0% found this document useful (0 votes)
321 views6 pages

Bibliography

This document is a bibliography for a paper on cloud computing security. It lists 28 references from sources such as research papers, reports, and articles published between 2009-2014. The references discuss various security and privacy issues related to data storage and access controls in cloud computing environments. The problem stated is that third parties are allowed access to sensitive cloud data without proper security controls.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
321 views6 pages

Bibliography

This document is a bibliography for a paper on cloud computing security. It lists 28 references from sources such as research papers, reports, and articles published between 2009-2014. The references discuss various security and privacy issues related to data storage and access controls in cloud computing environments. The problem stated is that third parties are allowed access to sensitive cloud data without proper security controls.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Running head: BIBLIOGRAPHY 1

Bibliography

Pavan Kumar Kurra

Submitted to

Nathan Garrelts

MISI-799- Capstone Project

02/14/2016

Ferris State University

Spring 2016
BIBLIOGRAPHY 2

Problem

Many third party users, employees etc. are allowed to access sensitive data in the cloud

without proper accessibility and security.

Question: What accountability does a service provider have for protecting confidential data that

is stored in the cloud?


BIBLIOGRAPHY 3

References

Ayoleke, I. (2011). Cloud Computing Security Issues and Challenges. 3(5), 247-255.

Retrieved from

https://www.researchgate.net/profile/Ibikunle_Ayoleke/publication/259072387_Cloud_C

omputing_Security_Issues_and_Challenges/links/0deec529df37a5aa28000000.pdf

Chow, R., Golle, P., Jakobsson, M., Masuoka, R., & Molina, J. (2009). Controlling Data in the

Cloud: Outsourcing Computation without Outsourcing Control. 85-90. Retrieved from

http://markus-jakobsson.com/papers/jakobsson-ccsw09.pdf

cloud-council.org. (2015, March). Security for Cloud Computing Ten Steps to Ensure Success.

4-35. Retrieved from http://www.cloud-council.org/deliverables/CSCC-Security-for-

Cloud-Computing-10-Steps-to-Ensure-Success.pdf

Dutta, A., Peng, G., & Choudhary, A. (2013). Risks in Enterprise Cloud Computing: The

Perspective of IT Experts. 1-16. Retrieved from

http://eprints.whiterose.ac.uk/79144/2/WRRO_79144.pdf

Firdhous, M., Ghazali, O., & Hassan, S. (2011). Trust Management in Cloud Computing: A

Critical Review. 4(2), 24-36. Retrieved from

http://arxiv.org/ftp/arxiv/papers/1211/1211.3979.pdf

G., Sehra, S. S., & Singh, J. (2013). Policy Specification in Role based Access Control on

Clouds. 75, 39-43. Retrieved from http://arxiv.org/ftp/arxiv/papers/1308/1308.5177.pdf

Huang, J., & Nicol, D. M. (2013, December). Trust mechanisms for cloud computing. Retrieved

from http://link.springer.com/article/10.1186/2192-113X-2-9/fulltext.html
BIBLIOGRAPHY 4

Hwang, K., & Li, D. (2010). Trusted Cloud Computing with Secure Resources and Data

Coloring. 14-22. Retrieved from http://gridsec.usc.edu/hwang/papers/trusted-cloud-

computing.pdf

I, S., & P, J. (2013). International Journal of Advanced Research in Computer Science and

Software Engineering. 3(11), 627-630. Retrieved from

http://www.ijarcsse.com/docs/papers/Volume_3/11_November2013/V3I11-0400.pdf

K, P., & S, J. P. (2012). Analysis of Different Access Control Mechanism in Cloud. 4, 34-39.

Retrieved from

http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.402.635&rep=rep1&type=pdf

Kalyani, H., Rahul, P., & Ambika, P. (2014). Achieve Fine Grained Data Access Control in

Cloud Computing using KP-ABE along-with Lazy and Proxy Re-encryption. 4(2), 457-

461. Retrieved from http://www.ijetae.com/files/Volume4Issue2/IJETAE_0214_76.pdf

Karwasra, N., & Sharma, M. (2012). CLOUD COMPUTING: SECURITY RISKS AND ITS

FUTURE. 5-9. Retrieved from http://static.ijcsce.org/wp-

content/uploads/2012/12/IJCSCE.SI812110.pdf

Khan, A. R. (2012). ACCESS CONTROL IN CLOUD COMPUTING ENVIRONMENT.

7, 613-615. Retrieved from

http://www.arpnjournals.com/jeas/research_papers/rp_2012/jeas_0512_699.pdf

Khan, K. M., & Malluhi, Q. (2010). Establishing Trust in Cloud Computing. 20-26. Retrieved

from

http://www.computer.org/cms/ComputingNow/HomePage/2010/1110/rW_IT_Establishin

gTrustCloudComputing.pdf
BIBLIOGRAPHY 5

Kharche, H., & Chouhan, D. S. (2012). Building Trust In Cloud Using Public Key Infrastructure.

3, 26-31. Retrieved from https://thesai.org/Downloads/Volume3No3/Paper5-

Building_Trust_In_Cloud_Using_Public_Key_Infrastructure.pdf

Mell, P., & Grance, T. (2009, July 10). Effectively and Securely Using the Cloud Computing

Paradigm. 1-92. Retrieved from

https://www.cs.purdue.edu/homes/bb/cs590/handouts/Cloud_NIST.pdf

Morsy, M. A., Grundy, J., & Müller, I. (2010, November 30). An Analysis of The Cloud

Computing Security Problem. Retrieved from https://www.cs.auckland.ac.nz/~john-

g/papers/cloud2010_1.pdf

N, J., Y, R. S., & R, H. (2013). Cloud Data Protection for the Masses. 4(4), 701-706.

Retrieved from http://ijcttjournal.org/Volume4/issue-4/IJCTT-V4I4P153.pdf

Onankunju, B. K. (2013). Access Control in Cloud Computing. 3(9), 1-3. Retrieved from

http://www.ijsrp.org/research-paper-0913/ijsrp-p2107.pdf

Pandith, M. Y. (2014). Data security and privacy concerns in cloud computing. 2(2), 6-11.

Retrieved from

http://article.sciencepublishinggroup.com/pdf/10.11648.j.iotcc.20140202.11.pdf

Pearson, S. (2009, March 06). Taking Account of Privacy when Designing Cloud Computing

Services. Retrieved from http://www.hpl.hp.com/techreports/2009/HPL-2009-54.pdf

Pearson, S. (2012). Privacy, Security and Trust in Cloud Computing. 1-57. Retrieved from

http://www.hpl.hp.com/techreports/2012/HPL-2012-80R1.pdf

Rouse, M. (2012, December). Cloud computing security. Retrieved from

http://searchcompliance.techtarget.com/definition/cloud-computing-security
BIBLIOGRAPHY 6

S, R., MM, E., & E, S. (2010). The Management of Security in Cloud Computing. Retrieved from

http://icsa.cs.up.ac.za/issa/2010/Proceedings/Full/27_Paper.pdf

Sen, J. (n.d.). Security and Privacy Issues in Cloud Computing. 1-42. Retrieved from

http://arxiv.org/ftp/arxiv/papers/1303/1303.4814.pdf

Sherman, M. (2013, March). How can cloud providers offer sensitive data protection? Retrieved

from http://searchtelecom.techtarget.com/answer/How-can-cloud-providers-offer-

sensitive-data-protection

Shrivastava, N., & Yadav, R. (2013). A Review of Cloud Computing Security Issues. 3(1), 550-

553. Retrieved from http://www.ijeit.com/Vol 3/Issue 1/IJEIT1412201307_104.pdf

Takab, H., Joshi, J. B., & Ahn, G. (2010). Security and Privacy Challenges in Cloud Computing

Environments. 24-31. Retrieved from

http://csis.pace.edu/~marchese/SE765/Paper/security2.pdf

Tavizi, T., Shajari, M., & Dodangeh, P. (2012). A Usage Control Based Architecture for Cloud

Environments. 1534-1539. Retrieved from

http://user.das.ufsc.br/~dsboger/doutorado/wesley/Tavizi-2012-A Usage Control Base.pdf

Weber, R. H., & Staiger, D. N. (2014). Cloud Computing: A cluster of complex liability issues.

Retrieved from http://webjcli.org/article/view/303/418

You might also like