Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2013, Article ID 871430, 6 pages
http://dx.doi.org/10.1155/2013/871430
Research Article

A Novel Cloud Computing Algorithm of Security and Privacy

1Department of Information Management, St. John’s University, 499 Section 4, Tam King Road, Tamsui District, New Taipei City 25135, Taiwan
2Department of Electronic Engineering, St. John’s University, 499 Section 4, Tam King Road, Tamsui District, New Taipei City 25135, Taiwan

Received 12 September 2013; Accepted 12 October 2013

Academic Editor: Teen-Hang Meen

Copyright © 2013 Chih-Yung Chen and Jih-Fu Tu. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Citations to this Article [11 citations]

The following is the list of published articles that have cited the current article.

  • Akshita Bhandari, Ashutosh Gupta, and Debasis Das, “A framework for data security and storage in Cloud Computing,” 2016 International Conference on Computational Techniques in Information and Communication Technologies (ICCTICT), pp. 1–7, . View at Publisher · View at Google Scholar
  • Akshita Bhandari, Ashutosh Gupta, and Debasis Das, “Secure algorithm for cloud computing and its applications,” 2016 6th International Conference - Cloud System and Big Data Engineering (Confluence), pp. 188–192, . View at Publisher · View at Google Scholar
  • Muhammad Yaasir Khodabacchus, Krishnaraj Madhavjee Sunjiv Soyjaudah, and Gianeswar Ramsawok, “Risk score calculation for cloud biometric authentication,” 2016 IEEE International Conference on Emerging Technologies and Innovative Business Practices for the Transformation of Societies (EmergiTech), pp. 167–170, . View at Publisher · View at Google Scholar
  • SeongMin Yoo, Jinsul Kim, JaeHyung Park, Jiseung Nam, and JaeCheol Ryou, “Ownership-guaranteed security framework for the private data in the entrusted management environment,” Cluster Computing, 2015. View at Publisher · View at Google Scholar
  • G. R. Vijay, and A. Rama Mohan Reddy, “RAICB: Robust Authentication Immunity Cloud Bucket for Secure Cloud Storage System,” Emerging Research in Computing, Information, Communication and Applications, pp. 377–394, 2015. View at Publisher · View at Google Scholar
  • Torki Altameem, “Enhancing cloud based information system security using the role and identity based access control with fully homomorphic encryption,” Journal of Medical Imaging and Health Informatics, vol. 6, no. 6, pp. 1445–1450, 2016. View at Publisher · View at Google Scholar
  • Nazar K. Khorsheed, Taher Tawfeek Hamza, Mgdi Z. Rashad, and Mohammad A. El-Dosuky, “Management of data security based on data cost evaluation,” Journal of Computational and Theoretical Nanoscience, vol. 14, no. 10, pp. 4964–4969, 2017. View at Publisher · View at Google Scholar
  • Kirit J. Modi, and Nirali Kapadia, “Securing Healthcare Information over Cloud Using Hybrid Approach,” Progress in Advanced Computing and Intelligent Engineering, vol. 714, pp. 63–74, 2018. View at Publisher · View at Google Scholar
  • Hussain Al-Aqrabi, and Richard Hill, “A scalable model for secure multiparty authentication,” Proceedings - 2018 IEEE SmartWorld, Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People and Smart City Innovations, SmartWorld/UIC/ATC/ScalCom/CBDCom/IoP/SCI 2018, pp. 17–22, 2018. View at Publisher · View at Google Scholar
  • Yang Liu, Moses Esangbedo, and Sijun Bai, “Adaptability of Inter-Organizational Information Systems Based on Organizational Identity: Some Factors of Partnership for the Goals,” Sustainability, vol. 11, no. 5, pp. 1436, 2019. View at Publisher · View at Google Scholar
  • Hussain Al-Aqrabi, and Richard Hill, “Dynamic Multiparty Authentication of Data Analytics Services Within Cloud Environments,” Proceedings - 20th International Conference on High Performance Computing and Communications, 16th International Conference on Smart City and 4th International Conference on Data Science and Systems, HPCC/SmartCity/DSS 2018, pp. 742–749, 2019. View at Publisher · View at Google Scholar