References
[1]. R. Arokia Paul Rajan, S. shanmugapriyaa, “Evolution of cloud storage as cloud computing infrastructure service” Journal of Computer Engineering, Vol.1(1), pp.38-45, 2012.
[2]. Daniel J. Abadi, “Data management in the cloud: limitations and opportunities” IEEE Data Engineering bulletin, Vol.32, pp.3-12, 2009.
[3]. Santosh Kumar and R. H. Gouda, “ Cloud Computing – Research Issues, Challenges, Architecture, Platforms and Applications: A Survey” International Journal of Future Computer and Communication, Vol.1(4), pp.356-61, 2012.
[4]. Palvinder singh, Er. Anurag Jain, “Survey paper on cloud computing,” International Journal of innovations in Engineering and Technology (IJIET) Vol.3(4), pp.84-89, 2014.
[5]. Dimpi Rani, Rajiv Kumar Ranjan, “A comparative study of SaaS, PaaS and IaaS in cloud computing” International Journal of Advanced Research in Computer science and software Engineering Vol.4(6), pp.458-462, 2014.
[6]. Jie Ding, Leijie Sha, Xiao Chen, “Modeling and evaluating IaaS cloud using performance evaluation process Algebra” 22nd Asia-Pacific Conference in Communications (APCC), 2016.
[7]. Tarun Karnwal, T. Sivakumar, G. Aghila, “Cloud Services in Different Cloud Deployment Models: An Overview” International Journal of Computer Applications, Vol.34(8), pp.30-37, 2011.
[8]. Tejaswini, Jayanthy illuri V, Jagadesh Desaraju, Pratyosh, Adicharlasrujansimha, “A brief analysis on architecture and reliability of cloud based data storage,” international journal of information systems and Computer sciences, Vol.2(4), 2013.
[9]. Emanuel Ferreira continuo, Danielo Gonçalves Gomes, José Neuman de souza, “An Autonomic computing-based architecture for cloud computing” Symposium on elasticity network operations and management (lanoms), Oct 2015.
[10]. Tahira Mahboob, Maryam zahid, Gulnoor Ahmad, “Adopting information security techniques for cloud computing A Survey” International conference on information technology, information systems and Electrical Engineering (ICITISEE), 2016.
[11]. Swetha d, Thippeswamy k, “Dynamic collaboration of multi cloud an efficient use of cloud computing” International Journal of Computer applications, pp33-36, 2013.
[12]. Monjur Ahmed,Mohammad Ashraf Hussain, “Cloud computing and security issues in the cloud” International Journal of Network Security & its Applications (IJNSA), Vol.6(1), pp.25-37, 2014.
[13]. Yunchuan sun, Junsheng zhang, Yongping xiong, Guangyu zhu, “Data security and privacy in cloud computing” International Journal of distributed sensor networks Vol.2014, doi.org/10.1155/2014/190903.
[14]. Dinil mon divakaran, Mohan gurusamy, “Towards flexible guarantees in clouds: adaptive bandwidth allocation and pricing”, IEEE Transactions on parallel and distributed systems Vol.26(6), pp.1754 – 64, 2015.
[15]. Massimo villari, Antonio celesti, Francesco tusa, Antonio puliafito, “Data reliability in multi-provider cloud storage service with rns ” Advances in service-oriented and cloud computing Vol.393 Series communications in Computer and information science pp.83-93.
[16]. C.W. Hsu, C.W. Wang, Shiuhpyng Shieh, “Reliability and Security of Large Scale Data Storage in Cloud Computing” Annual Technical Reports supported in part by National Science Council, NCP, TWISC, ITRI, III, iCAST, Chungshan Institute of Science and Technology, Bureau of Investigation, and Chunghwa Telecomm 2010.
[17]. Geng yushui, Yuan jiaheng, “Cloud data migration method based on pso algorithm” 14th international Symposium on distributed computing and applications for business engineering and science (DCABES), 2015 .
[18]. Nirav Shah, Sandip Chauhan, “Survey Paper on Security Issues While Data Migration in Cloud Computing” International Journal of innovative research in Technology Vol.1(7), pp.134-137 ,2012.
[19]. Rashmi Rao, Pawan Prakash ,”Improving security for data migration in cloud computing using randomized encryption technique” Journal of Computer Engineering Vol.11(6), pp.39-42, 2013.
[20]. J. opara-martins, R sahandi and F. tian, “Critical review of vendor lock-in and its impact on adoption of cloud computing” International conference on information society London, pp.92-97, 2014.
[21]. Mostapha defraud, Amina mimouni,Mohsine eleuldj, “Vulnerabilities and storage security in cloud computing” International conference on cloud technologies and applications (CLOUDTECH), 2015.
[22]. Sarika u. kadlag, Rahul, Paikrao” Hybrid cryptosystem for secure text file for cloud” International Journal of advance research in Computer science and management studies Vol.2(2), pp.419-26, 2014.
[23]. Shelly, Dr Rajesh Kumar Bawa, “Secure Image Transmission for Cloud Storage System Using Hybrid Scheme” International Journal of Engineering Research and Development Vol.11(9), pp.18-26, 2015.
[24]. Pramod Kumar, Dinesh Goyal, “Performance analysis for audio streaming in cloud” IOSR Journal of Computer Engineering (IOSR-JCE) Vol.16(5), pp.98-104, 2014.
[25]. Xie Si lian ,Su Fu-hua, “Research of Video Data Store Based on Cloud Storage” Fifth International Conference on Measuring Technology and Mechatronics Automation (ICMTMA), 2013.
[26]. William S. and Stalling, “Cryptography and Network Security” 4th edition, Pearson Education India, ISBN: 978-81-7758-774-6, 2006.
[27]. Schneiner B., “Applied cryptography: protocols, Algorithms and source code in C” 2th edition, Wiley, 1996. ISBN: 978-1-119-09672-6.
[28]. Maxime Fernández, Gloria Diaz, Alberto Cosme, Irtalis Negrón, Priscilla Negrón, Alfredo, “Cryptography: Algorithms and security applications” The IEEE Computer Society’s Student, Vol.8(2), 2008.
[29]. Hellman, Martin E., “An overview of public key cryptography” IEEE Communications Magazine, Vol.40(5), pp.42-49, 2002.
[30]. W. Diffie, M.E. Hellman,”Multiuser cryptographic techniques” IEEE transaction, pp.109-112, 1976.
[31]. Coppersmith D., “The Data Encryption Standard (DES) and Its Strength Against Attacks” IBM Journal of Research and Development, Vol-38(3), pp.243-250, 1994.
[32]. Mushtaque M..A., Dhiman H., Hussain S. and Maheshwari S., “Evaluation of DES, TDES, AES, Blowfish and Two fish Encryption Algorithm Based on Space Complexity” International Journal of Engineering Research & Technology (IJERT), Vol.3(4), pp.36-42, 2014.
[33]. Schneier B., “Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish), Fast Software Encryption” Cambridge Security Workshop Proceedings, Lecture Notes in Computer Science, Vol.809, pp.191-204, 1993, Springer
[34]. Purnima Gehlot,S. R Biradar,S. R Biradar, “Implementation of Modified Twofish Algorithm using 128 and 192-bit keys on VHDL” International Journal of Computer Applications Vol.70(13), pp.37-42, 2013.
[35]. Douglas Selent, “Advanced encryption standard” insight: rivier academic journal, Vol.6(2), fall 2010.
[36]. M.Pitchaiah, Philemon Daniel, Praveen, “Implementation of Advanced Encryption Standard Algorithm” International Journal of Scientific & Engineering Research Vol.3(3), pp1-6, 2012.