Data Security and Privacy Assurance for Cloud Computing in Education Based on a Third Party Auditor

被引:0
|
作者
Alim, Endy Sjaiful [1 ,2 ]
Jin, Hai [1 ]
机构
[1] Huazhong Univ Sci & Technol, Sch Comp Sci & Technol, Serv Comp Technol & Syst Lab, Wuhan, Hubei, Peoples R China
[2] Univ Muhammadiyah Prof Dr HAMKA UHAMKA, Jakarta, Indonesia
关键词
D O I
暂无
中图分类号
R9 [药学];
学科分类号
1007 ;
摘要
142
引用
收藏
页码:96 / 97
页数:2
相关论文
共 50 条
  • [31] Security and Assurance Aspects to be Observed in Cloud Computing Based Data Centers: A Study
    Rao, N. Thirupathi
    Sravani, A.
    Bhattacharyya, Debnath
    Kim, Tai-hoon
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2018, 12 (04): : 1 - 14
  • [32] Achieving Cloud Security using Third Party Auditor, MD5 and Identity-Based Encryption
    Gajendra, Bhale Pradeepkumar
    Singh, Vinay Kumar
    Sujeet, More
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2016, : 1304 - 1309
  • [33] Security and Privacy in Cloud Computing
    Tari, Zahir
    [J]. IEEE CLOUD COMPUTING, 2014, 1 (01): : 54 - 57
  • [34] Security and Privacy in Cloud Computing
    Hamouda, Sara
    [J]. 2012 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGIES, APPLICATIONS AND MANAGEMENT (ICCCTAM), 2012, : 241 - 245
  • [35] Security and Privacy in Cloud Computing
    Xiao, Zhifeng
    Xiao, Yang
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (02): : 843 - 859
  • [36] Security and Privacy in Cloud Computing
    Soni, Rajat
    Ambalkar, Smrutee
    Bansal, Pratosh
    [J]. 2016 SYMPOSIUM ON COLOSSAL DATA ANALYSIS AND NETWORKING (CDAN), 2016,
  • [37] Privacy preserving model-based authentication and data security in cloud computing
    Pawar, Ankush Balaram
    Ghumbre, Shashikant U.
    Jogdand, Rashmi M.
    [J]. INTERNATIONAL JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS, 2023, 19 (02) : 173 - 190
  • [38] An anomaly-based framework for mitigating effects of DDoS attacks using a third party auditor in cloud computing environments
    Hezavehi, Sasha Mahdavi
    Rahmani, Rouhollah
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2020, 23 (04): : 2609 - 2627
  • [39] An anomaly-based framework for mitigating effects of DDoS attacks using a third party auditor in cloud computing environments
    Sasha Mahdavi Hezavehi
    Rouhollah Rahmani
    [J]. Cluster Computing, 2020, 23 : 2609 - 2627
  • [40] Interactive anomaly-based DDoS attack detection method in cloud computing environments using a third party auditor
    Hezavehi, Sasha Mahdavi
    Rahmani, Rouhollah
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2023, 178 : 82 - 99