2010 First International Conference on Parallel, Distributed and Grid Computing (PDGC 2010) 2010
DOI: 10.1109/pdgc.2010.5679900
|View full text |Cite
|
Sign up to set email alerts
|

Ensuring data storage security in cloud computing using Sobol Sequence

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 26 publications
(11 citation statements)
references
References 8 publications
0
11
0
Order By: Relevance
“…A number of researchers all over the world has worked and is working on this issue. For example -they suggested security system [20], data verification protocol [21], framework [22], etc. If the service provider fails to give their customer's data security then their customers will disagree to get services from them.…”
Section: Data Security Perspectivementioning
confidence: 99%
“…A number of researchers all over the world has worked and is working on this issue. For example -they suggested security system [20], data verification protocol [21], framework [22], etc. If the service provider fails to give their customer's data security then their customers will disagree to get services from them.…”
Section: Data Security Perspectivementioning
confidence: 99%
“…In [77], the authors proposed an approach to ensure reliability of data using Sobol Sequence and utilizing token pre consumption. Their analysis show that the proposed scheme is more secure against Byzantine failure, unauthorized data modification attacks, and even cloud server colluding attacks than existing systems S. Bleikertz et al [74] proposed a way for visualization and automated analysis based on reachability and attack graphs.…”
Section: Security Issues Related To Auditing Regulatory Compliance Amentioning
confidence: 99%
“…A number of researchers all over the world has worked and is working on this issue. For example -they suggested security system [20], data verification protocol [21], framework [22], etc. If the service provider fails to give their customer's data security then their customers will disagree to get services from them.…”
Section: Data Security Perspectivementioning
confidence: 99%