Journal articles on the topic 'Cloud data protection'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Cloud data protection.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Begum, Shameena, V. Ratna Vasuki, and K. V. V. Srinivas K.V.V.Srinivas. "Data Security and Protection in Cloud Computing." International Journal of Scientific Research 1, no. 2 (June 1, 2012): 31–34. http://dx.doi.org/10.15373/22778179/jul2012/9.
Full textAl-Museelem, Waleed, and Chun Lin Li. "Data Security and Data Privacy in Cloud Computing." Advanced Materials Research 905 (April 2014): 687–92. http://dx.doi.org/10.4028/www.scientific.net/amr.905.687.
Full textG, Indira, Sujitha S, and S. Ganapathy Subramanian. "Data Integrity Protection in Cloud." International Journal on Cybernetics & Informatics 10, no. 2 (May 31, 2021): 211–18. http://dx.doi.org/10.5121/ijci.2021.100223.
Full textHenze, Martin, René Hummen, Roman Matzutt, Daniel Catrein, and Klaus Wehrle. "Maintaining User Control While Storing and Processing Sensor Data in the Cloud." International Journal of Grid and High Performance Computing 5, no. 4 (October 2013): 97–112. http://dx.doi.org/10.4018/ijghpc.2013100107.
Full textSong, Dawn, Elaine Shi, Ian Fischer, and Umesh Shankar. "Cloud Data Protection for the Masses." Computer 45, no. 1 (January 2012): 39–45. http://dx.doi.org/10.1109/mc.2012.1.
Full textSingh, Niharika, and Ashutosh Kumar Singh. "Data Privacy Protection Mechanisms in Cloud." Data Science and Engineering 3, no. 1 (November 25, 2017): 24–39. http://dx.doi.org/10.1007/s41019-017-0046-0.
Full textDai, Xue Bing, Zhao Jing Wang, and Yan Zhang. "Data Security and Privacy Protection of Cloud Computing." Advanced Materials Research 846-847 (November 2013): 1570–73. http://dx.doi.org/10.4028/www.scientific.net/amr.846-847.1570.
Full textWei, PengCheng, Dahu Wang, Yu Zhao, Sumarga Kumar Sah Tyagi, and Neeraj Kumar. "Blockchain data-based cloud data integrity protection mechanism." Future Generation Computer Systems 102 (January 2020): 902–11. http://dx.doi.org/10.1016/j.future.2019.09.028.
Full textBeckham, Olly, Gord Oldman, Julie Karrie, and Dorth Craig. "Techniques used to formulate confidential data by means of fragmentation and hybrid encryption." International research journal of management, IT and social sciences 6, no. 6 (October 15, 2019): 68–86. http://dx.doi.org/10.21744/irjmis.v6n6.766.
Full textM. Dillibabu, M. Dillibabu, S. Kumari S. Kumari, T. Saranya T. Saranya, and R. Preethi R. Preethi. "Assured Protection & Veracity for Cloud Data Using Merkle Hash Tree Algorithm." Indian Journal of Applied Research 3, no. 3 (October 1, 2011): 124–26. http://dx.doi.org/10.15373/2249555x/mar2013/39.
Full textSonar, Abhishek, Prajwal Dubey, and Vineet Iyer. "Protection of User Data in Cloud Computing." International Journal of Computer Applications 175, no. 11 (August 17, 2020): 5–10. http://dx.doi.org/10.5120/ijca2020920584.
Full textUgbari, Augustine Obulor, and Betty Osamegbe Ahubele. "Data Protection for Users in Cloud Computing." International Journal of Computer Applications 184, no. 38 (December 24, 2022): 1–5. http://dx.doi.org/10.5120/ijca2022922215.
Full textHon, W. Kuan, Julia Hörnle, and Christopher Millard. "Data protection jurisdiction and cloud computing – when are cloud users and providers subject to EU data protection law? The cloud of unknowing." International Review of Law, Computers & Technology 26, no. 2-3 (November 2012): 129–64. http://dx.doi.org/10.1080/13600869.2012.698843.
Full textLaptev, V. A., and N. I. Solovyanenko. "«JUDICIAL CLOUD»: LEGAL ISSUES OF DATA STRUCTURING AND PROTECTION." Actual Problems of Russian Law, no. 6 (July 18, 2019): 195–204. http://dx.doi.org/10.17803/1994-1471.2019.103.6.195-204.
Full textKonan, Martin, and Wenyong Wang. "Secure Anonymous Query-Based Encryption for Data Privacy Preserving in Cloud." International Journal of Information Security and Privacy 12, no. 4 (October 2018): 1–23. http://dx.doi.org/10.4018/ijisp.2018100101.
Full textSingh, Gurpreet, and Susmita Mishra. "CLOUD COMPUTING SECURITY AND DATA PROTECTION: A REVIEW." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, no. 7 (May 14, 2015): 5887–94. http://dx.doi.org/10.24297/ijct.v14i7.1893.
Full textTomíšek, Jan. "Office 365 v. Google Apps: A data protection perspective." Masaryk University Journal of Law and Technology 9, no. 1 (June 30, 2015): 85–109. http://dx.doi.org/10.5817/mujlt2015-1-6.
Full textSauber, Amr M., Passent M. El-Kafrawy, Amr F. Shawish, Mohamed A. Amin, and Ismail M. Hagag. "A New Secure Model for Data Protection over Cloud Computing." Computational Intelligence and Neuroscience 2021 (November 24, 2021): 1–11. http://dx.doi.org/10.1155/2021/8113253.
Full textTang, Xiao Yong, Jin Wei Li, and Gui Ping Liao. "A Trust-Aware Access Control Policy for Cloud Data Protection." Applied Mechanics and Materials 411-414 (September 2013): 40–44. http://dx.doi.org/10.4028/www.scientific.net/amm.411-414.40.
Full textYau, Stephen S., Ho G. An, and Arun Balaji Buduru. "An Approach to Data Confidentiality Protection in Cloud Environments." International Journal of Web Services Research 9, no. 3 (July 2012): 67–83. http://dx.doi.org/10.4018/jwsr.2012070104.
Full textQin, Peng, Wei Li, and Ke Ding. "A Big Data Security Architecture Based on Blockchain and Trusted Data Cloud Center." Wireless Communications and Mobile Computing 2022 (August 31, 2022): 1–8. http://dx.doi.org/10.1155/2022/7272405.
Full textSun, Lei, Ji Ling Tang, and Qin Sheng Du. "Data Collection and Processing of Cloud Security Botnet Protection System." Applied Mechanics and Materials 727-728 (January 2015): 923–25. http://dx.doi.org/10.4028/www.scientific.net/amm.727-728.923.
Full textShen, Jian, Jun Shen, Chin-Feng Lai, Qi Liu, and Tianqi Zhou. "Cloud Based Data Protection in Anonymously Controlled SDN." Security and Communication Networks 2018 (2018): 1–8. http://dx.doi.org/10.1155/2018/9845426.
Full textHelmbrecht, Udo. "Data protection and legal compliance in cloud computing." Datenschutz und Datensicherheit - DuD 34, no. 8 (August 2010): 554–56. http://dx.doi.org/10.1007/s11623-010-0189-x.
Full textJoseph, Allen Oommen, Jaspher W. Kathrine, and Rohit Vijayan. "Cloud Security Mechanisms for Data Protection: A Survey." International Journal of Multimedia and Ubiquitous Engineering 9, no. 9 (September 30, 2014): 81–90. http://dx.doi.org/10.14257/ijmue.2014.9.9.09.
Full textJakimoski, Kire. "Security Techniques for Data Protection in Cloud Computing." International Journal of Grid and Distributed Computing 9, no. 1 (January 31, 2016): 49–56. http://dx.doi.org/10.14257/ijgdc.2016.9.1.05.
Full textSvantesson, Dan Jerker B. "Data protection in cloud computing – The Swedish perspective." Computer Law & Security Review 28, no. 4 (August 2012): 476–80. http://dx.doi.org/10.1016/j.clsr.2012.05.005.
Full textFal’, O. M., and V. F. Kozak. "Personal Data Protection Problems Associated with Cloud Computing." Cybernetics and Systems Analysis 50, no. 5 (September 2014): 768–73. http://dx.doi.org/10.1007/s10559-014-9667-8.
Full textKoteswari, Dr S., and Dr Kopparthi Suresh. "Analysis of Data Security and Privacy Protection in Cloud Computing Services." International Journal for Research in Applied Science and Engineering Technology 10, no. 3 (March 31, 2022): 1928–32. http://dx.doi.org/10.22214/ijraset.2022.41028.
Full textHe, Fan. "Applied-Information System in Accounting Data Security via Cloud Computing Systems." Advanced Materials Research 1022 (August 2014): 253–56. http://dx.doi.org/10.4028/www.scientific.net/amr.1022.253.
Full textXu, Tongtong, and Lei Shi. "Research on Big data Security privacy Protection based on cloud Computing." Journal of Physics: Conference Series 2083, no. 4 (November 1, 2021): 042077. http://dx.doi.org/10.1088/1742-6596/2083/4/042077.
Full textFarooque, Md, Kailash Patidar, Rishi Kushwah, and Gaurav Saxena. "An efficient data security mechanism with data sharing and authentication." ACCENTS Transactions on Information Security 5, no. 19 (July 30, 2020): 26–31. http://dx.doi.org/10.19101/tis.2020.517008.
Full textFarooque, Md, Kailash Patidar, Rishi Kushwah, and Gaurav Saxena. "An efficient data security mechanism with data sharing and authentication." ACCENTS Transactions on Information Security 5, no. 19 (July 30, 2020): 26–31. http://dx.doi.org/10.19101/tis.2020.517008.
Full textOgiela, Lidia, Marek R. Ogiela, and Hoon Ko. "Intelligent Data Management and Security in Cloud Computing." Sensors 20, no. 12 (June 18, 2020): 3458. http://dx.doi.org/10.3390/s20123458.
Full textZhang, Jian Hua, Nan Zhang, and Chun Chang Fu. "Privacy Protection in Cloud Storage." Applied Mechanics and Materials 55-57 (May 2011): 504–7. http://dx.doi.org/10.4028/www.scientific.net/amm.55-57.504.
Full textLiu, Jing, Changbo Yuan, Yingxu Lai, and Hua Qin. "Protection of Sensitive Data in Industrial Internet Based on Three-Layer Local/Fog/Cloud Storage." Security and Communication Networks 2020 (April 2, 2020): 1–16. http://dx.doi.org/10.1155/2020/2017930.
Full textEt. al., Dr M. Buvana,. "Optimize Cryptography Algorithm for Efficient Data Security on Cloud Computing." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 1S (April 11, 2021): 459–64. http://dx.doi.org/10.17762/turcomat.v12i1s.1905.
Full textWang, Yan, Ying Liu, and Chao Ling Li. "Sensitive Cloud Data Deduplication with Data Dynamics." Applied Mechanics and Materials 556-562 (May 2014): 6236–40. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.6236.
Full textP, Dayaker, Chandrasekhara Reddy T, Honey Diana P, and A. Mallikarjun Reddy. "Recent Trends in Security and Privacy of Sensitive Data in Cloud Computing." International Journal of Engineering & Technology 7, no. 4.6 (September 25, 2018): 241. http://dx.doi.org/10.14419/ijet.v7i4.6.20484.
Full textHuang, Liang, and Hyung-Hyo Lee. "A Medical Data Privacy Protection Scheme Based on Blockchain and Cloud Computing." Wireless Communications and Mobile Computing 2020 (September 26, 2020): 1–11. http://dx.doi.org/10.1155/2020/8859961.
Full textKavuri, Satheesh K. S. V. A., Gangadhara Rao Kancherla, and Basaveswararao Bobba. "An Improved Integrated Hash and Attributed based Encryption Model on High Dimensional Data in Cloud Environment." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 2 (April 1, 2017): 950. http://dx.doi.org/10.11591/ijece.v7i2.pp950-960.
Full textRavindranadh, K., Mallarapu Sai Kiran, B. Durga Sai Pavan Kumar, and D. Priyanka. "Data migration in cloud computing using honey encryption." International Journal of Engineering & Technology 7, no. 2.8 (March 19, 2018): 230. http://dx.doi.org/10.14419/ijet.v7i2.8.10415.
Full textEt. al., Prerna Agarwal. "A Safe and Resilient Cryptographic System for Dynamic Cloud Groups with Secure Data Sharing and Efficient User Revocation." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 3 (April 11, 2021): 5164–75. http://dx.doi.org/10.17762/turcomat.v12i3.2144.
Full textWoon Choong, Chen, and Leelavathi Rajamanickam. "Mobile Cloud Computing - Protection Issues." Journal of Engineering & Technological Advances 1, no. 1 (2016): 83–88. http://dx.doi.org/10.35934/segi.v1i1.83.
Full textBabitha, M. N., and M. Siddappa. "An approach for data integrity authentication and protection in fog computing." Multiagent and Grid Systems 18, no. 2 (August 30, 2022): 87–105. http://dx.doi.org/10.3233/mgs-220210.
Full textSun, Xinwei, and Zhang Wei. "The Dynamic Data Privacy Protection Strategy Based on the CAP Theory." International Journal of Interdisciplinary Telecommunications and Networking 7, no. 1 (January 2015): 44–56. http://dx.doi.org/10.4018/ijitn.2015010104.
Full textSaeed, Muhammad Yousaf, and M. N. A. Khan. "Data Protection Techniques for Building Trust in Cloud Computing." International Journal of Modern Education and Computer Science 7, no. 8 (August 8, 2015): 38–47. http://dx.doi.org/10.5815/ijmecs.2015.08.05.
Full textRai, Dr P. K., R. K. Bunkar, and Vivekananda Mishra. "Data Security and Privacy Protection Issues in Cloud Computing." IOSR Journal of Computer Engineering 16, no. 1 (2014): 39–44. http://dx.doi.org/10.9790/0661-16193944.
Full textVashishtha, Megha. "DATA-CENTRIC PROTECTION IN INTER CLOUD ENVIRONMENT: A SURVEY." International Journal of Advanced Research in Computer Science 9, no. 1 (February 20, 2018): 64–70. http://dx.doi.org/10.26483/ijarcs.v9i1.5223.
Full textMahmood, Ghassan Sabeeh, Dong Jun Huang, and Baidaa Abdulrahman Jaleel. "Data Security Protection in Cloud Using Encryption and Authentication." Journal of Computational and Theoretical Nanoscience 14, no. 4 (April 1, 2017): 1801–4. http://dx.doi.org/10.1166/jctn.2017.6508.
Full text