Deploying Application in Cloud Environment with Multi Level Authentication and Disaster Recovery
Abstract
Keywords
Full Text:
PDFReferences
ARMBRUST M, FOX A, GRIFFITH R, et al. “Above the Clouds: A Berkeley View of Cloud Computing” [R]. Berkeley, CA,USA: University of California, 2009.
Bao Zhang, Changgen Peng, Zhipin Xu,"Identity-based distributed cloud storage encryption scheme" Guizhou University.2011, pp 610-614.
D. Boneh, M. Franklin. “Identity-based Encryption from The Weil Pairing”. In Advances in Cryptology-Crypto 2001. Berlin: Springer-Berlag,2001.213-219.
Craig Gentry. “A Fully Homomorphic Encryption Scheme”. PhDthesis,Stanford University, 2009. http://crypto.stanford.edu/craig.
Dai Yuanshun. “The Brief Review of Cloud Computing Technologies”.Information and Communications Technologies. 2010.2,pp 29-35.
Y. Desmedt, Y. Frankel. “Threshold cryptosystems”. Proc.of CRYPTO'89, California USA,1990:307- 315 .
Hongwei Li, Yuanshun Dai1, Bo Yang “Identity-Based Cryptography for Cloud Security” University of Tennessee, Knoxville, USA. Pp 1 -9.
Marten Van Dijk, Ari Juels. ”On The Impossibility of Cryptography Alone for Privacy-preserving Cloud Computing”. 21 May 2010. http://eprint.iacr.org/201 0/305.
QU Ming-cheng, WU Xiang-hu,; LIAO Ming-hong, et al. “A Disaster-Tolerant Storage Model and a Low Data Failure Model for Data Grid”. Acta Electronica Sinica. 2010.38(2),pp 315-320.
A. Shamir. “Identity-based Cryptosystems and Signature Schemes”. In Advances in Cryptology-Crypto1984. Berlin: Springer-Verlag, 1984. pp47-53.
Yongfeng Huang, Jiuling Zhang, Xing Li. ”Encrypted Storage and Its Retrieval in Coud Sorage Aplications”. ZTECOMMUNICATIONS.2010,16 (4): 33-35.
ZHOU Ke, WANG Hua, and LI Chunhua. “Cloud Storage Technology and Its Application”, ZTE Communications, 2010.16(4),pp 24-27.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.