Prasad, "Security issues and security algorithms in cloud computing," Int. J. Adv. Res. Comput. Sci. Softw. Eng., vol. 2, no. 10, pp. 110-114, Oct. 2012.K.S.Suresh,Prof K.V.Prasad," Security Issues and Security
Moreover, they studied cryptographic algorithms mainly used in cloud computing: modern cryptography, searchable encryption, homomorphic encryption, and attribute-based encryption (e.g. DES, 3DES, AES, RC6, and BLOWFISH), as a fusion of two or more cryptographic techniques, they have also created ...
An Overview of Data Security Algorithms in Cloud Computing Chapter © 2024 DNA cryptography based security framework for health-cloud data Article 23 December 2024 Data Security in a Cloud Environment Using Cryptographic Mechanisms Chapter © 2023 References Smith, T.F., Waterman, M.S.:...
Usually, encryption schemes consist of algorithms that are computationally difficult or impossible to break, along with encryption and decryption management processes and procedures, hashing, digital signatures, generation and renewal of certificates, and key exchange. ...
However, preview framework security is always a concern due to some security constraints and problems with cloud computing. The security is provided to the information which is stored on the cloud by using cryptography algorithms. There are extensive security frameworks for cloud computing that uses ...
speed with each other, it used symmetric, homomorphic encryption algorithms, with the MORE approach; The method introduced in this article examined information when sending from the source, during the exchange, calculation of big data and storage, with the speed and security in the private cloud....
include Algorithms for Cloud Computing, Big Data and Wireless Communication. In 2017, he was awarded by the conference committee of 19th IEEE Conference on Business Informatics (CBI) for Doctoral Student Work titled “Algorithms for Big Data in Advanced Communication Systems and Cloud Computing”. ...
Enhancements are made on traditional cryptography algorithms so that they are more suited to the distributed, virtual and multi-tenant environment of the cloud. Block-chaining is the newest technique in the fields of computing. It is basically a growing list of records, called as "blocks", ...
Performance analysis of various encryption algorithms for usage in multistage encryption for securing data in cloud 2017, RTEICT 2017 - 2nd IEEE International Conference on Recent Trends in Electronics, Information and Communication Technology, Proceedings View all citing articles on Scopus ☆ Peer-review...
Supporting security of stored data is one of the difficulties and issues discussed in cloud computing field. Our goal is to understand present challenges and solutions in cloud based environment; furthermore, we investigate present algorithms, in terms of application`s speed both in cloud based ...