Using Cryptography Algorithms to Secure Cloud Computing Data and Services

Journal Title: American journal of Engineering Research - Year 2017, Vol 6, Issue 10

Abstract

These days regrading to the high demand on usingthe cloud computing services for storing and processing data, there is awareness about the information security and cloud computing. This paper present and take you to see an overview about the cryptography algorithm to detect the best cryptography algorithms for protecting and securing data on cloud computing. In this paper, we are reviewing the asymmetric and symmetric key cryptography with concentration on the symmetric key cryptography with consideration on the best algorithm to use for cloud application and services that require data security.

Authors and Affiliations

Eng. Hashem H. Ramadan,, Moussa Adamou Djamilou

Keywords

Related Articles

Optimization Of Clutch Drum Welding Process Condition For Automobile AT Using "Parameter Design"

A lot of parts for transmitting power are built in the inside of the automatic transmission of the automobile. Clutch pack parts having important functions related to speed change adopt machining and heat treatment proce...

Kinetic Study of the Fermentation of Cassava Whey

This project work is about the qualitative analysis and fermentation of cassava whey (a milky liquor that results from the pressing of freshly ground cassava) to produce ethanol using saccharomyces cerevisiae yeast. Qual...

      - Cordial labeling of Some Cycle Related Graphs

A p 2       - cordial labeling of a graph G with p vertices is a bijection f: V(G)  {1, 2, 3,…, p} defined by 1 (u) f(v) (e uv) 2 0 p if f f otherwise                and f f e (0) e (1) 1   . If a...

Inverter Control for Grid Connected and Islanding Mode Distribution Generation in a Micro grid

Distribution Generation (DG) such as Photovoltaic panels are used widely in distribution level which create a necessity to improve the control methods between the grid and the end user level. A micro grid which contains...

Thermal water characteristics and their impact in maize production quality, in Diber area

The objective of this study has been the impact of thermal water in Peshkopi in maize characteristics and quality of its production in the area used this water for irrigation. The study period there has been during years...

Download PDF file
  • EP ID EP402074
  • DOI -
  • Views 63
  • Downloads 0

How To Cite

Eng. Hashem H. Ramadan, , Moussa Adamou Djamilou (2017). Using Cryptography Algorithms to Secure Cloud Computing Data and Services. American journal of Engineering Research, 6(10), 334-337. https://europub.co.uk/articles/-A-402074