首页    期刊浏览 2024年11月08日 星期五
登录注册

文章基本信息

  • 标题:Cloud Security Algorithms
  • 本地全文:下载
  • 作者:Er. Ashima Pansotra ; Er. Simar Preet Singh
  • 期刊名称:International Journal of Security and Its Applications
  • 印刷版ISSN:1738-9976
  • 出版年度:2015
  • 卷号:9
  • 期号:10
  • 页码:353-360
  • DOI:10.14257/ijsia.2015.9.10.32
  • 出版社:SERSC
  • 摘要:Cloud computing appear to be a very popular and interesting computing technology. Every third person is using cloud computing directly or indirectly for example e-mail, most commonly used application of cloud computing, you can access your mail anywhere anytime. Your e-mail account is not visible on your personal computer but you have to access that with the help of internet. Like e-mail cloud computing provide many other services such as storage of any kind of data, access to different applications, resources etc. So users can easily access and store data with low cost and without worrying about how these services are provided to user. Due to this flexibility everyone is transferring data to cloud. To store data on cloud user has to send their data to the third party who will manage and store data. So it is very important for the company to secure that data. Data is said to be secured if confidentiality, availability, integrity is present. To secure data we have different algorithms. In this paper we will discuss the different cryptography of algorithms.
  • 关键词:Cloud computing; Cryptography; Encryption; Decryption; Cipher Text; ; DES; TDES; AES; RSA; Homomorphic; IDEA; Blowfish
国家哲学社会科学文献中心版权所有