1 |
Gartner, "Newsroom: Consumers Will Store More Than a Third of Their Digital Content in the Cloud by 2016," Press Release, 2012.
|
2 |
A. T. Velte, T. J. Velte, R. C. Elsenpeter and R.C. Elsenpeter, "Cloud Computing: A Practical Approach," New York: McGraw-Hill, pp. 44, 2010.
|
3 |
S. Kamara and K. Lauter, "Cryptographic cloud storage," in Proc. of International Conference on Financial Cryptography and Data Security, Springer Berlin Heidelberg, pp. 136-149, January, 2010.
|
4 |
N. Cao, C. Wang, M. Li, K. Ren and W. Lou, "Privacy-preserving multi-keyword ranked search over encrypted cloud data," IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 1, pp. 222-233, 2014.
DOI
|
5 |
R. Chen, Y. Mu, G. Yang and F. Guo, Wang, X, "Dual-server public-key encryption with keyword search for secure cloud storage," IEEE Transactions on Information Forensics and Security, vol. 11, no. 4, pp. 789-798, 2016.
DOI
|
6 |
M. Chase and S. Kamara, "Structured encryption and controlled disclosure," in International Conference on the Theory and Application of Cryptology and Information Security, Springer Berlin Heidelberg, pp. 577-594, December 2010.
|
7 |
C. Wang, Q. Wang, K. Ren and W. Lou, "Ensuring data storage security in cloud computing," in Proc. of IWQoS, pp. 1-9, July, 2009.
|
8 |
Q. Wang, C.Wang, K. Ren, W. Lou and J. Li, "Enabling public auditability and data dynamics for storage security in cloud computing," IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 5, pp. 847-859, 2011.
DOI
|
9 |
R. Buyya and M. Murshed, "Gridsim: A toolkit for the modeling and simulation of distributed resource management and scheduling for grid computing," Concurrency and Computation: Practice and Experience, vol. 14, no. 13-15, pp. 1175-1220, 2002.
DOI
|
10 |
J. E. Smith and R. Nair, "The architecture of virtual machines," Computer, vol. 38, no. 5, pp. 32-38, 2005.
DOI
|
11 |
S. K. Sood, "A combined approach to ensure data security in cloud computing," Journal of Network and Computer Applications, vol. 35, no. 6, pp. 1831-1838, 2012.
DOI
|
12 |
C. Balding, "Is Your Amazon Machine Image Vulnerable to SSH Spoofing Attacks?," Cloud Security, 2008.
|
13 |
H. Takabi, J. B. Joshi and G. J. Ahn, "Securecloud: Towards a comprehensive security framework for cloud computing environments," in Proc. of 34th Annual Computer Software and Applications Conference Workshops (COMPSACW), IEEE, pp. 393-398, July 2010.
|
14 |
S. Venkatesan and A. Vaish, "Multi-agent based dynamic data integrity protection in cloud computing," in Proc. of International Conference on Advances in Communication, Network, and Computing, Springer Berlin Heidelberg, pp. 76-82, March 2011.
|
15 |
P. Prasad, B. Ojha, R. R. Shahi, R. Lal, A. Vaish and U. Goel, "3 dimensional security in cloud computing," in Proc. of Computer Research and Development (ICCRD), 2011 3rd International Conference on IEEE, pp. 198-201, March 2011.
|
16 |
S. K. Sood, A.K. Sarje and K. Singh, "A secure dynamic identity based authentication protocol for multi-server architecture," Journal of Network and Computer Applications, vol. 34, no. 2, pp. 609-618, 2011.
DOI
|
17 |
J. Spillner, J. MuLler and A. Schill, "Creating optimal cloud storage systems," Future Generation Computer Systems, vol. 29, no.4, pp. 1062-1072, 2013.
DOI
|
18 |
B. Dong, Q. Zheng, F. Tian, K. M. Chao, R. Ma and R. Anane, "An optimized approach for storing and accessing small files on cloud storage," Journal of Network and Computer Applications, vol. 35, no. 6, pp. 184-1862, 2012.
|
19 |
H. Cui, R. H. Deng, and Y. Li, "Attribute-based cloud storage with secure provenance over encrypted data," Future Generation Computer Systems, vol. 79, pp.461-472, 2018.
DOI
|
20 |
Z. Xia, X. Wang, X. Sun, and Q. Wang, "A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data," IEEE transactions on parallel and distributed systems, vol. 27, no. 2, pp.340-352, 2016.
DOI
|
21 |
M. R. Abbasy and B. Shanmugam, "Enabling data hiding for resource sharing in cloud computing environments based on dna sequences," in Proc. of the 2011 IEEE World Congress on Services, SERVICES'11, pp. 385-390, 2011.
|
22 |
A. Khalifa and A. Atito, "High-capacity DNA-based steganography," in Proc. of 8th International Conference on Informatics and Systems (INFOS2012), IEEE, pp. BIO-76-80, 2012.
|
23 |
S. Sadeg, M. Gougache, N. Mansouri and H. Drias, "An encryption algorithm inspired from DNA," in Proc. of International Conference on Machine and Web Intelligence (ICMWI), IEEE, pp. 344-349, October 2010.
|
24 |
A. Atito, A. Khalifa and S. Z. Rida, "DNA-based data encryption and hiding using playfair and insertion techniques," Journal of Communications and Computer Engineering, vol. 2, no. 3, pp. 44, 2012.
|
25 |
S. Pramanik and S. K. Setua, "DNA cryptography," in Proc. of 7th International Conference on Electrical & Computer Engineering (ICECE), IEEE, pp. 551-554, December 2012.
|
26 |
N. Kar, A. Majumder, A. Saha, S. Deb and M. C. Pal, "Data security and cryptography based on DNA sequencing," International Journal of Information Technology & Computer Science (IJITCS), vol. 10, no. 3, 2013.
|
27 |
L. Pray, "Discovery of DNA structure and function: Watson and Crick," Nature Education, vol. 1, no. 1, pp. 100, 2008.
|
28 |
X. Wang and Q. Zhang, "DNA computing-based cryptography," in Proc. of Fourth International Conference on Bio-Inspired Computing, BIC-TA'09. IEEE, pp. 1-3, October 2009.
|
29 |
A. Gehani, T. H. LaBean and J. H. Reif, "DNA-based Cryptography," in Proc. of 5th DIMACS Workshop on DNA-based Computers, pp. 167-188, 1999.
|
30 |
S. Marwan, A. Shawish and K. Nagaty, "DNA-based cryptographic methods for data hiding in DNA media," Biosystems, vol. 150, pp. 110-118, 2016.
DOI
|
31 |
M. Toorani and A. Falahati, "A secure variant of the Hill cipher," in Proc. of 2009 IEEE Symposium on Computers and Communications, pp. 313-316, 2009.
|
32 |
T. L. Saaty, "The analytic hierarchy and analytic network processes for the measurement of intangible criteria and for decision-making," Multiple criteria decision analysis: state of the art surveys, Springer, New York, NY, vol. 78, pp. 345-405, 2005.
|
33 |
A. Majumdar, T. Podder, A. Majumder, N. Kar and M. Sharma, "DNA-based cryptographic approach toward information security," in Proc. of Intelligent Computing, Communication and Devices, Springer India, pp. 209-219, 2014.
|
34 |
A. Majumder, A. Majumdar, T. Podder, N. Kar and M. Sharma, "Secure data communication and cryptography based on DNA based message encoding," in Proc. of International Conference on Advanced Communication Control and Computing Technologies (ICACCCT), IEEE, pp. 360-363, May 2014.
|