Professional Documents
Culture Documents
Bibliography
Submitted to
Nathan Garrelts
02/14/2016
Spring 2016
BIBLIOGRAPHY 2
Problem
Many third party users, employees etc. are allowed to access sensitive data in the cloud
Question: What accountability does a service provider have for protecting confidential data that
References
Ayoleke, I. (2011). Cloud Computing Security Issues and Challenges. 3(5), 247-255.
Retrieved from
https://www.researchgate.net/profile/Ibikunle_Ayoleke/publication/259072387_Cloud_C
omputing_Security_Issues_and_Challenges/links/0deec529df37a5aa28000000.pdf
Chow, R., Golle, P., Jakobsson, M., Masuoka, R., & Molina, J. (2009). Controlling Data in the
http://markus-jakobsson.com/papers/jakobsson-ccsw09.pdf
cloud-council.org. (2015, March). Security for Cloud Computing Ten Steps to Ensure Success.
Cloud-Computing-10-Steps-to-Ensure-Success.pdf
Dutta, A., Peng, G., & Choudhary, A. (2013). Risks in Enterprise Cloud Computing: The
http://eprints.whiterose.ac.uk/79144/2/WRRO_79144.pdf
Firdhous, M., Ghazali, O., & Hassan, S. (2011). Trust Management in Cloud Computing: A
http://arxiv.org/ftp/arxiv/papers/1211/1211.3979.pdf
G., Sehra, S. S., & Singh, J. (2013). Policy Specification in Role based Access Control on
Huang, J., & Nicol, D. M. (2013, December). Trust mechanisms for cloud computing. Retrieved
from http://link.springer.com/article/10.1186/2192-113X-2-9/fulltext.html
BIBLIOGRAPHY 4
Hwang, K., & Li, D. (2010). Trusted Cloud Computing with Secure Resources and Data
computing.pdf
I, S., & P, J. (2013). International Journal of Advanced Research in Computer Science and
http://www.ijarcsse.com/docs/papers/Volume_3/11_November2013/V3I11-0400.pdf
K, P., & S, J. P. (2012). Analysis of Different Access Control Mechanism in Cloud. 4, 34-39.
Retrieved from
http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.402.635&rep=rep1&type=pdf
Kalyani, H., Rahul, P., & Ambika, P. (2014). Achieve Fine Grained Data Access Control in
Cloud Computing using KP-ABE along-with Lazy and Proxy Re-encryption. 4(2), 457-
Karwasra, N., & Sharma, M. (2012). CLOUD COMPUTING: SECURITY RISKS AND ITS
content/uploads/2012/12/IJCSCE.SI812110.pdf
http://www.arpnjournals.com/jeas/research_papers/rp_2012/jeas_0512_699.pdf
Khan, K. M., & Malluhi, Q. (2010). Establishing Trust in Cloud Computing. 20-26. Retrieved
from
http://www.computer.org/cms/ComputingNow/HomePage/2010/1110/rW_IT_Establishin
gTrustCloudComputing.pdf
BIBLIOGRAPHY 5
Kharche, H., & Chouhan, D. S. (2012). Building Trust In Cloud Using Public Key Infrastructure.
Building_Trust_In_Cloud_Using_Public_Key_Infrastructure.pdf
Mell, P., & Grance, T. (2009, July 10). Effectively and Securely Using the Cloud Computing
https://www.cs.purdue.edu/homes/bb/cs590/handouts/Cloud_NIST.pdf
Morsy, M. A., Grundy, J., & Müller, I. (2010, November 30). An Analysis of The Cloud
g/papers/cloud2010_1.pdf
N, J., Y, R. S., & R, H. (2013). Cloud Data Protection for the Masses. 4(4), 701-706.
Onankunju, B. K. (2013). Access Control in Cloud Computing. 3(9), 1-3. Retrieved from
http://www.ijsrp.org/research-paper-0913/ijsrp-p2107.pdf
Pandith, M. Y. (2014). Data security and privacy concerns in cloud computing. 2(2), 6-11.
Retrieved from
http://article.sciencepublishinggroup.com/pdf/10.11648.j.iotcc.20140202.11.pdf
Pearson, S. (2009, March 06). Taking Account of Privacy when Designing Cloud Computing
Pearson, S. (2012). Privacy, Security and Trust in Cloud Computing. 1-57. Retrieved from
http://www.hpl.hp.com/techreports/2012/HPL-2012-80R1.pdf
http://searchcompliance.techtarget.com/definition/cloud-computing-security
BIBLIOGRAPHY 6
S, R., MM, E., & E, S. (2010). The Management of Security in Cloud Computing. Retrieved from
http://icsa.cs.up.ac.za/issa/2010/Proceedings/Full/27_Paper.pdf
Sen, J. (n.d.). Security and Privacy Issues in Cloud Computing. 1-42. Retrieved from
http://arxiv.org/ftp/arxiv/papers/1303/1303.4814.pdf
Sherman, M. (2013, March). How can cloud providers offer sensitive data protection? Retrieved
from http://searchtelecom.techtarget.com/answer/How-can-cloud-providers-offer-
sensitive-data-protection
Shrivastava, N., & Yadav, R. (2013). A Review of Cloud Computing Security Issues. 3(1), 550-
Takab, H., Joshi, J. B., & Ahn, G. (2010). Security and Privacy Challenges in Cloud Computing
http://csis.pace.edu/~marchese/SE765/Paper/security2.pdf
Tavizi, T., Shajari, M., & Dodangeh, P. (2012). A Usage Control Based Architecture for Cloud
Weber, R. H., & Staiger, D. N. (2014). Cloud Computing: A cluster of complex liability issues.