Download as pdf or txt
Download as pdf or txt
You are on page 1of 1

(IJACSA) International Journal of Advanced Computer Science and Applications,

Vol. 7, No. 9, 2016

[44] M.B. Mollah, K.R. Islam, and S.S. Islam. Next generation of computing [51] Eystein Mathisen. Security Challenges and Solutions in Cloud
through cloud computing technology, in: 2012 25th IEEE Canadian Computing, in: International Conference on Digital Ecosystems and
Conference on Electrical Computer Engineering (CCECE), May Technologies (IEEE DEST 2011), 2011.p.208-212.
2012.p.1-6. [52] R. Velumadhava Raoa, K. Selvamanib , Data Security Challenges and Its
[45] Shucheng Yu, Cong Wang, Kui Ren, and Wenjing Lou. Achieving Solutions in Cloud Computing , 2015 The Authors. Published by Elsevier
secure, scalable and fine-grained data access control in cloud computing, B.V. This is an open access article under the CC BY-NC-ND license
in: IN-FOCOM, 2010 Proceedings IEEE, 2010.p.1-9. (http://creativecommons.org/licenses/by-nc-nd/4.0/). Conference
[46] Kresimir Popovic and Zeljko Hocenski. Cloud computing security issues Organized by Interscience Institute of Management and Technology,
and challenges, in: MIPRO, 2010 Proceedings of the 33rd International Bhubaneswar, Odisha, India ,Peer-review under responsibility of
Convention, 2010.p.344-349. scientific committee of International Conference on Computer,
Communication and Convergence (ICCC 2015)
[47] Akhil Bhel, Emerging Security Challenges in Cloud Computing.
Information and Communication Technologies, in: 2011 World Congress [53] J. Staten, “Is Cloud Computing Ready For The Enterprise,” Forrester ...
on, Mumbai, 2011.p.217-222. 17th International workshop on Quality of Service, pp.1–9, July 13–15,
2009.
[48] Farzad Sabahi. Cloud Computing Security Threats and Responses, in:
IEEE 3rd International Conference on Communication software and [54] Jay Heiser and Mark Nicolett, " An Engineering Process to Address
Networks(ICCSN), May 2011.p.245-249. Security Challenges in Cloud Computing" ASE
BIGDATA/SOCIALCOM/CYBERSECURITY Conference, Stanford
[49] Eman M.Mohamed, Hatem S Abdelkader, Sherif EI Etriby. Enhanced University, May 27-31, 2014
Data Security Model for Cloud Computing, in:8th International
Conference on Informatics and Systems(INFOS), Cairo, May 2012.p.12- [55] Seccombe A, et al. Security guidance for critical areas of focus in cloud
17. computing. Cloud Security Alliance, 2009.
[50] Wentao Liu. Research on Cloud Computing Security Problem and [56] Paula Kotzé , et al. Secure cloud computing: Benefits, risks and controls,
Strategy, in: 2nd International Conference on Consumer Electronics. ieeexplore.ieee.org/iel5/6017604/.../06027519.pdf
Communications and Networks (CECNet), April 2012.p.1216-1219.

159 | P a g e
www.ijacsa.thesai.org

You might also like