+

Jan et al., 2022 - Google Patents

Securing the Cloud Storage by Using Different Algorithms of Cryptography

Jan et al., 2022

View PDF
Document ID
10414414396290032990
Author
Jan M
Shahzad Q
Afsar S
Publication year
Publication venue
Int. J. Sci. Res. in Computer Science and Engineering Vol

External Links

Snippet

Accepted: 02/Apr/2022, Online: 30/Apr/2022 Abstract—Cloud Computing offers services via the internet that allows for virtual servers, dynamic memory pools, as well as easy access. Because distributed computing is based on the internet, security concerns such as …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards

Similar Documents

Publication Publication Date Title
Chinnasamy et al. Efficient data security using hybrid cryptography on cloud computing
Bhardwaj et al. Security algorithms for cloud computing
Tawalbeh et al. A secure cloud computing model based on data classification
Ahmad et al. Hybrid cryptography algorithms in cloud computing: A review
Abdul Hussien et al. [Retracted] A Secure Environment Using a New Lightweight AES Encryption Algorithm for E‐Commerce Websites
CN116866029B (en) Random number encryption data transmission method, device, computer equipment and storage medium
Hossain et al. Design and development of a novel symmetric algorithm for enhancing data security in cloud computing
Yeboah-Ofori et al. Enhancement of big data security in cloud computing using RSA algorithm
US10686592B1 (en) System and method to provide a secure communication of information
Priyadharshini et al. Efficient Key Management System Based Lightweight Devices in IoT.
Jan et al. Securing the Cloud Storage by Using Different Algorithms of Cryptography
Kumari et al. One time pad encryption technique in cryptography
Shirole et al. Review paper on data security in cloud computing environment
Kodada FSAaCIT: finite state automata based one-key cryptosystem and chunk-based indexing technique for secure data de-duplication in cloud computing
Sharfuddin et al. A novel cryptographic technique for cloud environment based on feedback DNA
Latha et al. Security scheme in cloud system using hyper elliptic curve and SIFT technique with QR code
Agnihotri et al. A secure document archive implemented using multiple encryption
Vennela et al. Performance analysis of cryptographic algorithms for cloud security
Kanna et al. A new approach in multi cloud environment to improve data security
Jena et al. Dual encryption model for preserving privacy in cloud computing
Emdad et al. A standard data security model using AES algorithm in cloud computing
Bollipelly et al. Blockchain-based messaging system for secure and private communication: Using blockchain and double AES encryption
Sri et al. Concealing the Data Using Cryptography
Reddy et al. Data Storage on Cloud using Split-Merge and Hybrid Cryptographic Techniques
Anand et al. Advanced Encryption Techniques for Protecting Sensitive Data in Multi Cloud Architecture: A Security First Approach
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载