2011 3rd International Conference on Computer Research and Development 2011
DOI: 10.1109/iccrd.2011.5764279
|View full text |Cite
|
Sign up to set email alerts
|

3 dimensional security in cloud computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 32 publications
(17 citation statements)
references
References 3 publications
0
16
0
Order By: Relevance
“…The symmetric searchable encryption (SSE) and asymmetric searchable encryption (ASE) are used in the scheme to encrypt data searching, but this techniques increase complexity and make the system slow. In 2011, Prasad et al discussed different security aspects in cloud computing [9], this technique provides a way to authenticate in a 3-dimensional approach. In this scheme, the data classification is done by a client before storing the data.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The symmetric searchable encryption (SSE) and asymmetric searchable encryption (ASE) are used in the scheme to encrypt data searching, but this techniques increase complexity and make the system slow. In 2011, Prasad et al discussed different security aspects in cloud computing [9], this technique provides a way to authenticate in a 3-dimensional approach. In this scheme, the data classification is done by a client before storing the data.…”
Section: Related Workmentioning
confidence: 99%
“…In this section, a comparison between the algorithms Wang's scheme (2009) [7], Prased's scheme (2011) [9], Sandeep K. Sood (2012) [10], P. Lavanya's scheme (2014) [11] and Xin Dong's scheme (2014) [12] is described. We analyze these five algorithms focusing on the security factors defined in sec.2.…”
Section: Comparison (Models Evaluation)mentioning
confidence: 99%
“…Sood (2012) summarizes the common data security techniques available in cloud computing and proposed a new data security design and analysed its performance. Prasad et al (2011) provided a three-dimensional authentication technique where availability of data is provided by overcoming problems such as denial of service and data leakage. The proposed technique does not require encryption.…”
Section: Data Securitymentioning
confidence: 99%
“…A three-dimensional approach to securing data in cloud is presented in [33], wherein data is categorized on the basis of a priority rating, which incorporates confidentiality, integrity, and availability. Sood [34] extends this system by adding data protection via the 128-bit SSL encryption and strengthening the authentication mechanism.…”
Section: Security-as-a-service Solutions For Cloud Databasesmentioning
confidence: 99%