Araştırma Makalesi
BibTex RIS Kaynak Göster
Yıl 2019, Cilt: 2 Sayı: 2, 15 - 27, 30.12.2019

Öz

Kaynakça

  • Z. Al Haddad,M. Hanoune,A. Mamouni, Sécurité de cloud computing : approches et solutions,REINNOVA Vol1 N1, pp.67-71,Mars 2016.
  • Qu'est-ce que le cloud computing ,https://azure.microsoft.com/fr-fr/overview/what-is-cloud-computing/Last accessed17/12/2018.
  • P. Pankaj and C. Inderveer, "A Secure Data Transfer Technique for Cloud Computing," THAPAR UNIVERSITY,August 2014, 2014.
  • C. Rong, S. T. Nguyen, and M. G. Jaatun, "Beyond lightning: A survey on security challenges in cloud computing,"Comput. Electr. Eng., vol. 39, no. 1, pp. 47-54, Jan. 2013.
  • K. Arjun, G. L. Byung, L. HoonJae, and K. Anu, "Secure Storage and Access of Data in Cloud," International-Conference on ICT Convergence (ICTC), 15-Oct-2012.
  • S. Maninder and S. Sarbjeet, "Design and Implementation of Multi -tier Authentication Scheme in Cloud,"IJCSIInt. J. Comput. Sci., vol. 9, no. 2.
  • K. Satish and G. Anita, "Multi-Authentication for Cloud Security: A Framework," Int. J. Comput. Sci.Eng.Technol. IJCSET, vol. 5, no. 04, Apr. 2014
  • A. S.Ezhil, G. B, and A. S, "Privacy -Preserving Public Auditing In Cloud Using HMAC Algorithm," Int. J.RecentTechnol. Eng. IJRTE, vol. 2, Mar. 2013.
  • P. Kalpana and S. Singaraju, "Data security in cloud computing using RSA algorithm,"IJRCCT, vol. 1, no. 4,pp. 143-146, 2012.
  • U. Somani, K. Lakhani, and M. Mundra, "Implementing digital signature with RSA encryption algorithm toenhance the Data Security of cloud in Cloud Computing,"2010, pp. 211-216.
  • V. R. Balasaraswathi and S. Manikandan, "Enhanced security for multi-cloud storage using cryptographic datasplitting with dynamic approach," in Advanced CommunicationControl and Computing Technologies (ICACCCT),2014International Conference on, 2014, pp. 1190-1194.
  • X. Zhang, J. Schiffman, S. Gibbs, A. Kunjithapatham, and S. Jeong, "Securing elastic applications on mobiledevices for cloud computing," 2009, p. 127
  • D. A. B. Fernandes, L. F. B. Soares, J. V. Gomes, M. M. Freire, and P. R. M. Inácio, "Security issues in cloudenvironments: a survey," Int. J. Inf. Secur., vol. 13, no. 2, pp. 113-170, Apr. 2014.
  • M. Ali, S. U. Khan, and A. V. Vasilakos, "Security in cloud computing: Opportunities and challenges," Inf. Sci.,vol. 305, pp. 357-383, Jun. 2015.
  • B.-H. CARINE, "Cloud computing, la sécurité en question."
  • J. Guillaume, "securite-des-donnees-5-points-averifier- avant-de-signer-son-contrat-de-cloud-computing," Sep-2014.
  • S. Pascal, "Cloud Computing et Sécurité, Cycle de conférences sur cloud computing et virtualisation, Sécurité dela Virtualisation et du Cloud Computing," Paris, 2010.
  • K. Karkouda, N. Harbi, J. Darmont, and G. Gavin, "Confidentialité et disponibilité des données entreposées dansles nuages," in 9ème atelier Fouille de données complexes (EGCFDC2012), 2012.
  • E. M. Mohamed, H. S. Abdelkader, and S. El-Etriby, "Enhanced data security model for cloud computing," inInformatics and Systems (INFOS), 2012 8th InternationalConference on, 2012, pp. CC-12.
  • Institute of Electrical and Electronics Engineers, Ed., "Enhancing Data Security during Transit in Public Cloud,"Int.J. Eng. Innov. Technol. IJEIT, vol. 3, Jul. 2013.
  • D. Chen and H. Zhao, "Data Security and Privacy Protection Issues in Cloud Computing," 2012, pp. 647-651.
  • Balakrishnan.S, Saranya.G, Shobana.S, and Karthikeyan.S, "Introducing Effective Third Party Auditing (TPA)for Data Storage Security in Cloud," Int. J. Comput. SciEnce Technol., vol. 2, Jun. 2011.
  • F. Aloul, S. Zahidi, and W. El-Hajj, "Two factor authentication using mobile phones," in Computer SystemsandApplications, 2009. AICCSA 2009. IEEE/ACS InternationalConference on, 2009, pp. 641-644.
  • Data security in cloud computing - Part 3: Cloud data protection methods,:https://www.eetimes.com/documentLast accessed 28/12/2018.
  • K.Boisaubert,P.Gérard:Protection des données et cloud computing,pp.38-48, 2017-2018

State of the Art in Some Cloud Security Through Data Tracking

Yıl 2019, Cilt: 2 Sayı: 2, 15 - 27, 30.12.2019

Öz

Today cloud computing helps small businesses and users who miss them powerful resources, a shared information system or data security, etc.Let's introduce through this article: cloud service models, cloud deployment models and essential features, computer security in general. The different solutions proposed in the field of cloud security.We finish with a conclusion and our proposal in this domain to strengthen the security of this new paradigm.

Kaynakça

  • Z. Al Haddad,M. Hanoune,A. Mamouni, Sécurité de cloud computing : approches et solutions,REINNOVA Vol1 N1, pp.67-71,Mars 2016.
  • Qu'est-ce que le cloud computing ,https://azure.microsoft.com/fr-fr/overview/what-is-cloud-computing/Last accessed17/12/2018.
  • P. Pankaj and C. Inderveer, "A Secure Data Transfer Technique for Cloud Computing," THAPAR UNIVERSITY,August 2014, 2014.
  • C. Rong, S. T. Nguyen, and M. G. Jaatun, "Beyond lightning: A survey on security challenges in cloud computing,"Comput. Electr. Eng., vol. 39, no. 1, pp. 47-54, Jan. 2013.
  • K. Arjun, G. L. Byung, L. HoonJae, and K. Anu, "Secure Storage and Access of Data in Cloud," International-Conference on ICT Convergence (ICTC), 15-Oct-2012.
  • S. Maninder and S. Sarbjeet, "Design and Implementation of Multi -tier Authentication Scheme in Cloud,"IJCSIInt. J. Comput. Sci., vol. 9, no. 2.
  • K. Satish and G. Anita, "Multi-Authentication for Cloud Security: A Framework," Int. J. Comput. Sci.Eng.Technol. IJCSET, vol. 5, no. 04, Apr. 2014
  • A. S.Ezhil, G. B, and A. S, "Privacy -Preserving Public Auditing In Cloud Using HMAC Algorithm," Int. J.RecentTechnol. Eng. IJRTE, vol. 2, Mar. 2013.
  • P. Kalpana and S. Singaraju, "Data security in cloud computing using RSA algorithm,"IJRCCT, vol. 1, no. 4,pp. 143-146, 2012.
  • U. Somani, K. Lakhani, and M. Mundra, "Implementing digital signature with RSA encryption algorithm toenhance the Data Security of cloud in Cloud Computing,"2010, pp. 211-216.
  • V. R. Balasaraswathi and S. Manikandan, "Enhanced security for multi-cloud storage using cryptographic datasplitting with dynamic approach," in Advanced CommunicationControl and Computing Technologies (ICACCCT),2014International Conference on, 2014, pp. 1190-1194.
  • X. Zhang, J. Schiffman, S. Gibbs, A. Kunjithapatham, and S. Jeong, "Securing elastic applications on mobiledevices for cloud computing," 2009, p. 127
  • D. A. B. Fernandes, L. F. B. Soares, J. V. Gomes, M. M. Freire, and P. R. M. Inácio, "Security issues in cloudenvironments: a survey," Int. J. Inf. Secur., vol. 13, no. 2, pp. 113-170, Apr. 2014.
  • M. Ali, S. U. Khan, and A. V. Vasilakos, "Security in cloud computing: Opportunities and challenges," Inf. Sci.,vol. 305, pp. 357-383, Jun. 2015.
  • B.-H. CARINE, "Cloud computing, la sécurité en question."
  • J. Guillaume, "securite-des-donnees-5-points-averifier- avant-de-signer-son-contrat-de-cloud-computing," Sep-2014.
  • S. Pascal, "Cloud Computing et Sécurité, Cycle de conférences sur cloud computing et virtualisation, Sécurité dela Virtualisation et du Cloud Computing," Paris, 2010.
  • K. Karkouda, N. Harbi, J. Darmont, and G. Gavin, "Confidentialité et disponibilité des données entreposées dansles nuages," in 9ème atelier Fouille de données complexes (EGCFDC2012), 2012.
  • E. M. Mohamed, H. S. Abdelkader, and S. El-Etriby, "Enhanced data security model for cloud computing," inInformatics and Systems (INFOS), 2012 8th InternationalConference on, 2012, pp. CC-12.
  • Institute of Electrical and Electronics Engineers, Ed., "Enhancing Data Security during Transit in Public Cloud,"Int.J. Eng. Innov. Technol. IJEIT, vol. 3, Jul. 2013.
  • D. Chen and H. Zhao, "Data Security and Privacy Protection Issues in Cloud Computing," 2012, pp. 647-651.
  • Balakrishnan.S, Saranya.G, Shobana.S, and Karthikeyan.S, "Introducing Effective Third Party Auditing (TPA)for Data Storage Security in Cloud," Int. J. Comput. SciEnce Technol., vol. 2, Jun. 2011.
  • F. Aloul, S. Zahidi, and W. El-Hajj, "Two factor authentication using mobile phones," in Computer SystemsandApplications, 2009. AICCSA 2009. IEEE/ACS InternationalConference on, 2009, pp. 641-644.
  • Data security in cloud computing - Part 3: Cloud data protection methods,:https://www.eetimes.com/documentLast accessed 28/12/2018.
  • K.Boisaubert,P.Gérard:Protection des données et cloud computing,pp.38-48, 2017-2018
Toplam 25 adet kaynakça vardır.

Ayrıntılar

Birincil Dil İngilizce
Konular Yazılım Mühendisliği (Diğer)
Bölüm Makaleler
Yazarlar

Mébarka Aya Dey 0000-0003-4723-6363

Ahmed Chaouki Lokbanı Bu kişi benim

Reda Mohamed Hamou Bu kişi benim

Mohamed Amine Boudıa Bu kişi benim

Abdelmalek Amıne Bu kişi benim

Yayımlanma Tarihi 30 Aralık 2019
Kabul Tarihi 30 Aralık 2019
Yayımlandığı Sayı Yıl 2019 Cilt: 2 Sayı: 2

Kaynak Göster

APA Dey, M. A., Lokbanı, A. C., Hamou, R. M., Boudıa, M. A., vd. (2019). State of the Art in Some Cloud Security Through Data Tracking. International Journal of Informatics and Applied Mathematics, 2(2), 15-27.
AMA Dey MA, Lokbanı AC, Hamou RM, Boudıa MA, Amıne A. State of the Art in Some Cloud Security Through Data Tracking. IJIAM. Aralık 2019;2(2):15-27.
Chicago Dey, Mébarka Aya, Ahmed Chaouki Lokbanı, Reda Mohamed Hamou, Mohamed Amine Boudıa, ve Abdelmalek Amıne. “State of the Art in Some Cloud Security Through Data Tracking”. International Journal of Informatics and Applied Mathematics 2, sy. 2 (Aralık 2019): 15-27.
EndNote Dey MA, Lokbanı AC, Hamou RM, Boudıa MA, Amıne A (01 Aralık 2019) State of the Art in Some Cloud Security Through Data Tracking. International Journal of Informatics and Applied Mathematics 2 2 15–27.
IEEE M. A. Dey, A. C. Lokbanı, R. M. Hamou, M. A. Boudıa, ve A. Amıne, “State of the Art in Some Cloud Security Through Data Tracking”, IJIAM, c. 2, sy. 2, ss. 15–27, 2019.
ISNAD Dey, Mébarka Aya vd. “State of the Art in Some Cloud Security Through Data Tracking”. International Journal of Informatics and Applied Mathematics 2/2 (Aralık 2019), 15-27.
JAMA Dey MA, Lokbanı AC, Hamou RM, Boudıa MA, Amıne A. State of the Art in Some Cloud Security Through Data Tracking. IJIAM. 2019;2:15–27.
MLA Dey, Mébarka Aya vd. “State of the Art in Some Cloud Security Through Data Tracking”. International Journal of Informatics and Applied Mathematics, c. 2, sy. 2, 2019, ss. 15-27.
Vancouver Dey MA, Lokbanı AC, Hamou RM, Boudıa MA, Amıne A. State of the Art in Some Cloud Security Through Data Tracking. IJIAM. 2019;2(2):15-27.

International Journal of Informatics and Applied Mathematics