SECURITY ALGORITHM IN CLOUD COMPUTING: OVERVIEW

Abstract

Network security is becoming more and more important as people spend more and more time connected. It is a specialized field in computer networking that involves securing a computer network infrastructure. It is typically handled by a network administrator or system administrator who implements the security policy, network software and hardware needed to protect a network and the resources accessed through the network from unauthorized access. It also ensures that we have an adequate access to the network and resources to work. A network security system typically lies on the layers of protection and consists of multiple components including networking monitoring and security software in addition to hardware and the appliances. All components work together to increase the overall security of the computer network. For enhancing the security, many algorithms are widely used. Cloud Computing is a set of IT based Services that are provided to a customer over a network and these services are delivered by a third party provider who owns the infrastructure. It is often provided "as a service" over the Internet and that was typically in the form of infrastructure as a service (IaaS), platform as a service (PaaS), software as a service (SaaS), data storage as a service (DSaaS). This research paper presents what cloud computing is, security algorithms and the challenges in cloud computing.

Authors and Affiliations

M. Vijayapriya

Keywords

Related Articles

A LITERATURE SURVEY ON MULTITHREADING TECHNIQUES TO AVOID DATA LOSS IN CLOUD STORAGE

“Security” is a one of the important issues in cloud computing environment. Cloud computing is used to deliver software, storage and processing for millions of users across the world. In the user environment, it is the c...

Novel Approach for Detection of Brain Tumor using Segmentation Techniques

Medical Image Processing is one of the standard method to detect the abnormal tissue. The key benefit of this field is reduction of manual work and early detection of the disease. Various types of medical imaging modalit...

A SURVEY OF VARIOUS ROUTING PROTOCOLS IN MOBILE AD-HOC NETWORKS (MANET)

Mobile ad hoc networks is a collection of mobile nodes that dynamically change the topology of MANETs ,that allows nodes to join and leave the network at any point of time. In MANET mobile nodes are communicate each othe...

A Review on Recent Computer Crimes

With the evolution of technology, crimes happening with the help of computer and internet are increasing day by day and have become curse for the modern era. Cybercrime globally affects IT environment very much be it gov...

Suggested Cluster Co-ordinator Protocol for Concurrency Control in Distributed DBMS 

Distributed Database Management system is a need of the hour. The concurrent transactions are not only important in any Data Base Management System but are also important in Distributed DBMS. For the data to be in consis...

Download PDF file
  • EP ID EP120538
  • DOI -
  • Views 98
  • Downloads 0

How To Cite

M. Vijayapriya (2013). SECURITY ALGORITHM IN CLOUD COMPUTING: OVERVIEW. International Journal of Computer Science & Engineering Technology, 4(9), 1209-1211. https://europub.co.uk/articles/-A-120538