CLOUD COMPUTING: WHAT IT IS AND WHERE TO START
1
Author(s):
MISA STEPHAN
Vol - 4, Issue- 1 ,
Page(s) : 64 - 68
(2013 )
DOI : https://doi.org/10.32804/CASIRJ
Abstract
You know how traditional desktop computing works. The software programs you use are stored on each computer you own. The documents you create are stored on the computer on which they were created. And, although documents can be accessed from other computers on a network, they can't be accessed by computers outside the network.
- Ward, J, O’Sulllivan, M., Shahoumian, T., and Wilkes, J. 2002. “Appia: Aut omatic storage area net work fabric design. In P roceedings of the Conference on File and St orage Technologies” (FAST 2002) . T he USENIX Associat ion, Mont erey, CA.
- Hakan Hacigümüs, Bijit Hore, Balakrishna R. Iyer, Sharad Mehrotra: Search on Encrypted Data. Secure Dat a Management in Decent ralized Syst ems 2007:383 -425
- G. Aggarwal, M. Bawa, P . Ganesan, H. Garcia-Molina, K. Kenthap adi, R. Motwani, U. Srivastava, D. Thomas, and Y. Xu. T wo can keep a secret: a dist ributed architecture for secure database services. In P roc. of the Second Biennial Conference on Innovat ive Dat a Syst ems Research (CIDR 2005), Asilomar, CA, USA, January 200 5.
- Valent ina Ciriani, Sabrina De Capit ani di Vimercati, Sara Forest i, Sushil Jajodia, St efano P araboschi, Pierangela Samarat i: Keep a Few: Out sourcing Dat a While Maint aining Confident ialit y. ESORICS 2009:440 -455
- Valent ina Ciriani, Sabrina De Capit ani di Vimercati, Sara Forest i, Sushil Jajodia, St efano P araboschi, Pierangela Samarat i: Combining fragmentation and encryption t o protect privacy in dat a st orage. ACM T rans. Inf. Syst . Secur. (T ISSEC) 13(3) (2010)
|