Data Secure in Cloud Computing Using Encryption Algorithms

Journal Title: International Journal of Science and Research (IJSR) - Year 2015, Vol 4, Issue 3

Abstract

"Cloud computing is the outsourcing of IT communications by the use of the Internet and maintaining own hardware and software environment. Cloud computing facilitates computing assets on demand by the use of a service provider. It is there whenever you need it, as much as you need, and you pay as you go and only for what you use. Security is a prim concern in the use of cloud computing. In this paper, we have presented encryption based security algorithms for cloud computing. "

Authors and Affiliations

Keywords

Related Articles

Combating Truancy Delinquency Need of an Action Plan

Truancy delinquency among school and college going students is a very serious problem world over; which is often not recognized, treated and controlled with due seriousness it deserves, especially by parents as well as b...

Determination of Iodide in Tropical Seaweed (halopterisfilicina)

Abstract: Seaweed (Halopteris filicina) was analyzed for its iodide content. The iodide content ranges from 0.081 to 0.121% of the dried weighed sample. Various factors were suspected inhibiting the iodide content. The o...

Impact of Different Pre-treatments of Agave sisalana Leaves on Yield and Anatomical Traits of Fibre

The study presented was aimed to investigate the effect of different pre-treatments of Agave sisalana leaves on yield, physicochemical and anatomical characteristics of fibre. A. sisalana leaves were treated with acid, a...

Joint Forest Management for Decline off Villagers Migration Problem: A Case Study of Three Villages of Central India

Through migration human being move from one place to another place in pursuit of certain cherished objectives like avenues of better employment, better wages, better working and living conditions, better quality of life...

Mining of Association Rules in Distributed Databases

Data mining is the most fast growing area today which is used to extract important knowledge from large data collections but often these collections are divided among several parties. Association rule mining is one of th...

Download PDF file
  • EP ID EP357325
  • DOI -
  • Views 63
  • Downloads 0

How To Cite

(2015). Data Secure in Cloud Computing Using Encryption Algorithms. International Journal of Science and Research (IJSR), 4(3), -. https://europub.co.uk/articles/-A-357325