Volume 60 | Number 1 | Year 2018 | Article Id. IJMTT-V60P509 | DOI : https://doi.org/10.14445/22315373/IJMTT-V60P509
Abid Hussain,Chungen Xu, Muqadar Ali, "Security of Cloud Storage System using Various Cryptographic Techniques," International Journal of Mathematics Trends and Technology (IJMTT), vol. 60, no. 1, pp. 45-51, 2018. Crossref, https://doi.org/10.14445/22315373/IJMTT-V60P509
[1] Ijifr VE. Load Balancing And Security In Multicloud IaaS Using Distributed File System- A Review. International Journal of Informative & Futuristic Research; Volume 2 Issue 4 December 2014 International, ISSN (Online): 2347-1697;IJIFR/ V2/ E4/ 039 Page No. 1051-1055 Research.
[2] Kumar R, Pandey A. A Survey on Security Issues in Cloud Computing. IOSR J Comput Eng. 2016;3(3):506-517. doi:10.15680/IJIRSET.2016.0510073
[3] Vouk M a. Cloud computing — Issues, research and implementations. ITI 2008 - 30th Int Conf Inf Technol Interfaces. 2008:235-246. doi:10.1109/ITI.2008.4588381
[4] Hu Y, Wong J, Iszlai G, Litoiu M. Resource Provisioning for Cloud Computing. published 2009 in CASCON (Center for Advance Studies Conference) DOI:10.1145/1723028.1723041
[5] Ahead S. Cloud Computing : Silver Lining or Storm Ahead?.IA News Letter The Newsletter for Information Assurance Technology Professionals Volume 13 Number 2 • Spring 2010.
[6] Catteddu D, Hogben G. The European Network and Information Security Agency ( ENISA ) is an EU agency created to advance This work takes place in the context of ENISA ’ s Emerging and Future Risk programme . C ONTACT DETAILS : This report has been edited by. Computing. 2009;72(1):2009-2013. doi:10.1007/978-3-642-16120-9_9
[7] Jamil D, Zaki H, Carlin S, Curran K. Cloud Computing Security. Int J Ambient Comput Intell. 2011;3(1):14-19. doi:10.4018/jaci.2011010102
[8] Kumar G, Chelikani A. Analysis of Security Issues in Cloud Based E-Learning. Secur Manag. 2011:1-74.
[9] Shan L. Journal Of Computers and math.pdf; Recent Advances in Intelligent Information Technology& Network Security; ISSN 1796-203XVolume 6, Number 10, October 2011.
[10] Sadeghi A, Schneider T, Winandy M, Horst G. Token-Based Cloud Computing. TRUST 2010;2: LNCS 6101, pp. 417–429; Springer-Verlag Berlin Heidelberg.
[11] Group TC. Solving the Data Security Dilemma with Self-Encrypting Drives. International Journal of Recent Research Aspects(IJRRA) ISSN 2349-7688 2010;May[12].
[12] Kokane M, Jain P, Sarangdhar P. Data Storage Security in Cloud Computing. Int J Adv Res Comput Commun Eng. 2013;2(3):1388-1393.
[13] Bugiel S, Stefan N, Sadeghi A, Schneider T. Twin clouds: An architecture for secure cloud computing,2011:1 11.http://www.zurich.ibm.com/~cca/csc2011/submissions/bugiel.pdf.
[14] Vaquero LM, Rodero-Merino L, Morán D. Locking the sky: A survey on IaaS cloud security. Comput (Vienna/New York). 2011;91(1):93 118. doi:10.1007/s00607-010-0140-x
[15] Thuy D, Nguyen TD, Gondree MA, et al. A Cloud-Oriented Cross-Domain Security Architecture A Cloud-Oriented Cross-Domain Security Architecture. 2010;(November):1701-1707.
[16] Cong Wang, Qian Wang, Kui Ren, Wenjing Lou. Ensuring data storage security in Cloud Computing. 2009 17th Int Work Qual Serv. 2009:1-9. doi:10.1109/IWQoS.2009.5201385
[17] Kaufman LM. Data Security in the Cloud World of Cloud Computing. Ieee. 2009:61-64.
[18] Thuraisingham B, Khadilkar V, Gupta A, Kantarcioglu M, Khan L. Secure data storage and retrieval in the cloud. Proc 6th Int ICST Conf Collab Comput Networking, Appl Work. 2010. doi:10.4108/icst.collaboratecom.2010.15
[19] Hamlen K, Kantarcioglu M, Khan L, Thuraisingham B. Security Issues for Cloud Computing. Int J Inf Secur Priv. 2010;4(2):36-48. doi:10.4018/jisp.2010040103
[20] Abutaha M, Abutaha MS, Amro AA. Using AES , RSA , SHA1 for Securing Cloud. 2015;(April 2014).
[21] Bhardwaj A, Subrahmanyam GVB, Avasthi V, Sastry H. Security Algorithms for Cloud Computing Environment Security Algorithms for Cloud Computing. Procedia - Procedia Comput Sci. 2016;85(December 2015):535-542. doi:10.1016/j.procs.2016.05.215
[22] Arora R, Parashar A. Secure User Data in Cloud Computing Using Encryption Algorithms. International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 Vol. 3, Issue 4, Jul-Aug 2013, pp.1922-19262013.
[23] Salim E, Harba I. Secure Data Encryption Through a Combination of AES, RSA and HMAC. Engineering, Technology & Applied Science Research Vol. 7, No. 4, 2017, 1781-1785:1781-1785.
[24] Johnsson M. Mobile One Time Passwords and RC4 Encryption for Cloud Computing. 2011; Technical report, IDE1108 (March).
[25] Khan AA. Preventing Phishing Attacks using One Time Password and User Machine Identification. International Journal of Computer Applications (0975 – 8887) Volume 68– No.3, April 2013:7-11.
[26] Nadu T. Research Issues on Elliptic Curve Cryptography and Its applications. IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.6, June 2009:19-22.
[27] Verma SK, Ojha DB. A Discussion on Elliptic Curve Cryptography and Its Applications. IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 1, No 1, January 2012 ISSN (Online): 1694-0814:74-77.
[28] A.MEKMC, Phil M, Sc JM, Phil M, Ph D. Secure Login Using Encrypted One Time Password ( OTP ) and Mobile Based Login Methodology. Research Inventy: International Journal Of Engineering And Science Vol.2, Issue 10 (April 2013), Pp 14-17 Issn(e): 2278-4721.
[29] 6 Saini T. One Time Password Generator System. International Journal of Advanced Research in Computer Science and Software Engineering Research, Volume 4, Issue 6, June 2014 ISSN: 2277 128X
[30] Soni S, Singh SP. Secure and Efficient Integrity Algorithm based on Existing SHA Algorithms. International Journal of Computer Applications (0975 – 8887) Volume 113 – No. 11, March 2015:34-37.