You are on page 1of 6

Running head: BIBLIOGRAPHY 1

Bibliography

Pavan Kumar Kurra

Submitted to

Nathan Garrelts

MISI-799- Capstone Project

02/14/2016

Ferris State University

Spring 2016
BIBLIOGRAPHY 2

Problem

Many third party users, employees etc. are allowed to access sensitive data in the cloud

without proper accessibility and security.

Question: What accountability does a service provider have for protecting confidential data that

is stored in the cloud?


BIBLIOGRAPHY 3

References

Ayoleke, I. (2011). Cloud Computing Security Issues and Challenges. 3(5), 247-255.

Retrieved from

https://www.researchgate.net/profile/Ibikunle_Ayoleke/publication/259072387_Cloud_C

omputing_Security_Issues_and_Challenges/links/0deec529df37a5aa28000000.pdf

Chow, R., Golle, P., Jakobsson, M., Masuoka, R., & Molina, J. (2009). Controlling Data in the

Cloud: Outsourcing Computation without Outsourcing Control. 85-90. Retrieved from

http://markus-jakobsson.com/papers/jakobsson-ccsw09.pdf

cloud-council.org. (2015, March). Security for Cloud Computing Ten Steps to Ensure Success.

4-35. Retrieved from http://www.cloud-council.org/deliverables/CSCC-Security-for-

Cloud-Computing-10-Steps-to-Ensure-Success.pdf

Dutta, A., Peng, G., & Choudhary, A. (2013). Risks in Enterprise Cloud Computing: The

Perspective of IT Experts. 1-16. Retrieved from

http://eprints.whiterose.ac.uk/79144/2/WRRO_79144.pdf

Firdhous, M., Ghazali, O., & Hassan, S. (2011). Trust Management in Cloud Computing: A

Critical Review. 4(2), 24-36. Retrieved from

http://arxiv.org/ftp/arxiv/papers/1211/1211.3979.pdf

G., Sehra, S. S., & Singh, J. (2013). Policy Specification in Role based Access Control on

Clouds. 75, 39-43. Retrieved from http://arxiv.org/ftp/arxiv/papers/1308/1308.5177.pdf

Huang, J., & Nicol, D. M. (2013, December). Trust mechanisms for cloud computing. Retrieved

from http://link.springer.com/article/10.1186/2192-113X-2-9/fulltext.html
BIBLIOGRAPHY 4

Hwang, K., & Li, D. (2010). Trusted Cloud Computing with Secure Resources and Data

Coloring. 14-22. Retrieved from http://gridsec.usc.edu/hwang/papers/trusted-cloud-

computing.pdf

I, S., & P, J. (2013). International Journal of Advanced Research in Computer Science and

Software Engineering. 3(11), 627-630. Retrieved from

http://www.ijarcsse.com/docs/papers/Volume_3/11_November2013/V3I11-0400.pdf

K, P., & S, J. P. (2012). Analysis of Different Access Control Mechanism in Cloud. 4, 34-39.

Retrieved from

http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.402.635&rep=rep1&type=pdf

Kalyani, H., Rahul, P., & Ambika, P. (2014). Achieve Fine Grained Data Access Control in

Cloud Computing using KP-ABE along-with Lazy and Proxy Re-encryption. 4(2), 457-

461. Retrieved from http://www.ijetae.com/files/Volume4Issue2/IJETAE_0214_76.pdf

Karwasra, N., & Sharma, M. (2012). CLOUD COMPUTING: SECURITY RISKS AND ITS

FUTURE. 5-9. Retrieved from http://static.ijcsce.org/wp-

content/uploads/2012/12/IJCSCE.SI812110.pdf

Khan, A. R. (2012). ACCESS CONTROL IN CLOUD COMPUTING ENVIRONMENT.

7, 613-615. Retrieved from

http://www.arpnjournals.com/jeas/research_papers/rp_2012/jeas_0512_699.pdf

Khan, K. M., & Malluhi, Q. (2010). Establishing Trust in Cloud Computing. 20-26. Retrieved

from

http://www.computer.org/cms/ComputingNow/HomePage/2010/1110/rW_IT_Establishin

gTrustCloudComputing.pdf
BIBLIOGRAPHY 5

Kharche, H., & Chouhan, D. S. (2012). Building Trust In Cloud Using Public Key Infrastructure.

3, 26-31. Retrieved from https://thesai.org/Downloads/Volume3No3/Paper5-

Building_Trust_In_Cloud_Using_Public_Key_Infrastructure.pdf

Mell, P., & Grance, T. (2009, July 10). Effectively and Securely Using the Cloud Computing

Paradigm. 1-92. Retrieved from

https://www.cs.purdue.edu/homes/bb/cs590/handouts/Cloud_NIST.pdf

Morsy, M. A., Grundy, J., & Müller, I. (2010, November 30). An Analysis of The Cloud

Computing Security Problem. Retrieved from https://www.cs.auckland.ac.nz/~john-

g/papers/cloud2010_1.pdf

N, J., Y, R. S., & R, H. (2013). Cloud Data Protection for the Masses. 4(4), 701-706.

Retrieved from http://ijcttjournal.org/Volume4/issue-4/IJCTT-V4I4P153.pdf

Onankunju, B. K. (2013). Access Control in Cloud Computing. 3(9), 1-3. Retrieved from

http://www.ijsrp.org/research-paper-0913/ijsrp-p2107.pdf

Pandith, M. Y. (2014). Data security and privacy concerns in cloud computing. 2(2), 6-11.

Retrieved from

http://article.sciencepublishinggroup.com/pdf/10.11648.j.iotcc.20140202.11.pdf

Pearson, S. (2009, March 06). Taking Account of Privacy when Designing Cloud Computing

Services. Retrieved from http://www.hpl.hp.com/techreports/2009/HPL-2009-54.pdf

Pearson, S. (2012). Privacy, Security and Trust in Cloud Computing. 1-57. Retrieved from

http://www.hpl.hp.com/techreports/2012/HPL-2012-80R1.pdf

Rouse, M. (2012, December). Cloud computing security. Retrieved from

http://searchcompliance.techtarget.com/definition/cloud-computing-security
BIBLIOGRAPHY 6

S, R., MM, E., & E, S. (2010). The Management of Security in Cloud Computing. Retrieved from

http://icsa.cs.up.ac.za/issa/2010/Proceedings/Full/27_Paper.pdf

Sen, J. (n.d.). Security and Privacy Issues in Cloud Computing. 1-42. Retrieved from

http://arxiv.org/ftp/arxiv/papers/1303/1303.4814.pdf

Sherman, M. (2013, March). How can cloud providers offer sensitive data protection? Retrieved

from http://searchtelecom.techtarget.com/answer/How-can-cloud-providers-offer-

sensitive-data-protection

Shrivastava, N., & Yadav, R. (2013). A Review of Cloud Computing Security Issues. 3(1), 550-

553. Retrieved from http://www.ijeit.com/Vol 3/Issue 1/IJEIT1412201307_104.pdf

Takab, H., Joshi, J. B., & Ahn, G. (2010). Security and Privacy Challenges in Cloud Computing

Environments. 24-31. Retrieved from

http://csis.pace.edu/~marchese/SE765/Paper/security2.pdf

Tavizi, T., Shajari, M., & Dodangeh, P. (2012). A Usage Control Based Architecture for Cloud

Environments. 1534-1539. Retrieved from

http://user.das.ufsc.br/~dsboger/doutorado/wesley/Tavizi-2012-A Usage Control Base.pdf

Weber, R. H., & Staiger, D. N. (2014). Cloud Computing: A cluster of complex liability issues.

Retrieved from http://webjcli.org/article/view/303/418

You might also like