On protecting data storage in mobile cloud computing paradigm
To enhance the security of mobile cloud storage, a few proposals have been presented already, where most of those focus on securing data through passwords and encryption-decryption of data through cryptographic tools and existing or rather new algorithms. However, these passwords and algorithms even...
| Main Authors: | Abdalla , Al-kindy Athman, Pathan, Al-Sakib Khan |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Medknow publication
2014
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/36700/ http://irep.iium.edu.my/36700/1/Published_IETE_AthmanSakib.pdf |
Similar Items
Editorial: when the cloud computing becomes mobile!
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
Building customer trust in cloud computing model
by: Pathan, Al-Sakib Khan
Published: (2015)
by: Pathan, Al-Sakib Khan
Published: (2015)
International center for monitoring cloud computing providers (ICMCCP) for ensuring trusted clouds
by: Mohammed, Mohssen M. Z. E., et al.
Published: (2014)
by: Mohammed, Mohssen M. Z. E., et al.
Published: (2014)
Fi-Wi Network for future cloud
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
IDPS: an integrated intrusion handling model for cloud computing environment
by: Alsafi, Hassen Mohammed, et al.
Published: (2012)
by: Alsafi, Hassen Mohammed, et al.
Published: (2012)
Building customer trust in cloud computing with an ICT-enabled global regulatory body
by: Pathan, Al-Sakib Khan, et al.
Published: (2015)
by: Pathan, Al-Sakib Khan, et al.
Published: (2015)
A walk through SQL injection: vulnerabilities, attacks, and countermeasures in current and future networks
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
Lethality of SQL injection against current and future Internet-technologies
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
A detailed survey on various aspects of SQL injection in web applications: vulnerabilities, innovative attacks and remedies
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
A detailed survey on various aspects of SQL Injection: vulnerabilities, innovative attacks, and remedies
by: Diallo , Abdoulaye Kindy, et al.
Published: (2011)
by: Diallo , Abdoulaye Kindy, et al.
Published: (2011)
Analyzing trust and security in computing and communications systems
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
Computer science and IT today: research issues and publication tips
by: Pathan, Al-Sakib Khan
Published: (2014)
by: Pathan, Al-Sakib Khan
Published: (2014)
A new efficient checkpointing algorithm for distributed mobile computing
by: Mansouri, Houssem, et al.
Published: (2015)
by: Mansouri, Houssem, et al.
Published: (2015)
Editorial article: on the boundaries of trust and security in computing and communications systems
by: Pathan, Al-Sakib Khan
Published: (2014)
by: Pathan, Al-Sakib Khan
Published: (2014)
Dynamic remote data auditing for securing big data storage in cloud computing / Mehdi Sookhak
by: Sookhak, Mehdi
Published: (2015)
by: Sookhak, Mehdi
Published: (2015)
Where is the intelligence in computational intelligence?
by: Pathan, Al-Sakib Khan
Published: (2005)
by: Pathan, Al-Sakib Khan
Published: (2005)
Emerging sensor-cloud technology for pervasive services and applications
by: Hassan, Mohammad Mehedi, et al.
Published: (2014)
by: Hassan, Mohammad Mehedi, et al.
Published: (2014)
Towards privacy protection in smart grid
by: Zeadally, Sherali, et al.
Published: (2012)
by: Zeadally, Sherali, et al.
Published: (2012)
On the key factors of usability in small-sized mobile touch-screen application
by: Gündüz, Feyza, et al.
Published: (2013)
by: Gündüz, Feyza, et al.
Published: (2013)
Brute force password search using multithreading and grid computing
by: Pathan, Al-Sakib Khan, et al.
Published: (2011)
by: Pathan, Al-Sakib Khan, et al.
Published: (2011)
Usability improvements for touch-screen mobile flight booking application: a case study
by: Gündüz, Feyza, et al.
Published: (2012)
by: Gündüz, Feyza, et al.
Published: (2012)
Mobile Cloud Computing Solution for Visualization of Road Roughness
by: Lam, Chen Riang
Published: (2017)
by: Lam, Chen Riang
Published: (2017)
A Study in Data Security in Cloud Computing
by: Mazlina, Abdul Majid, et al.
Published: (2014)
by: Mazlina, Abdul Majid, et al.
Published: (2014)
Dynamic reciprocal authentication protocol for mobile cloud computing
by: Ahmed, Abdulghani Ali, et al.
Published: (2021)
by: Ahmed, Abdulghani Ali, et al.
Published: (2021)
Cloud Computing: Locally Sub-Clouds instead of Globally One Cloud
by: Khan, Nawsher, et al.
Published: (2012)
by: Khan, Nawsher, et al.
Published: (2012)
Fault Tolerance Impact on Near Field Communication for Data Storage of Mobile Commerce Technology in Cloud Computing
by: Noraziah, Ahmad, et al.
Published: (2015)
by: Noraziah, Ahmad, et al.
Published: (2015)
Test case selection for penetration testing in mobile cloud computing applications: A proposed technique
by: Al-Ahmad, Ahmad Salah, et al.
Published: (2018)
by: Al-Ahmad, Ahmad Salah, et al.
Published: (2018)
Protection of integrity and ownership of pdf documents using invisible signature
by: Taha, Imad, et al.
Published: (2012)
by: Taha, Imad, et al.
Published: (2012)
Process state synchronization for mobility support in mobile cloud computing / Ejaz Ahmed
by: Ejaz, Ahmed
Published: (2016)
by: Ejaz, Ahmed
Published: (2016)
Security Scheme for Protecting Cloud Computing Services Against Bursty DDoS Attacks
by: Mazlina, Abdul Majid, et al.
Published: (2015)
by: Mazlina, Abdul Majid, et al.
Published: (2015)
SECRET: a secure and efficient certificate revocation scheme for mobile ad hoc networks
by: Mall, Dieynaba, et al.
Published: (2014)
by: Mall, Dieynaba, et al.
Published: (2014)
Big data storage, collection, & protection with Islamic perspective
by: Ibrahim Ahmed, Ibrahim Nasreldin, et al.
Published: (2014)
by: Ibrahim Ahmed, Ibrahim Nasreldin, et al.
Published: (2014)
Two objectives big data task scheduling using swarm intelligence in cloud computing
by: Diallo, Laouratou, et al.
Published: (2016)
by: Diallo, Laouratou, et al.
Published: (2016)
A lightweight heterogeneous hybrid mobile cloud computing framework for compute-intensive mobile applications / Zohreh Sanaei Moghaddam
by: Moghaddam, Zohreh Sanaei
Published: (2014)
by: Moghaddam, Zohreh Sanaei
Published: (2014)
Network and traffic engineering in emerging distributed computing applications
by: Abawajy, Jemal H., et al.
Published: (2013)
by: Abawajy, Jemal H., et al.
Published: (2013)
Basics of security and cryptography
by: Pathan, Al-Sakib Khan
Published: (2014)
by: Pathan, Al-Sakib Khan
Published: (2014)
Wireless sensor network security: Current status and future trends
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
Wireless network security: 3G, 4G, wireless PAN/LAN/MAN
by: Pathan, Al-Sakib Khan
Published: (2012)
by: Pathan, Al-Sakib Khan
Published: (2012)
Internet and distributed computing advancements : theoretical frameworks and practical applications
by: Abawajy, Jemal, et al.
Published: (2012)
by: Abawajy, Jemal, et al.
Published: (2012)
A lightweight framework for intensive mobile application processing in mobile cloud computing / Muhammad Shiraz
by: Muhammad , Shiraz
Published: (2013)
by: Muhammad , Shiraz
Published: (2013)
Similar Items
-
Editorial: when the cloud computing becomes mobile!
by: Pathan, Al-Sakib Khan
Published: (2013) -
Building customer trust in cloud computing model
by: Pathan, Al-Sakib Khan
Published: (2015) -
International center for monitoring cloud computing providers (ICMCCP) for ensuring trusted clouds
by: Mohammed, Mohssen M. Z. E., et al.
Published: (2014) -
Fi-Wi Network for future cloud
by: Pathan, Al-Sakib Khan
Published: (2013) -
IDPS: an integrated intrusion handling model for cloud computing environment
by: Alsafi, Hassen Mohammed, et al.
Published: (2012)