1 |
S. Yu, C. Wang, K. Ren, and W. Lou, "Achieving secure, scalable, and fine-grained data access control in cloud computing," 2010, doi: 10.1109/INFCOM.2010.5462174.
DOI
|
2 |
J. Lee, "A view of cloud computing," Int. J. Networked Distrib. Comput., 2013, doi: 10.2991/ijndc.2013.1.1.2.
DOI
|
3 |
M. Li, S. Yu, Y. Zheng, K. Ren, and W. Lou, "Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption," IEEE Trans. Parallel Distrib. Syst., 2013, doi: 10.1109/TPDS.2012.97.
DOI
|
4 |
X. Dong, J. Yu, Y. Luo, Y. Chen, G. Xue, and M. Li, "Achieving an effective, scalable and privacy-preserving data sharing service in cloud computing," Comput. Secur., 2014, doi: 10.1016/j.cose.2013.12.002.
DOI
|
5 |
P. Yang, N. Xiong, and J. Ren, "Data Security and Privacy Protection for Cloud Storage: A Survey," IEEE Access. 2020, doi: 10.1109/ACCESS.2020.3009876.
DOI
|
6 |
N. Taleb and E. A. Mohamed, "Cloud computing trends: A literature review," Academic Journal of Interdisciplinary Studies. 2020, doi: 10.36941/ajis2020-0008.
DOI
|
7 |
M. A. Ako, "Advanced Encryption Standard (AES) Algorithm to Encrypt and Decrypt Data," Cryptogr. Netw. Secur., 2017.
|
8 |
S. Shilpashree, R. R. Patil, and C. Parvathi, "'Cloud computing an overview,'" Int. J. Eng. Technol., 2018, doi: 10.14419/ijet.v7i4.10904.
DOI
|
9 |
P. Mulinka and P. Casas, "Stream-based machine learning for network security and anomaly detection," 2018, doi: 10.1145/3229607.3229612.
DOI
|
10 |
P. Chinnasamy, S. Padmavathi, R. Swathy, and S. Rakesh, "Efficient data security using hybrid cryptography on cloud computing," 2021, doi: 10.1007/978-981-15-7345-3_46.
DOI
|
11 |
U. A. Butt et al., "A review of machine learning algorithms for cloud computing security," Electronics (Switzerland). 2020, doi: 10.3390/electronics9091379.
DOI
|