DOI:10.20894/IJCOA. Periodicity: Bi Annual. Impact Factor: SJIF:5.079 & GIF:0.416 Submission:Any Time Publisher: IIR Groups Language: English Review Process: Double Blinded
Shinde, G. N., and H. S. Fadewar, "Faster RSA Algorithm for Decryption Using Chinese Remainder Theorem", ICCES: International Conference on Computational & ,Vol.5 ,Issue 4 ,2008 View Artical
Kaufman, Lori M., "Data security in the world of cloud computing", Security & Privacy, IEEE ,Vol.7 ,Issue 4 ,2009 View Artical
Sravan Kumar, R. and AshutoshSaxena, "Data integrity proofs in cloud storage", Communication Systems and Networks ,2011 View Artical
Catteddu, Daniele, and Giles Hogben, "Cloud computing risk assessment.European Network and Information Security Agency (ENISA) (2009).Zis", IEEE ,Vol.3 ,2012 View Artical
Popovic, Kresimir, and ZeljkoHocenski., "Cloud computing security issues and challenges", IEEE ,2010 View Artical
Desale, Mrs Vrushali R., and Pradeep K. Deshmukh., "Multi Client Support Third Party Auditor (TPA) for Cloud Data Integrity and Security.", International Journal ,Vol.3 ,Issue 6 ,2013 View Artical
?M. Young, The Technical Writer's Handbook. Mill Valley, , "Cloud computing security: The scientific challenge, and a survey of solutions", University Science View Artical
Kalpana, Parsi, and SudhaSingaraju, "Data Security in Cloud Computing using RSA Algorithm", IJRCCT ,Vol.1 ,Issue 4 ,2012 View Artical
Luo, Wenjun, and GuojingBai., "Ensuring the data integrity in cloud data storage", IEEE ,2011 View Artical
Wang, Qian, et , "Enabling public auditability and data dynamics for storage security in cloud computing.", IEEE ,Vol.22 ,Issue 5 ,2011 View Artical
Shinde, G. N., and H. S. Fadewar, "Faster RSA Algorithm for Decryption Using Chinese Remainder Theorem.", ICCES: International Conference on Computational & ,Vol.5 ,Issue 4 ,2008 View Artical
Erway, Chris,, "Dynamic provable data possession", Proceedings of the 16th ACM conference on Compute ,2009 View Artical
Hao, Zhuo, Sheng Zhong, and Nenghai Yu, "A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiabi", IEEE ,Vol.23 ,Issue 9 ,2011 View Artical
Neha, T., and P. S. Murthy, "A Novel Approach to Data Integrity Proofs in Cloud Storage", International Journal ,Vol.2 ,Issue 10 ,2012 View Artical
Zissis, Dimitrios, and DimitriosLekkas., "Addressing cloud computing security issues.", Future Generation Computer Systems ,Vol.28 ,Issue 3 ,2012 View Artical
Buyya R, Yeo CS, Venugopal S, Broberg J, Brandic I, " Cloud computing and emerging IT platforms: Vision", Future Generation Computer Systems ,Vol.25 ,2009 View Artical