|
[1] Advanced encryption standard. https://en.wikipedia.org/wiki/Advanced Encryption Standard/. [2] Secure hash algorithm. http://en.wikipedia.org/wiki/Secure Hash Algorithm. [3] Gary Anthes. Security in the cloud. Communications of the ACM, 53:16–18, 2010. [4] Zhang Jing ; Wang Jinsu ; Zheng Zhuangfeng ; Zhao Chongan. Cloud storage encryption security analysis. In Cloud Computing and Big Data Analysis (ICCCBDA), 2016. [5] Akshita Bhandari ; Ashutosh Gupta ; Debasis Das. A framework for data security and storage incloud computing. In International Con ference on Computational Techniques in Information and Communi cation Technologies (ICCTIC), 2016. [6] Nivedita Shimbre ; Priya Deshpande. Enhancing distributed data storage security for cloud computing using tpa and aes algorithm. In Computing Communication Control and Automation (ICCUBEA), 2015. [7] Ali Azougaghe ; Zaid Kartit ; Mustapha Hedabou ; Mostafa Belkasmi ; Mohamed El Marraki. An efficient algorithm for data security in cloud storage. In Intelligent Systems Design and Applications (ISDA), 2015. 43 [8] L. Arockiam ; S. Monikandan. Efficient cloud storage confidentiality to ensure data security. In International Conference on Computer Communication and Informatics (ICCCI), 2014. [9] Information Technology Laboratory National Institute of Standards and Technology. Federal information processing standards publication secure hash standard (shs). [10] Bin Feng ; Xinzhu Ma ; Cheng Guo ; Hui Shi ; Zhangjie Fu ; Tie Qiu. An efficient protocol with bidirectional verification for storage security in cloud computing. IEEE Access, 4:7899 – 7911, 2016. [11] Pradnyesh Bhisikar;Amit Sahu. Security in data storage and transmis sionin cloud computing. International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE), 3, 2013. [12] Sakinah Ali Pitchay ; Wail Abdo Ali Alhiagem ; Farida Ridzuan ; Madihah Mohd Saudi. A proposed system concept on enhancing the encryption and decryption method for cloud computing. In Modelling and Simulation (UKSim), 2015. [13] Jian Li ; Sicong Chen ; Danjie Song. Security structure of cloud storage based on homomorphic encryption scheme. In Cloud Computing and Intelligent Systems (CCIS), 2012. 44 [14] Jun Feng ; Yu Chen ; Douglas Summerville ; Wei-Shinn Ku ; Zhou Su. Enhancing cloud storage security against roll-back attacks with a new fair multi-party non-repudiation protocol. In Consumer Commu nications and Networking Conference, 2011. [15] Alfred J. Menezes;Paul C. van Oorschot;Scott A. Vanstone. Handbook of Applied Cryptography. 2001. [16] Deepak Singh ; Harsh K Verma. A new framework for cloud stor age confidentiality to ensure information security. In Colossal Data Analysis and Networking (CDAN), 2016. [17] Neal R. Wagner. The Laws of Cryptography: Introduction to the Ad vanced Encryption Standard (AES). 2001. [18] Fara Yahya ; Robert J. Walters ; Gary B. Wills. Protecting data in personal cloud storage with security classifications. In Science and Information Conference (SAI), 2015. [19] Biaoshuai Tao ; Hongjun Wu. Improving the biclique cryptanalysis of aes. Lecture Notes in Computer Science, 9144:39–56, 2015. [20] Fei Chen ; Tao Xiang ; Yuanyuan Yang ; Cong Wang ; Shengyu Zhang. Secure cloud storage hits distributed string equality checking: 45 More efficient, conceptually simpler, and provably secure. In Computer Communications (INFOCOM), 2015.
|