Cloud Security Algorithms

被引:0
作者
Pansotra, Ashima [1 ]
Singh, Simar Preet [1 ]
机构
[1] DAV Univ, Jalandhar, India
来源
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS | 2015年 / 9卷 / 10期
关键词
Cloud computing; Cryptography; Encryption; Decryption; Cipher Text; DES; TDES; AES; RSA; Homomorphic; IDEA; Blowfish;
D O I
10.14257/ijsia.2015.9.10.32
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing appear to be a very popular and interesting computing technology. Every third person is using cloud computing directly or indirectly for example e-mail, most commonly used application of cloud computing, you can access your mail anywhere anytime. Your e-mail account is not visible on your personal computer but you have to access that with the help of internet. Like e-mail cloud computing provide many other services such as storage of any kind of data, access to different applications, resources etc. So users can easily access and store data with low cost and without worrying about how these services are provided to user. Due to this flexibility everyone is transferring data to cloud. To store data on cloud user has to send their data to the third party who will manage and store data. So it is very important for the company to secure that data. Data is said to be secured if confidentiality, availability, integrity is present. To secure data we have different algorithms. In this paper we will discuss the different cryptography of algorithms.
引用
收藏
页码:353 / 360
页数:8
相关论文
共 15 条
  • [1] Basu S., 2011, J GLOBAL RES COMPUTE, V2
  • [2] Devi G., 2012, INT J COMPUTER TREND, V3, P592
  • [3] Huth Alexa, 2011, BASICS CLOUD COMPUTI, P1
  • [4] Ivy B. Persis Urbana, 2012, INT J ENG COMPUTER S, V1
  • [5] Jain N., 2012, VSRD IJCSIT, V2, P316
  • [6] Jain Rachna, 2014, INT J ADV RES COMPUT, V4
  • [7] Khan SS, 2015, INT J INNOVATIVE RES, V3
  • [8] Mahalanobis Ayan, 2005, DIFFIE HELLMAN KEY E
  • [9] Mandal P.C., 2012, INT J ADV RES COMPUT, V2
  • [10] Marwaha Mohit, 2013, INT J ADV ENG TE JUL