014). Cloud Computing: A cluster of complex liability issues. Retrieved from http://webjcli.org/article/view/303/418 uploads/Ingenierie_Lourd/ bibliography - 2023-03-29T055402.328.pdf
Documents similaires










-
25
-
0
-
0
Licence et utilisation
Gratuit pour un usage personnel Attribution requise- Détails
- Publié le Jul 10, 2022
- Catégorie Heavy Engineering/...
- Langue French
- Taille du fichier 0.0337MB