Author:
Swain Srutipragyan,Pattnaik Prasant Kumar,Dash Banchhanidhi
Publisher
Springer Nature Singapore
Reference28 articles.
1. Knorr E, Gruman G (2008) What cloud computing really means. InfoWorld 7(20–20):1–17
2. Le DN, Pal S, Pattnaik PK (2022) Auditing concept in cloud computing. In: Cloud computing solutions: architecture, data storage, implementation and security, pp 165–180
3. Ali M, Miraz MH (2013) Cloud computing applications. In Proceedings of the International Conference on Cloud Computing and eGovernance, vol 1
4. Zhang X, Liu C, Nepal S, Pandey S, Chen J (2012) A privacy leakage upper bound constraint-based approach for cost-effective privacy preserving of intermediate data sets in cloud. IEEE Trans Parallel Distrib Syst 24(6):1192–1202
5. Lin HY, Tzeng WG (2011) A secure erasure code-based cloud storage system with secure data forwarding. IEEE Trans Parallel Distrib Syst 23(6):995–1003