Author:
Anand Yash,Sirmour Bhargavi,Zaman Sk Mahafuz,Markandey Brijesh kumar,Kumar Anurag,Maity Soumyadev
Publisher
Springer Nature Singapore
Reference19 articles.
1. J. Agarkhed, R. Ashalatha, An efficient auditing scheme for data storage security in cloud (2017)
2. W. Aiken, S. Rizvi, Cloud Security Auditing: Challenges and Emerging Approaches (2015). https://www.infoq.com/articles/cloud-security-auditing-challenges-and-emerging-approaches/
3. T.K. Babu, C. Guruprakash, A systematic review of the third party auditing in cloud security: security analysis, computation overhead and performance evaluation, in 2019 3rd International Conference on Computing Methodologies and Communication (ICCMC). IEEE (2019), pp. 86–91
4. N. Bhalaji, Reliable data transmission with heightened confidentiality and integrity in IoT empowered mobile networks. J. ISMAC 2(02), 106–117 (2020)
5. K. Bhushan, et al., Ddos attack mitigation and resource provisioning in cloud using fog computing, in 2017 International Conference on Smart Technologies for Smart Nation (SmartTechCon). IEEE (2017), pp. 308–313