Journal articles on the topic 'Privacy in Cloud computing'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Privacy in Cloud computing.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
C, Yashaswini. "Privacy Regulations for Cloud Computing." International Journal of Research Publication and Reviews 5, no. 11 (2024): 4045–47. https://doi.org/10.55248/gengpi.5.1124.3312.
Full textAl-Museelem, Waleed, and Chun Lin Li. "Data Security and Data Privacy in Cloud Computing." Advanced Materials Research 905 (April 2014): 687–92. http://dx.doi.org/10.4028/www.scientific.net/amr.905.687.
Full textChen, Chih-Yung, and Jih-Fu Tu. "A Novel Cloud Computing Algorithm of Security and Privacy." Mathematical Problems in Engineering 2013 (2013): 1–6. http://dx.doi.org/10.1155/2013/871430.
Full textSrivastava, Aryan, and Pawan Singh. "Security Issues in Cloud Computing." Journal of Management and Service Science (JMSS) 2, no. 1 (2022): 1–11. http://dx.doi.org/10.54060/jmss/002.01.003.
Full textAshwini, Jilla, and C. Sreedhar K. "Fog Based Three-Layer Architecture for Privacy Preserving." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 5 (2020): 1082–85. https://doi.org/10.35940/ijeat.E1010.069520.
Full textBhansali, Aayushi. "Cloud Security and Privacy." International Journal for Research in Applied Science and Engineering Technology 11, no. 8 (2023): 1539–42. http://dx.doi.org/10.22214/ijraset.2023.55416.
Full textJavaid, Muhammad Adeel. "Cloud Computing Security and Privacy." Computer Science and Information Technology 2, no. 5 (2014): 219–31. http://dx.doi.org/10.13189/csit.2014.020501.
Full textGovinda, K., and E. Sathiyamoorthy. "Privacy Preservation of a Group and Secure Data Storage in Cloud Environment." Cybernetics and Information Technologies 15, no. 1 (2015): 46–54. http://dx.doi.org/10.1515/cait-2015-0005.
Full textGulshan, Kumar* Dr.Vijay Laxmi. "A REVIEW ON SECURITY AND PRIVACY ISSUES IN CLOUD COMPUTING." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 4 (2017): 192–96. https://doi.org/10.5281/zenodo.546305.
Full textDeepak, Kumar Malviya, and Kumar Lilhore Umesh. "Survey on Security Threats in Cloud Computing." International Journal of Trend in Scientific Research and Development 3, no. 1 (2018): 1222–26. https://doi.org/10.31142/ijtsrd19172.
Full textSeema, G. Bavachkar, S. Shewale Ajinkya, Patil Ashish, and Shiradwade Shridhar. "Mobile Cloud Computing and its Privacy." Recent Trends in Cloud Computing and Web Engineering 1, no. 3 (2019): 1–3. https://doi.org/10.5281/zenodo.3571842.
Full textMaheswari, J. Uma, S. Vijayalakshmi, Rajiv Gandhi N, Laith H. Alzubaidi, Khonimkulov Anvar, and R. Elangovan. "Data Privacy and Security in Cloud Computing Environments." E3S Web of Conferences 399 (2023): 04040. http://dx.doi.org/10.1051/e3sconf/202339904040.
Full textCoss, David Lewis, and Gurpreet Dhillon. "Cloud privacy objectives a value based approach." Information & Computer Security 27, no. 2 (2019): 189–220. http://dx.doi.org/10.1108/ics-05-2017-0034.
Full text., Mageto Stephen N., and Dr N. V. Balaji . "Enhanced Data Security in Cloud Computing: Survey." International Journal of Engineering Technology and Management Sciences 6, no. 1 (2022): 1–6. http://dx.doi.org/10.46647/ijetms.2022.v06i01.001.
Full textZeel, B. Dabhi, and Kulkarni Akanksha. "Data Security in Cloud Computing." International Journal of Innovative Science and Research Technology 7, no. 12 (2023): 982–86. https://doi.org/10.5281/zenodo.7505036.
Full textR, Kamatchi, Kimaya Ambekar, and Yash Parikh. "Security Mapping of a Usage Based Cloud System." Network Protocols and Algorithms 8, no. 4 (2017): 56. http://dx.doi.org/10.5296/npa.v8i4.10240.
Full textYin, Myo Kay Khine Thaw, and Myat Nwe Win Khin. "Understanding the Determinants of Security and Privacy in Cloud Computing Architecture." International Journal of Trend in Scientific Research and Development 3, no. 5 (2019): 881–84. https://doi.org/10.5281/zenodo.3589827.
Full textXie, Hui Juan, Wei She, and Chang Hao Han. "Shamir's Threshold Scheme to Ensure Security in Cloud Computing Services." Applied Mechanics and Materials 543-547 (March 2014): 3632–35. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.3632.
Full textWang, Jian, and Xiao Yu Qi. "Novel Private Matching Protocol Suitable for Cloud Computing." Applied Mechanics and Materials 373-375 (August 2013): 1678–81. http://dx.doi.org/10.4028/www.scientific.net/amm.373-375.1678.
Full textYadav, Paras Kumar, Harshit Pandey, and Mrs Himani Tyagi. "Security and Privacy Challenges in Mobile Cloud Computing." International Scientific Journal of Engineering and Management 03, no. 12 (2024): 1–6. https://doi.org/10.55041/isjem02183.
Full textPatil, Ketaki, Saisrijan Gupta, Anjali Nair, and Vitthal Gutte. "Cloud, Fog and Edge Computing: Security and Privacy Concerns." International Journal for Research in Applied Science and Engineering Technology 10, no. 5 (2022): 286–91. http://dx.doi.org/10.22214/ijraset.2022.41862.
Full textMuhammad Suleiman, Muhammad, Surajo Sa’id, and Rahama Babale Shu'aibu. "PRIVACY AND SECURITY CONCERNS IN THE ADOPTION OF CLOUD COMPUTING TECHNOLOGY." Journal of Applied Science, Information and Computing 2, no. 1 (2021): 33–42. http://dx.doi.org/10.59568/jasic-2021-2-1-05.
Full textVumo, Ambrosio Patricio. "A Study into Privacy and Legal Issues in Cloud Computing: The Mozambican Context." International Conference on Cyber Warfare and Security 19, no. 1 (2024): 511–17. http://dx.doi.org/10.34190/iccws.19.1.2095.
Full textGao, Lei, and Alisa G. Brink. "A Content Analysis of the Privacy Policies of Cloud Computing Services." Journal of Information Systems 33, no. 3 (2018): 93–115. http://dx.doi.org/10.2308/isys-52188.
Full textNadia Tabassum, Humaria Naeem, and Asma Batool. "The Data Security and multi-cloud Privacy concerns." International Journal for Electronic Crime Investigation 7, no. 1 (2023): 49–58. http://dx.doi.org/10.54692/ijeci.2023.0701128.
Full textSaja, J. Mohammed, and B. Taha Dujan. "From cloud computing security towards homomorphic encryption: A comprehensive review." TELKOMNIKA (Telecommunication, Computing, Electronics and Control) 19, no. 4 (2021): 1152–61. https://doi.org/10.12928/telkomnika.v19i4.16875.
Full textYashasvi, Sharma, and Sharma Yashraj. "SECURITY ISSUES AND ENVIRONMENTS IN CLOUD COMPUTING." International Journal of Research - Granthaalayah 7, no. 7 (2019): 398–404. https://doi.org/10.5281/zenodo.3365361.
Full textMahajan, Rini, and Dr Dheerendra Singh. "Cloud Computing Issues." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 4, no. 2 (2005): 626–30. http://dx.doi.org/10.24297/ijct.v4i2c2.4185.
Full textAmandeep, Kaur, and Nagpal Pooja. "A SURVEY ON LOAD BALANCING IN CLOUD COMPUTING USING ARTIFICIAL INTELLIGENCE TECHNIQUES." International Journal of Multidisciplinary Research and Modern Education 2, no. 2 (2016): 418–23. https://doi.org/10.5281/zenodo.192681.
Full textDai, Xue Bing, Zhao Jing Wang, and Yan Zhang. "Data Security and Privacy Protection of Cloud Computing." Advanced Materials Research 846-847 (November 2013): 1570–73. http://dx.doi.org/10.4028/www.scientific.net/amr.846-847.1570.
Full textDeepak, Jain*1 &. Nidhi Singh2. "PROVIDING SECURITY USING ENCRYPTION AND SPLITTING TECHNIQUE OVER CLOUD STORAGE." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 7, no. 6 (2018): 255–63. https://doi.org/10.5281/zenodo.1284187.
Full textAnshu, Sharma*1 Mrs. Chitvan Gupta2 &. Mr. Mayank Deep Khare3. "ENHANCING DATA SECURITY ON CLOUD USING SPLIT TECHNIQUE." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 7, no. 6 (2018): 564–72. https://doi.org/10.5281/zenodo.1299131.
Full textRishabh, Mudgal*1 &. Mrs. Kirti Bhatia2. "A SURVEY ON ENHANCING DATA SECURITY ON CLOUD STORAGE USING SPLIT TECHNIQUE." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 7, no. 8 (2018): 430–39. https://doi.org/10.5281/zenodo.1345682.
Full textBhandayker, Yeshwanth Rao. "An Overview of Service Models and Cloud Computing Evolution in IT." International Journal of Research and Applications 5, no. 20 (2018): 1000–1004. https://doi.org/10.5281/zenodo.13348024.
Full textRazaque, Abdul, Mohamed Ben Haj Frej, Bandar Alotaibi, and Munif Alotaibi. "Privacy Preservation Models for Third-Party Auditor over Cloud Computing: A Survey." Electronics 10, no. 21 (2021): 2721. http://dx.doi.org/10.3390/electronics10212721.
Full textXu, Tongtong, and Lei Shi. "Research on Big data Security privacy Protection based on cloud Computing." Journal of Physics: Conference Series 2083, no. 4 (2021): 042077. http://dx.doi.org/10.1088/1742-6596/2083/4/042077.
Full textMARTIN OTIENO. "Techniques and protocols for enhancing data privacy in cloud computing: A review." World Journal of Advanced Engineering Technology and Sciences 8, no. 1 (2023): 391–404. http://dx.doi.org/10.30574/wjaets.2023.8.1.0064.
Full textGururaj, H. L. "A comprehensive analysis of security challenges in mobile cloud computing." i-manager’s Journal on Cloud Computing 10, no. 2 (2023): 35. http://dx.doi.org/10.26634/jcc.10.2.20419.
Full textAlZain, Mohammed A., Alice S. Li, Ben Soh, and Eric Pardede. "Multi-Cloud Data Management using Shamir's Secret Sharing and Quantum Byzantine Agreement Schemes." International Journal of Cloud Applications and Computing 5, no. 3 (2015): 35–52. http://dx.doi.org/10.4018/ijcac.2015070103.
Full textGhudayyer, Mohammad Bin, Yasir Javed, and Mamdouh Alenezi. "A Security Perspective on Adoption and Migration to Mobile Cloud Technology." JOIV : International Journal on Informatics Visualization 1, no. 4 (2017): 143. http://dx.doi.org/10.30630/joiv.1.4.54.
Full textYoungho Park, Chul Sur, and Kyung-Hyune Rhee. "A Privacy Preserving V2I Service Access Management System for Vehicular Clouds." Research Briefs on Information and Communication Technology Evolution 1 (January 15, 2015): 51–61. http://dx.doi.org/10.56801/rebicte.v1i.7.
Full textSuchit, Kumar Vyas, and Satish Kumar Dr. "Study of mobile cloud computing security and its challenges." International Journal of Advance Research in Multidisciplinary 1, no. 1 (2023): 511–16. https://doi.org/10.5281/zenodo.13950280.
Full textCharu Jain. "Survey of Cloud Computing Security and Privacy Issues." Darpan International Research Analysis 12, no. 3 (2024): 160–71. http://dx.doi.org/10.36676/dira.v12.i3.63.
Full textTari, Zahir. "Security and Privacy in Cloud Computing." IEEE Cloud Computing 1, no. 1 (2014): 54–57. http://dx.doi.org/10.1109/mcc.2014.20.
Full textXiang, Yang, Beniamino Di Martino, Guilin Wang, and Jin Li. "Cloud Computing: Security, Privacy and Practice." Future Generation Computer Systems 52 (November 2015): 59–60. http://dx.doi.org/10.1016/j.future.2015.06.007.
Full textWakrime, Abderrahim Ait. "Satisfiability-Based Privacy-Aware Cloud Computing." Computer Journal 60, no. 12 (2017): 1760–69. http://dx.doi.org/10.1093/comjnl/bxx039.
Full textXiao, Zhifeng, and Yang Xiao. "Security and Privacy in Cloud Computing." IEEE Communications Surveys & Tutorials 15, no. 2 (2013): 843–59. http://dx.doi.org/10.1109/surv.2012.060912.00182.
Full textAljwari, Fatimah Khalil. "Challenges of Privacy in Cloud Computing." Journal of Computer and Communications 10, no. 12 (2022): 51–61. http://dx.doi.org/10.4236/jcc.2022.1012004.
Full textZou, Deqing, Yang Xiang, and Geyong Min. "Privacy preserving in cloud computing environment." Security and Communication Networks 9, no. 15 (2016): 2752–53. http://dx.doi.org/10.1002/sec.1498.
Full textSaini, Himani, and Gopal Singh. "Privacy Preservation Techniques in Cloud Computing." ESP Journal of Engineering & Technology Advancements 2, no. 4 (2023): 15–21. http://dx.doi.org/10.56472/25832646/jeta-v3i1p103.
Full text