Book Details

AN ANALYTICAL STUDY ON SECURITY ALGORITHMS USED IN CLOUD COMPUTING

Sri Vasavi College, Erode Self-Finance Wing, 3rd February 2017. National Conference on Computer and Communication, NCCC’17. International Journal of Computer Science (IJCS) Published by SK Research Group of Companies (SKRGC)

Download this PDF format

Abstract

Cloud Computing is a new technology in providing web oriented services. No secret that cloud computing is becoming more and more popular and is ever increasing due to fast growth in the field of “cloud computing “ increases serious security concerns in the large companies as they share valuable resources in a cost effective way. Due to increasing demand for more clouds there is a security threat, these security threats can be a danger to cloud computing and they have to be avoided. Since Cloud computing stores the data and disseminated resources in the open environment, security has become the major issue which is hampering the deployment of Cloud environments. Even though Cloud Computing is promising and efficient; there are many challenges in data security for the Cloud user.

References

[1] Sunita Rani and Ambrish Gangal “Security issues of banking adopting the application of cloud computing" International Journal of Information Technology and Knowledge Management July- December 2012, Volume 5, No. 2, pp. 243-246.

[2] Daniel Benton and Walid Negm, “Banking on cloud”, 2010.

[3] Ram govind S, Eloff MM, Smith E ,”The Management of Security in Cloud Computing”, School of Computing, University of South Africa, Pretoria, South Africa ©2010 IEEE.

[4] Alok Tripathi, Abhinav Mishra,” Cloud Computing Security Considerations”, IT Division, DOEACC Society, Gorakhpur Centre Gorakhpur, India, 2010, IEEE.

[5] Cong Wang, Qian Wang, and Kui Ren,” Towards Secure and Effective Utilization over Encrypted Cloud Data”, 2011 31st International Conference on Distributed Computing Systems Workshops, 2011 IEEE.

[6] “3DES”, https://www.cryptosys.net/3des.html

Keywords

Cloud Computing, Data Security, RSA algorithm, 3DES, Encryption, and Decryption.

Image
  • Format Volume 5, Issue 1, No 12, 2017
  • Copyright All Rights Reserved ©2017
  • Year of Publication 2017
  • Author R.Abinaya, Dr.T.Ramaprabha
  • Reference IJCS-213
  • Page No 1329-1334

Copyright 2024 SK Research Group of Companies. All Rights Reserved.