A Review on Cryptography in Cloud Computing

Author:

Bhargav A. Jsv Sai1,Manhar Advin2

Affiliation:

1. Research Scholar, Amity University Chhattisgarh, Raipur, Chhattisgarh, India

2. Assistant Professor, Amity University Chhattisgarh, Raipur, Chhattisgarh, India

Abstract

Cloud computing is the delivery of computing services over the web instead of keeping files on a proprietary disk drive or local memory device. Computing services can include servers, storage, databases, networking, software. The main reason and great advantage for using the cloud are that the user can store and access the stored data in the cloud from anywhere anytime and getting all its services for a low cost. Despite, Security has always been a big concern with cloud computing because the information stored in the cloud is not directly maintained by the customer. When the user uploaded or stored data during a cloud computing service, the info owners are unlikely to understand the path via which their data is being transmitted. The user is unknown to the fact whether the information is being collected, analyzed, and accessed by a third party or not. To overcome the security issues various cryptography algorithm is proposed. This paper focused on the basics of cloud computing and discussed various cryptography algorithms present in the existing work.

Publisher

Technoscience Academy

Subject

General Medicine

Reference15 articles.

1. M. A. Vouk, “Cloud computing - Issues, research and implementations,” Proc. Int. Conf. Inf. Technol. Interfaces, ITI, pp. 31–40, 2008.

2. P. S. Wooley, “Identifying Cloud Computing Security Risks,” Contin. Educ., vol. 1277, no. February, 2011.

3. S. Subashini and V. Kavitha, “A survey on security issues in service delivery models of cloud computing,” J. Netw. Comput. Appl., vol. 34, no. 1, pp. 1–11, Jan. 2011.

4. Cloud Performance Evaluation: Hybrid Load Balancing Model Based on Modified Particle Swarm Optimization and Improved Metaheuristic Firefly AlgorithmsJune 2020International Journal of Advanced Science and Technology 29(5):12315-12331, Advin Manhar.

5. C. Modi, D. Patel, B. Borisaniya, A. Patel, and M. Rajarajan, “A survey on security issues and solutions at different layers of Cloud computing,” J. Supercomput., vol. 63, no. 2, pp. 561–592, 2013.

Cited by 9 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Encryption in the Cloud: Analysing Deep into the Layers of Security;2024 International Conference on Expert Clouds and Applications (ICOECA);2024-04-18

2. Security Implications of Edge Computing in Cloud Networks;Journal of Computer and Communications;2024

3. Secure File Transfer on Cloud Using Blockchain and Encryption;2023 IEEE Pune Section International Conference (PuneCon);2023-12-14

4. Analysing the Applications of Cloud Computing in Smart Agriculture;Advances in Environmental Engineering and Green Technologies;2023-11-24

5. Security Performance Analysis during Side-Channel Attack Using Novel Cryptography Algorithm for VM Cloud;2023-07-17

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3