首页    期刊浏览 2025年02月21日 星期五
登录注册

文章基本信息

  • 标题:Cryptographic Techniques, Threats and Privacy Challenges in Cloud Computing
  • 本地全文:下载
  • 作者:Jissy Ann George ; Dr.M.Hemalatha
  • 期刊名称:International Journal of Computer Science and Information Technologies
  • 电子版ISSN:0975-9646
  • 出版年度:2015
  • 卷号:6
  • 期号:2
  • 页码:1080-1083
  • 出版社:TechScience Publications
  • 摘要:Cryptography is essential for the security and integrity of the data that is stored in the cloud. Several cryptographic techniques are used to protect the integrity of data for various applications. A particular security method makes use of different cryptographic techniques to encrypt data and make it into an un-readable form, which can then be decrypted only with the help of a key. A number of cryptographic techniques are available for use in protection of data in various applications. Cryptographic techniques are essential for the confidentiality of the data saved. Cloud computing is used to share resource as service, software as service, infrastructure as service, platform as service to the clients. The use of cryptography in the cloud will enable the security of the data being shared. Confidentiality and integrity of data in data security are essential in the cloud. This paper presents an overview of the cryptographic techniques, security and privacy challenges related to public cloud computing.
  • 关键词:Cloud computing; cryptographic techniques;domains; encryption; security issues; threats
国家哲学社会科学文献中心版权所有