2016 International Conference on Computational Techniques in Information and Communication Technologies (ICCTICT) 2016
DOI: 10.1109/icctict.2016.7514542
|View full text |Cite
|
Sign up to set email alerts
|

A framework for data security and storage in Cloud Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(16 citation statements)
references
References 11 publications
0
15
0
Order By: Relevance
“…In our review, we observed that quite a large number of countermeasures are either not evaluated at all ( [23], [40], [45] , [48] , [49] , [62] , [75] , [88] , [91] , [67] , [92] , [105] , [110], [111], [114], [137], [141], [154], , [160], [174], , [175]) or evaluated weakly ( [60], [70], [100], [109], [132], [138], [147], [158], [161], [165], [171]). We consider an evaluation as weak evaluation when the system is evaluated with a small dataset (e.g.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…In our review, we observed that quite a large number of countermeasures are either not evaluated at all ( [23], [40], [45] , [48] , [49] , [62] , [75] , [88] , [91] , [67] , [92] , [105] , [110], [111], [114], [137], [141], [154], , [160], [174], , [175]) or evaluated weakly ( [60], [70], [100], [109], [132], [138], [147], [158], [161], [165], [171]). We consider an evaluation as weak evaluation when the system is evaluated with a small dataset (e.g.…”
Section: Discussionmentioning
confidence: 99%
“…Bhandari et al [45] present a framework for secure storage and retrieval of data from the cloud using data classification, detecting errors in data during transmission via Hashed Message Authentication Code (HMAC), and index building. With this approach, data is first classified into three sections (i.e., public, private, and limited) based on confidentiality, integrity, and availability.…”
Section: Classification Of Countermeasuresmentioning
confidence: 99%
See 1 more Smart Citation
“…In [18]- [20], the author designed a real-time task scheduler framework to dynamically adjust the security policy of scheduled tasks according to the system security level to achieve the optimal balance of security and schedulability. A task mapping scheduling algorithm for security perception and energy awareness is designed in [21], and a security scheduling method based on user level or SLA to limit the user's resource application is presented in [22] [23].…”
Section: Related Researchmentioning
confidence: 99%
“…DES and AES and compared the result to solve the above mentioned security issues. Akshay Nayak, Sridhar.N.K, poornima.G.R, Dr. Shivashankar [4], "Security Issues in Cloud Computing and its Counter measure" May 19-20, 2017 describes various security issues and the counter measures to resolve those issues. It also discuss about the characteristics of cloud computing how it is used in today's world.…”
Section: Literature Reviewmentioning
confidence: 99%