2017 IEEE International Conference on Circuits and Systems (ICCS) 2017
DOI: 10.1109/iccs1.2017.8325966
|View full text |Cite
|
Sign up to set email alerts
|

Survey of data and storage security in cloud computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 31 publications
(11 citation statements)
references
References 21 publications
0
11
0
Order By: Relevance
“…NareshVurukonda and B.Thirumala Rao [11] have done a research to identify the cloud security issues like data storage, access control and identity management. They have also suggested few solutions to the issues [12]. Ayesha Malik and Muhammad MohsinNazir [13] have define d a security architecture for cloud service providers to protect user's confidential and sensitive information.…”
Section: Related Workmentioning
confidence: 99%
“…NareshVurukonda and B.Thirumala Rao [11] have done a research to identify the cloud security issues like data storage, access control and identity management. They have also suggested few solutions to the issues [12]. Ayesha Malik and Muhammad MohsinNazir [13] have define d a security architecture for cloud service providers to protect user's confidential and sensitive information.…”
Section: Related Workmentioning
confidence: 99%
“…To achieve this, organizations sometimes opt to use services of such organizations whose cloud storage services are compromised in some way [18]. But organizations must think twice while moving any critical data to cloud storage services, as sometimes data storage at compromised cloud storage can put companies' critical data at risk [19].…”
Section: Already Compromised Cloud Storagementioning
confidence: 99%
“…Asymmetric key does not allow the hacker to forge licences for others. The security services provided by asymmetric key is authenticated, confidentially and nonrepudiation [18]. Symmetric key for delivering confidential, integrity and security, users should be certain that public key is authenticated, that it belongs to the user and has not been tampered or replaced by the third party.…”
Section: Cryptography Algorithmmentioning
confidence: 99%