References
- Badger, L., Robert, B., Shilong, C., Mike, H., Fang, L., Viktor, K. & Jian , (2011). Useful information for cloud adopters. NIST Cloud Computing Program, 2(1), 1–73.
- Boeing, G. (2016). Visual analysis of nonlinear dynamical systems: Chaos, fractals, self-similarity and the limits of prediction. Systems, 4(4), 37. https://doi.org/https://doi.org/10.3390/systems4040037
- Buyya, R., Yeo, C., & Venugopal, S. (2008, September 25–27). Market oriented cloud computing vision, hype, and reality for delivering IT services as computing utilities [Paper presentation]. IEEE International Conference on High Performance Computing and Communications, Dalian, China.
- Buyya, R., Yeo, C., Venugopal, S., Broberg, J., & Brandic, I. (2009). Cloud computing and emerging IT platforms vision hype and reality for delivering computing as the 5th utility. Future Generation Computer Systems, 25(6), 599–616. https://doi.org/https://doi.org/10.1016/j.future.2008.12.001
- Chai, Z., Cao, Z., & Zhou, Y. (2005, November 2–5). Encryption based on reversible second order cellular automata [Paper presentation]. Springer Conference on Parallel and Distributed Processing and Applications, Nanjing, China.
- Czerniak, M., Zarzycki, H., Apiecionek, L., Palczewski, W., & Kardasz, P. (2018). A cellular automata-based simulation tool for real fire accident prevention. Mathematical Problems in Engineering, 2018, 1–12. https://doi.org/https://doi.org/10.1155/2018/3058241
- Kerckhoffs, A. (1883). La cryptographie militaire. Journal Des Sciences Militaires, 9, 161–191.
- Kumaresan, G., & Gopalan, N. P. (2017a). An analytical study of cellular automata and its applications in cryptography. International Journal of Computer Network and Information Security, 9(12), 45–54. https://doi.org/https://doi.org/10.5815/ijcnis.2017.12.06
- Kumaresan, G., & Gopalan, N. P. (2017b). Educloud: A dynamic three stage authentication framework to enhance security in public cloud. International Journal of Engineering and Manufacturing, 7(6), 12–26. https://doi.org/https://doi.org/10.5815/ijem.2017.06.02
- Kumaresan, G., & Gopalan, N. P. (2019). Programmable cellular automata based randomkey generation for one-time pad encryption usingunity attractors. Journal of Applied Security Research. Advance online publication. https://doi.org/https://doi.org/10.1080/19361610.2019.1652475
- Kumaresan, G., & Gopalan, N. P. (2020). An additive cellular automata based random key generation for one-time pad encryption using luhn method. Journal of Applied Security Research, 15(2), 255–269. https://doi.org/https://doi.org/10.1080/19361610.2019.1646553
- Kumaresan, G., Gopalan, N. P., & Vetriselvi, T. (2019). An efficient image block encryption for key generation using non-uniform cellular automata. International Journal of Computer Network and Information Security, 2, 28–35.
- Kumaresan, G., Veeraragavan, N., & Arockiam, L. (2015). A dynamic two stage authentication framework to enhance security in public educloud. International Journal of Applied Engineering Research, 10(82), 126–131.
- Liu, J., Au, M., Huang, X., Lu, R., & Li, J. (2016). Fine grained two factor access control for web based cloud computing services. IEEE Transactions on Information Forensics and Security, 11(3), 484–497. https://doi.org/https://doi.org/10.1109/TIFS.2015.2493983
- Liu, Y., Zhong, Q., Chang, L., Xia, Z., He, D., & Cheng, C. (2017). A secure data backup scheme using multi-factor authentication. Journal of Information Security, 11, 250–255.
- Mell, P., & Grance, T. (2009). The NIST definition of cloud computing version 15 technical report. Computer and Information Sciences, 53(6), 1–10.
- Michael, E. (2004). In defense of the realm: Understanding the threats to information security. International Journal of Information Management, 24(1), 43–57.
- Nagar, N., & Suman, U. (2014). Two factor authentication using M-pin server for secure cloud computing environment. International Journal of Cloud Applications and Computing, 4(4), 42–54.
- Ruj, S., Stojmenovic, M., & Nayak, A. (2014). Decentralized access control with anonymous authentication of data stored in clouds. IEEE Transactions on Parallel and Distributed Systems, 25(2), 384–394. https://doi.org/https://doi.org/10.1109/TPDS.2013.38
- Siddiqui, Z., Abdullah, A., Khan, M., & Alghamdi, S. (2014). Smart environment as a service: Three Factor cloud based user authentication for telecare medical information system. Journal of Medical Systems, 38(1), 9997. https://doi.org/https://doi.org/10.1007/s10916-013-9997-5
- Shannon, C. E. (1949). Communication theory of secrecy systems. Bell System Technical Journal, 28(4), 656–715. https://doi.org/https://doi.org/10.1002/j.1538-7305.1949.tb00928.x
- Song, S., Lee, J., Lee, K., & Jun, S. (2015). User authentication method design based on biometrics in a multi-cloud environment. Journal of Advances in Computer Science and Ubiquitous Computing, 373, 283–288.
- Stallings, W. (2011). Cryptography and network security: principles and practice. Prentice Hall.
- Subashini, S., & Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications, 34(1), 1–11. https://doi.org/https://doi.org/10.1016/j.jnca.2010.07.006
- Vaquero, L., Rodero-Merino, L., Caceres, J., & Lindner, M. (2008). A break in the clouds toward a cloud definition. ACM SIGCOMM Computer Communication Review, 39(1), 50–55. https://doi.org/https://doi.org/10.1145/1496091.1496100
- Viega, J. (2009). Cloud computing and common man. Computer Magazine, 42(7), 106–108. https://doi.org/https://doi.org/10.1109/MC.2009.252
- Wang, C., Wang, Q., & Ren, K. (2009, August 10). Ensuring data storage security in cloud computing [Paper presentation]. International Workshop on Quality of Service (IEEE), Piscataway, NJ.
- Wolfram, S. (2002). A new kind of science. Wolfram Media.
- Zhang, X., Zhang, H., & Xu, C. (2015, May 27–29). A reverse iteration encryption scheme using layered cellular automata [Paper presentation]. International Conference on Information and Communication Technologies, Bsali, Indonesia.
- Zissis, D., & Lekkas, D. (2012). Addressing cloud com-putting security issues. Future Generation Computer Systems, 28, 583–592.