Journal articles on the topic 'SECURE CLOUD SYSTEMS'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'SECURE CLOUD SYSTEMS.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Baars, Thijs, and Marco Spruit. "Designing a Secure Cloud Architecture." International Journal of Information Security and Privacy 6, no. 1 (January 2012): 14–32. http://dx.doi.org/10.4018/jisp.2012010102.
Full textGupta, Daya Sagar, and G. P. Biswas. "Secure Computation on Cloud Storage." Journal of Cases on Information Technology 17, no. 3 (July 2015): 22–29. http://dx.doi.org/10.4018/jcit.2015070103.
Full textBodepudi, Anusha, Manjunath Reddy, Sai Srujan Gutlapalli, and Mounika Mandapuram. "Algorithm Policy for the Authentication of Indirect Fingerprints Used in Cloud Computing." American Journal of Trade and Policy 8, no. 3 (December 31, 2021): 231–38. http://dx.doi.org/10.18034/ajtp.v8i3.651.
Full textAeri, Manisha. "Secure Data Sharing in Cloud Computing Systems: Techniques and Applications." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 11, no. 3 (December 15, 2020): 2087–94. http://dx.doi.org/10.17762/turcomat.v11i3.13606.
Full textPaudyal, Ramesh, and Subarna Shakya. "Secure Data Mobility in Cloud Computing for e-Governance Application." Journal of Engineering Technology and Planning 2, no. 1 (August 19, 2021): 1–14. http://dx.doi.org/10.3126/joetp.v2i1.39203.
Full textHuang, Qinlong, Yue He, Wei Yue, and Yixian Yang. "Adaptive Secure Cross-Cloud Data Collaboration with Identity-Based Cryptography and Conditional Proxy Re-Encryption." Security and Communication Networks 2018 (October 1, 2018): 1–12. http://dx.doi.org/10.1155/2018/8932325.
Full textSirurmath, Ms Srilakshmi U., and Dr Deepashree Devaraj. "Secure Cloud Storage Techniques: A Review." Journal of University of Shanghai for Science and Technology 23, no. 07 (August 1, 2021): 1388–95. http://dx.doi.org/10.51201/jusst/21/07243.
Full textRavinder, Rao, and V. Sucharita. "A secure cloud service deployment framework for DevOps." Indonesian Journal of Electrical Engineering and Computer Science 21, no. 2 (February 1, 2021): 874. http://dx.doi.org/10.11591/ijeecs.v21.i2.pp874-885.
Full textLi, Jiaxing, Jigang Wu, and Long Chen. "Block-secure: Blockchain based scheme for secure P2P cloud storage." Information Sciences 465 (October 2018): 219–31. http://dx.doi.org/10.1016/j.ins.2018.06.071.
Full textPape, Sebastian, Federica Paci, Jan Jürjens, and Fabio Massacci. "Selecting a Secure Cloud Provider—An Empirical Study and Multi Criteria Approach." Information 11, no. 5 (May 11, 2020): 261. http://dx.doi.org/10.3390/info11050261.
Full textWu, Zhen-Yu. "A Secure and Efficient Digital-Data-Sharing System for Cloud Environments." Sensors 19, no. 12 (June 24, 2019): 2817. http://dx.doi.org/10.3390/s19122817.
Full textVarnovsky, N. P., V. A. Zakharov, and A. V. Shokurov. "On the existence of provably secure cloud computing systems." Moscow University Computational Mathematics and Cybernetics 40, no. 2 (April 2016): 83–88. http://dx.doi.org/10.3103/s0278641916020096.
Full textYadav, Dilip, and Sephali Behera. "A Survey on Secure Cloud-Based E-Health Systems." EAI Endorsed Transactions on Pervasive Health and Technology 5, no. 20 (May 5, 2020): 163308. http://dx.doi.org/10.4108/eai.13-7-2018.163308.
Full textSahaya Stalin Jose, G., and C. Seldev Christopher. "Secure cloud data storage approach in e-learning systems." Cluster Computing 22, S5 (February 22, 2018): 12857–62. http://dx.doi.org/10.1007/s10586-018-1785-z.
Full textZhang, Jiang, Zhenfeng Zhang, and Hui Guo. "Towards Secure Data Distribution Systems in Mobile Cloud Computing." IEEE Transactions on Mobile Computing 16, no. 11 (November 1, 2017): 3222–35. http://dx.doi.org/10.1109/tmc.2017.2687931.
Full textMallika P, Indhurekha S, and Jarlin Jeincy. "Secure and Efficient Anonymous Group Data Sharing by SBIBD Technique in Cloud Environment." international journal of engineering technology and management sciences 7, no. 1 (2023): 194–98. http://dx.doi.org/10.46647/ijetms.2023.v07i01.027.
Full textMugisha, Emmy, Gongxuan Zhang, Maouadj Zine El Abidine, and Mutangana Eugene. "A TPM-based Secure Multi-Cloud Storage Architecture grounded on Erasure Codes." International Journal of Information Security and Privacy 11, no. 1 (January 2017): 52–64. http://dx.doi.org/10.4018/ijisp.2017010104.
Full textJänicke, Lutz. "Secure communication for Industrie 4.0." at - Automatisierungstechnik 67, no. 5 (May 27, 2019): 364–71. http://dx.doi.org/10.1515/auto-2019-0018.
Full textAnnane, Boubakeur, and Alti Adel. "Proxy-3S." International Journal of Information Security and Privacy 16, no. 1 (January 2022): 1–38. http://dx.doi.org/10.4018/ijisp.2022010116.
Full textKim, Tai-hoon, and Sabah Mohammed. "Toward designing a secure biosurveillance cloud." Journal of Supercomputing 65, no. 1 (October 14, 2011): 61–70. http://dx.doi.org/10.1007/s11227-011-0709-y.
Full textAwan, Ijaz Ahmad, Muhammad Shiraz, Muhammad Usman Hashmi, Qaisar Shaheen, Rizwan Akhtar, and Allah Ditta. "Secure Framework Enhancing AES Algorithm in Cloud Computing." Security and Communication Networks 2020 (September 1, 2020): 1–16. http://dx.doi.org/10.1155/2020/8863345.
Full textGautam, Pratiksha, Mohd Dilshad Ansari, and Surender Kumar Sharma. "Enhanced Security for Electronic Health Care Information Using Obfuscation and RSA Algorithm in Cloud Computing." International Journal of Information Security and Privacy 13, no. 1 (January 2019): 59–69. http://dx.doi.org/10.4018/ijisp.2019010105.
Full textH.A, Dinesha, and D. H. Rao. "Evaluation of Secure Cloud Transmission Protocol." International Journal of Computer Network and Information Security 9, no. 3 (March 8, 2017): 45–53. http://dx.doi.org/10.5815/ijcnis.2017.03.06.
Full textAzrour, Mourade, Jamal Mabrouki, and Rajasekhar Chaganti. "New Efficient and Secured Authentication Protocol for Remote Healthcare Systems in Cloud-IoT." Security and Communication Networks 2021 (May 7, 2021): 1–12. http://dx.doi.org/10.1155/2021/5546334.
Full textKonan, Martin, and Wenyong Wang. "Secure Anonymous Query-Based Encryption for Data Privacy Preserving in Cloud." International Journal of Information Security and Privacy 12, no. 4 (October 2018): 1–23. http://dx.doi.org/10.4018/ijisp.2018100101.
Full textJouini, Mouna, and Latifa Ben Arfa Rabai. "A Security Framework for Secure Cloud Computing Environments." International Journal of Cloud Applications and Computing 6, no. 3 (July 2016): 32–44. http://dx.doi.org/10.4018/ijcac.2016070103.
Full textGupta, Daya Sagar, and G. P. Biswas. "A Secure Cloud Storage using ECC-Based Homomorphic Encryption." International Journal of Information Security and Privacy 11, no. 3 (July 2017): 54–62. http://dx.doi.org/10.4018/ijisp.2017070105.
Full textKUMAR SINGAMANENI, Kranthi, and Pasala SANYASI NAIDU. "Secure key management in cloud environment using quantum cryptography." Ingénierie des systèmes d'information 23, no. 5 (October 28, 2018): 213–22. http://dx.doi.org/10.3166/isi.23.5.213-222.
Full textPing, Yuan, Yu Zhan, Ke Lu, and Baocang Wang. "Public Data Integrity Verification Scheme for Secure Cloud Storage." Information 11, no. 9 (August 25, 2020): 409. http://dx.doi.org/10.3390/info11090409.
Full textSun, Shuang, Rong Du, and Shudong Chen. "A Secure and Computable Blockchain-Based Data Sharing Scheme in IoT System." Information 12, no. 2 (January 20, 2021): 47. http://dx.doi.org/10.3390/info12020047.
Full textLiu, Qin, Zhengzheng Hao, Yu Peng, Hongbo Jiang, Jie Wu, Tao Peng, Guojun Wang, and Shaobo Zhang. "SecVKQ: Secure and verifiable kNN queries in sensor–cloud systems." Journal of Systems Architecture 120 (November 2021): 102300. http://dx.doi.org/10.1016/j.sysarc.2021.102300.
Full textLiu, Qin, Zhengzheng Hao, Yu Peng, Hongbo Jiang, Jie Wu, Tao Peng, Guojun Wang, and Shaobo Zhang. "SecVKQ: Secure and verifiable kNN queries in sensor–cloud systems." Journal of Systems Architecture 120 (November 2021): 102300. http://dx.doi.org/10.1016/j.sysarc.2021.102300.
Full textKiskani, Mohsen Karimzadeh, and Hamid R. Sadjadpour. "Secure and Private Information Retrieval (SAPIR) in Cloud Storage Systems." IEEE Transactions on Vehicular Technology 67, no. 12 (December 2018): 12302–12. http://dx.doi.org/10.1109/tvt.2018.2876683.
Full textPremnath, Sriram N., and Zygmunt J. Haas. "A Practical, Secure, and Verifiable Cloud Computing for Mobile Systems." Procedia Computer Science 34 (2014): 474–83. http://dx.doi.org/10.1016/j.procs.2014.07.033.
Full textShin, Youngjoo, Dongyoung Koo, Junbeom Hur, and Joobeom Yun. "Secure proof of storage with deduplication for cloud storage systems." Multimedia Tools and Applications 76, no. 19 (September 23, 2015): 19363–78. http://dx.doi.org/10.1007/s11042-015-2956-z.
Full textChandel, Sonali, Geng Yang, and Sumit Chakravarty. "RSA-CP-IDABE: A Secure Framework for Multi-User and Multi-Owner Cloud Environment." Information 11, no. 8 (July 29, 2020): 382. http://dx.doi.org/10.3390/info11080382.
Full textOsmani, Lirim, Salman Toor, Miika Komu, Matti J. Kortelainen, Tomas Linden, John White, Rasib Khan, Paula Eerola, and Sasu Tarkoma. "Secure Cloud Connectivity for Scientific Applications." IEEE Transactions on Services Computing 11, no. 4 (July 1, 2018): 658–70. http://dx.doi.org/10.1109/tsc.2015.2469292.
Full textSahaya Stalin, Jose G., and Christopher C. Seldev. "Minimize the Replication for Secure Cloud Data Storage Systems Using Error Correction Codes." Applied Mechanics and Materials 626 (August 2014): 26–31. http://dx.doi.org/10.4028/www.scientific.net/amm.626.26.
Full textBhardwaj, Akashdeep, and Sam Goundar. "Algorithm for Secure Hybrid Cloud Design Against DDoS Attacks." International Journal of Information Technology and Web Engineering 13, no. 4 (October 2018): 61–77. http://dx.doi.org/10.4018/ijitwe.2018100104.
Full textAgarwal, Neha, Ajay Rana, J. P. Pandey, and Amit Agarwal. "Secured Sharing of Data in Cloud via Dual Authentication, Dynamic Unidirectional PRE, and CPABE." International Journal of Information Security and Privacy 14, no. 1 (January 2020): 44–66. http://dx.doi.org/10.4018/ijisp.2020010104.
Full textPassricha, Vishal, Ashish Chopra, and Shubhanshi Singhal. "Secure Deduplication Scheme for Cloud Encrypted Data." International Journal of Advanced Pervasive and Ubiquitous Computing 11, no. 2 (April 2019): 27–40. http://dx.doi.org/10.4018/ijapuc.2019040103.
Full textYang, Haibin, Zhengge Yi, Ruifeng Li, Zheng Tu, Xu An Wang, Yuanyou Cui, and Xiaoyuan Yang. "Improved Outsourced Provable Data Possession for Secure Cloud Storage." Security and Communication Networks 2021 (July 22, 2021): 1–12. http://dx.doi.org/10.1155/2021/1805615.
Full textAldahwan, Nouf S., and Muhammed S. Ramzan. "Factors Affecting the Organizational Adoption of Secure Community Cloud in KSA." Security and Communication Networks 2021 (September 9, 2021): 1–8. http://dx.doi.org/10.1155/2021/8134739.
Full textPathak, Vinay. "A Priority Based Efficient Secure Framework for WBANs." International Journal of Information Security and Privacy 13, no. 3 (July 2019): 60–73. http://dx.doi.org/10.4018/ijisp.201907010104.
Full textAlshamrani, Sultan. "An efficient algorithm for monitoring virtual machines in clouds." Bulletin of Electrical Engineering and Informatics 8, no. 2 (June 1, 2019): 699–705. http://dx.doi.org/10.11591/eei.v8i2.1416.
Full textkaur, Sandeep, Gaganpreet kaur, and Mohammad Shabaz. "A Secure Two-Factor Authentication Framework in Cloud Computing." Security and Communication Networks 2022 (March 12, 2022): 1–9. http://dx.doi.org/10.1155/2022/7540891.
Full textChabbi, Samir, Rachid Boudour, and Fouzi Semchedine. "A Secure Cloud Password and Secure Authentication Protocol for Electronic NFC Payment Between ATM and Smartphone." Ingénierie des systèmes d information 25, no. 2 (May 15, 2020): 139–52. http://dx.doi.org/10.18280/isi.250201.
Full textRana, Minahil, Khalid Mahmood, Muhammad Asad Saleem, Fadi Al-Turjman, Manjur Sayyadbadasha Kolhar, and Chadi Altrjman. "Towards a Provably Secure Authentication Protocol for Fog-Driven IoT-Based Systems." Applied Sciences 13, no. 3 (January 20, 2023): 1424. http://dx.doi.org/10.3390/app13031424.
Full textR. Vignesh, R. Vignesh, and J. Preethi R. Vignesh. "Secure Data Deduplication System with Efficient and Reliable Multi-Key Management in Cloud Storage." 網際網路技術學刊 23, no. 4 (July 2022): 811–25. http://dx.doi.org/10.53106/160792642022072304016.
Full textFavre, Liliana Maria. "Formal Metamodeling for Secure Model-Driven Engineering." International Journal of Systems and Software Security and Protection 12, no. 2 (July 2021): 46–67. http://dx.doi.org/10.4018/ijsssp.2021070104.
Full text