Literature Survey

Sr. NO.Paper NameAuthors/YearApproachesLimitations
1.Implementing Digital Signature with RSA Encryption Algorithm to Enhance the Data Security of Cloud in Cloud ComputingUmaSomani,Kanika Lakhani, Manish Mundra2010 IEEE 1st International Conferencetechnique solves the dual problem of authentication and security
2.Security Architecture for Cloud NetworkingVolker Fusenig and Ayush Sharma 2012 IEEE International ConferenceThis paper presents a security architecture that enables a user of cloud networking to define security requirements and enforce them in the cloud networking infrastructure.
3.Data Security and Privacy Protection Issues in Cloud ComputingDeyan Chen and Hong Zhao 2012 IEEEprevent privacy leakage without authorization in Map-Reduce computing process.
4.Research on Cloud Computing Data Security Model Based on MultidimensionZhang Xin , Lai Song-qing and Liu Nai-wen 2012 IEEEinvestigates the basic problem of cloud computing data security.
5.ecurity Threats in Cloud ComputingFarhan Bashir Shaikh and Sajjad Haider 2011 IEEETo prevent different types of attacks

Motivation

Objectives and Goals