Data Secure in Cloud Computing Using Encryption Algorithms

Journal Title: International Journal of Science and Research (IJSR) - Year 2015, Vol 4, Issue 3

Abstract

"Cloud computing is the outsourcing of IT communications by the use of the Internet and maintaining own hardware and software environment. Cloud computing facilitates computing assets on demand by the use of a service provider. It is there whenever you need it, as much as you need, and you pay as you go and only for what you use. Security is a prim concern in the use of cloud computing. In this paper, we have presented encryption based security algorithms for cloud computing. "

Authors and Affiliations

Keywords

Related Articles

Detection of Cymbidium Mosaic Virus (CYMV) on Vanda Plants

Orchid plants are the members of Orchidaceae consisting of more than 25,000 species, which are distributed almost all over the world but more abundantly in the tropics. There are 177 genera, 1,125 species of orchids that...

Stakeholders Involvement and Perception towards Guidance and Counselling in Kambaa Division Secondary Schools, Kiambu County, Kenya

According to current studies, guidance and counselling services were introduced in Kenyan schools around independency period (1963). They were introduced with an aim of substituting the corporal punishment which was the...

Signal Denoising Using EMD and Hilbert Transform and Performance Evaluation with K-S Test

The Hilbert-Huang transform (HHT) is viewed as a promising method to process the nonlinear and non-stationary signal. EMD method could decompose the signal into a number of IMFs among which are there several illusive com...

Air Quality Monitoring Using Model: A Review

Air pollution is a global environmental challenge that has continued to receive worldwide attention despite the recent decline in concentration of atmospheric pollutants following stringent environmental protection regul...

Assertion-Based Formal Verification of CPU-Cache Crossbar of OpenSPARC T1 Processor

Functional verification of complex designs, such as multi-core processors, is a challenging task in the entire verification cycle, because bugs which are not uncovered during this phase will carry on to the later design...

Download PDF file
  • EP ID EP357325
  • DOI -
  • Views 44
  • Downloads 0

How To Cite

(2015). Data Secure in Cloud Computing Using Encryption Algorithms. International Journal of Science and Research (IJSR), 4(3), -. https://europub.co.uk/articles/-A-357325