Journal articles on the topic 'Cloud Computing ; Cloud Security ; Cloud'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Cloud Computing ; Cloud Security ; Cloud.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Mouli, K. Chandra, and U. Seshadri. "Singleto Multi Clouds for Security in Cloud Computing by using Secret Key Sharing." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 10, no. 4 (2013): 1539–45. http://dx.doi.org/10.24297/ijct.v10i4.3254.
Full textWu, Ji Yi, Qian Li Shen, Jian Lin Zhang, and Qi Xie. "Cloud Computing: Cloud Security to Trusted Cloud." Advanced Materials Research 186 (January 2011): 596–600. http://dx.doi.org/10.4028/www.scientific.net/amr.186.596.
Full textMathkunti, Nivedita M. "Cloud Computing: Security Issues." International Journal of Computer and Communication Engineering 3, no. 4 (2014): 259–63. http://dx.doi.org/10.7763/ijcce.2014.v3.332.
Full textChen, Chih-Yung, and Jih-Fu Tu. "A Novel Cloud Computing Algorithm of Security and Privacy." Mathematical Problems in Engineering 2013 (2013): 1–6. http://dx.doi.org/10.1155/2013/871430.
Full textHamlen, Kevin, Murat Kantarcioglu, Latifur Khan, and Bhavani Thuraisingham. "Security Issues for Cloud Computing." International Journal of Information Security and Privacy 4, no. 2 (2010): 36–48. http://dx.doi.org/10.4018/jisp.2010040103.
Full textAl-Museelem, Waleed, and Chun Lin Li. "Data Security and Data Privacy in Cloud Computing." Advanced Materials Research 905 (April 2014): 687–92. http://dx.doi.org/10.4028/www.scientific.net/amr.905.687.
Full textBeckham, Olly, Gord Oldman, Julie Karrie, and Dorth Craig. "Techniques used to formulate confidential data by means of fragmentation and hybrid encryption." International research journal of management, IT and social sciences 6, no. 6 (2019): 68–86. http://dx.doi.org/10.21744/irjmis.v6n6.766.
Full textXie, Hui Juan, Wei She, and Chang Hao Han. "Shamir's Threshold Scheme to Ensure Security in Cloud Computing Services." Applied Mechanics and Materials 543-547 (March 2014): 3632–35. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.3632.
Full textShyam, Gopal K., and Mir Abdul Samim Ansari. "Security Concerns in Cloud Computing." International Journal of Trend in Scientific Research and Development Volume-2, Issue-5 (2018): 2296–301. http://dx.doi.org/10.31142/ijtsrd18306.
Full textD, Mahalakshmi, and Mrs T. Sathiyabama. "Security Issues in Cloud Computing." International Journal of Trend in Scientific Research and Development Volume-2, Issue-6 (2018): 881–83. http://dx.doi.org/10.31142/ijtsrd18674.
Full textDutta, Sreejit. "Security Issues in Cloud Computing." International journal of Emerging Trends in Science and Technology 04, no. 11 (2016): 4747–52. http://dx.doi.org/10.18535/ijetst/v3i11.04.
Full textCharles, P. Joseph. "Security Issues in Cloud Computing." International journal of Emerging Trends in Science and Technology 05, no. 06 (2017): 5253–56. http://dx.doi.org/10.18535/ijetst/v4i6.05.
Full textSabanayasmin, J., Dr S. Periyasamy, and Dr K. Balamurugan. "Achieving Security for Cloud Computing." Bonfring International Journal of Networking Technologies and Applications 6, no. 2 (2019): 01–04. http://dx.doi.org/10.9756/bijnta.9037.
Full textZhu, You Chan, Peng Liu, and Jun Ting Wang. "Cloud Security Research in Cloud Computing." Applied Mechanics and Materials 198-199 (September 2012): 415–19. http://dx.doi.org/10.4028/www.scientific.net/amm.198-199.415.
Full textSheela Gowr, P., and N. Kumar. "Cloud computing security: a survey." International Journal of Engineering & Technology 7, no. 2.21 (2018): 355. http://dx.doi.org/10.14419/ijet.v7i2.21.12439.
Full textArshad, Junaid, Paul Townend, Jie Xu, and Wei Jie. "Cloud Computing Security." International Journal of Grid and High Performance Computing 4, no. 1 (2012): 52–66. http://dx.doi.org/10.4018/jghpc.2012010104.
Full textSHORO, S., S. RAJPER, and B. BALOCH. "Cloud Computing Security." SINDH UNIVERSITY RESEARCH JOURNAL -SCIENCE SERIES 49, no. 004 (2017): 831——834. http://dx.doi.org/10.26692/surj/2017.12.67.
Full textCarlin, Sean, and Kevin Curran. "Cloud Computing Security." International Journal of Ambient Computing and Intelligence 3, no. 1 (2011): 14–19. http://dx.doi.org/10.4018/jaci.2011010102.
Full textGautam, Pratiksha, Mohd Dilshad Ansari, and Surender Kumar Sharma. "Enhanced Security for Electronic Health Care Information Using Obfuscation and RSA Algorithm in Cloud Computing." International Journal of Information Security and Privacy 13, no. 1 (2019): 59–69. http://dx.doi.org/10.4018/ijisp.2019010105.
Full textEt. al., Pavithra G,. "A Novel Watermarking and Re-Encryption Approach to Avoid Illegal Content Sharing In Cloud." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (2021): 2603–9. http://dx.doi.org/10.17762/turcomat.v12i2.2229.
Full textArun, Lakshna, and T. N. Ravi. "Mobile Cloud Computing: A Literature Survey." Asian Journal of Engineering and Applied Technology 7, no. 2 (2018): 80–85. http://dx.doi.org/10.51983/ajeat-2018.7.2.1003.
Full textWang, Tian, Yucheng Lu, Zhihan Cao, et al. "When Sensor-Cloud Meets Mobile Edge Computing." Sensors 19, no. 23 (2019): 5324. http://dx.doi.org/10.3390/s19235324.
Full textYupeng, Tuo, Xu Jie, Xu Zhikai, and Ye Jianwei. "Job Security in the Cloud Computing." International Journal of Future Computer and Communication 4, no. 1 (2015): 59–62. http://dx.doi.org/10.7763/ijfcc.2015.v4.356.
Full textAnjaneyulu, P., and Mr S. Srinivasa Reddy. "Cloud Computing Adoption Approach towards Securing Data in Cloud Computing." International Journal of Trend in Scientific Research and Development Volume-2, Issue-4 (2018): 390–93. http://dx.doi.org/10.31142/ijtsrd12995.
Full textWang, Li Hui. "Research on Security of Database in Cloud Computing Environment." Applied Mechanics and Materials 644-650 (September 2014): 1694–97. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.1694.
Full textArshad, Junaid, Paul Townend, and Jie Xu. "An Abstract Model for Integrated Intrusion Detection and Severity Analysis for Clouds." International Journal of Cloud Applications and Computing 1, no. 1 (2011): 1–16. http://dx.doi.org/10.4018/ijcac.2011010101.
Full textMotawie, Rola, Mahmoud M. El-Khouly, and Samir Abou El-Seoud. "Security Problems in Cloud Computing." International Journal of Recent Contributions from Engineering, Science & IT (iJES) 4, no. 4 (2016): 36. http://dx.doi.org/10.3991/ijes.v4i4.6538.
Full textФролов, Вячеслав Вікторович. "АНАЛИЗ ПОДХОДОВ К ОБЕСПЕЧЕНИЮ БЕЗОПАСНОСТИ ОБЛАЧНЫХ СЕРВИСОВ". RADIOELECTRONIC AND COMPUTER SYSTEMS, № 1 (28 січня 2020): 70–82. http://dx.doi.org/10.32620/reks.2020.1.07.
Full textJain, Jaishree, and Ajit Singh. "Quantum-based Rivest–Shamir–Adleman (RSA) approach for digital forensic reports." Modern Physics Letters B 34, no. 06 (2020): 2050085. http://dx.doi.org/10.1142/s0217984920500852.
Full textMahajan, Rini, and Dr Dheerendra Singh. "Cloud Computing Issues." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 4, no. 2 (2005): 626–30. http://dx.doi.org/10.24297/ijct.v4i2c2.4185.
Full textRoyChowdhury, Rajarshi. "Security in Cloud Computing." International Journal of Computer Applications 96, no. 15 (2014): 24–30. http://dx.doi.org/10.5120/16870-6767.
Full textAlrehaili, Nada, and Agadee Mutaha. "Cloud Computing Security Challenges." IARJSET 7, no. 8 (2020): 120–23. http://dx.doi.org/10.17148/iarjset.2020.7817.
Full textVorobiev, V,, S. R, Ryzhkov, and R. R. Fatkieva. "Cloud computing security perimeter." Program Systems: Theory and Applications 6, no. 1 (2015): 61–71. http://dx.doi.org/10.25209/2079-3316-2015-6-1-61-71.
Full textSingh, Shweta. "Security in Cloud Computing." International Journal of Computer Applications Technology and Research 3, no. 8 (2014): 488–93. http://dx.doi.org/10.7753/ijcatr0308.1001.
Full textChandana Kumari, P. ILA, S. Swarajya Laxmi, B. Rekha, et al. "VMM based Secured Virtualization in Cloud-Computing." Indonesian Journal of Electrical Engineering and Computer Science 4, no. 3 (2016): 643. http://dx.doi.org/10.11591/ijeecs.v4.i3.pp643-648.
Full textAhmed, Monjur, and Mohammad Ashraf Hossain. "Cloud Computing and Security Issues in the Cloud." International Journal of Network Security & Its Applications 6, no. 1 (2014): 25–36. http://dx.doi.org/10.5121/ijnsa.2014.6103.
Full textYunis, Manal M. "A 'cloud-free' security model for cloud computing." International Journal of Services and Standards 5, no. 4 (2009): 354. http://dx.doi.org/10.1504/ijss.2009.032177.
Full textChangchit, Chuleeporn. "Cloud Computing." International Journal of Information and Communication Technology Education 11, no. 2 (2015): 105–17. http://dx.doi.org/10.4018/ijicte.2015040109.
Full textGovinda, K., and E. Sathiyamoorthy. "Privacy Preservation of a Group and Secure Data Storage in Cloud Environment." Cybernetics and Information Technologies 15, no. 1 (2015): 46–54. http://dx.doi.org/10.1515/cait-2015-0005.
Full textKhan, Nawsher, A. Noraziah, Elrasheed I. Ismail, Mustafa Mat Deris, and Tutut Herawan. "Cloud Computing." International Journal of E-Entrepreneurship and Innovation 3, no. 2 (2012): 51–59. http://dx.doi.org/10.4018/jeei.2012040104.
Full textBegum, Shameena, V. Ratna Vasuki, and K. V. V. Srinivas K.V.V.Srinivas. "Data Security and Protection in Cloud Computing." International Journal of Scientific Research 1, no. 2 (2012): 31–34. http://dx.doi.org/10.15373/22778179/jul2012/9.
Full textMalviya, Deepak Kumar, and Umesh Kumar Lilhore. "Survey on Security Threats in Cloud Computing." International Journal of Trend in Scientific Research and Development Volume-3, Issue-1 (2018): 1222–26. http://dx.doi.org/10.31142/ijtsrd19172.
Full textLakshmi, V. Naga, and Shameena Begum. "Security Issues & Controls in Cloud Computing." Indian Journal of Applied Research 1, no. 5 (2011): 38–40. http://dx.doi.org/10.15373/2249555x/feb2012/15.
Full textAiyer, Viswanath, Rohit Bhutkar, Sagar Anvekar, and Dinesh Chavan. "Guaranteeing Data Storage Security in Cloud Computing." International Journal of Engineering Research 4, no. 5 (2015): 231–34. http://dx.doi.org/10.17950/ijer/v4s5/504.
Full textB.Arun, B. Arun, and S. K. Prashanth S.K.Prashanth. "Cloud Computing Security Using Secret Sharing Algorithm." Paripex - Indian Journal Of Research 2, no. 3 (2012): 93–94. http://dx.doi.org/10.15373/22501991/mar2013/35.
Full textSantiko, Irfan, and Rahman Rosidi. "PEMANFAATAN PRIVATE CLOUD STORAGE SEBAGAI MEDIA PENYIMPANAN DATA E-LEARNING PADA LEMBAGA PENDIDIKAN." JURNAL TEKNIK INFORMATIKA 10, no. 2 (2018): 137–46. http://dx.doi.org/10.15408/jti.v10i2.6992.
Full textK.SAI MANOJ, Dr. "Cloud security: risk factors and security issues in current trends." International Journal of Engineering & Technology 8, no. 4 (2019): 424. http://dx.doi.org/10.14419/ijet.v8i4.29655.
Full textR, Kamatchi, Kimaya Ambekar, and Yash Parikh. "Security Mapping of a Usage Based Cloud System." Network Protocols and Algorithms 8, no. 4 (2017): 56. http://dx.doi.org/10.5296/npa.v8i4.10240.
Full textRasina Begum, B., and P. Chithra. "Cloud Based Secured Log Retrieval Using Fully Homomorphic Encryption." Asian Journal of Engineering and Applied Technology 9, no. 1 (2020): 13–17. http://dx.doi.org/10.51983/ajeat-2020.9.1.1084.
Full textBhardwaj, Akashdeep, and Sam Goundar. "Unique Taxonomy for Evaluating Fog Computing Services." International Journal of E-Business Research 14, no. 4 (2018): 78–90. http://dx.doi.org/10.4018/ijebr.2018100105.
Full text