Key Cryptographic Methods in the Cloud: A Comparative Study

V Yadav, M Kumar - 2023 3rd International Conference on …, 2023 - ieeexplore.ieee.org
With cloud computing becoming an inseparable part of human daily life and making its way
in every field of technology during the last decade with smarter human generation and …

[PDF][PDF] A retrospect of prominent cloud security algorithms

A Alrehaili, A Mir, M Junaid - International Journal of Innovative …, 2020 - researchgate.net
The concept of Cloud Computing has been distinguished as one of the major computing
models in recent years. This distinguish comes as a reflection of a rapid and intense interest …

Comparative study of different cryptographic algorithms for data security in cloud computing

P Semwal, MK Sharma - 2017 3rd international conference on …, 2017 - ieeexplore.ieee.org
We know that with the emergence of Internet people all around the world are using its
services &are heavily dependent on it. People are also storing their huge amount of data …

A review: Analysis of various encryption techniques for securing cloud data

M Joshi, R Priya, M Joshi - 2022 4th International Conference …, 2022 - ieeexplore.ieee.org
Security of Data is an exigent issue while encrypting data in cloud computing. Recently, we
came to know about various attacks which breach the confidentiality of users or client …

Cloud computing platform: Performance analysis of prominent cryptographic algorithms

A Ajmal, S Ibrar, R Amin - Concurrency and Computation …, 2022 - Wiley Online Library
With advancements in science and technology, cloud computing is the next big thing in the
industry. Cloud cryptography is a technique that uses encryption algorithms to secure data …

A compendium over cloud computing cryptographic algorithms and security issues

N Mishra, S Siddiqui, JP Tripathi - International Journal of …, 2015 - indianjournals.com
Cloud computing is an emanation and revolutionary approach towards the computing and it
is an evolutionary approach of using resources and services on demand and as per the …

[PDF][PDF] Evaluation and Review of Security Algorithm on Cloud Computing Environment

S Yadav, KB Singh - International Journal of Innovative Research in …, 2015 - Citeseer
Cloud computing basically comes to focus on IT, a way to increase scope or add potentiality
on the fly without spending in new infrastructure, training new personnel, or licensing new …

[PDF][PDF] A comparative analysis of DES, AES and RSA crypt algorithms for network security in cloud computing

M Kannan, C Priya… - J Emerg Technol Innov Res …, 2019 - researchgate.net
In the modern existence Data communication is a copious key to share the data from one
faction to another faction through the nexus or transmission medium using few social media …

Cloud Computing--An Approach with Modern Cryptography

S Sanyal, PP Iyer - arXiv preprint arXiv:1303.1048, 2013 - arxiv.org
In this paper we are proposing an algorithm which uses AES technique of 128/192/256 bit
cipher key in encryption and decryption of data. AES provides high security as compared to …

[引用][C] Cloud computing: security Issues and description of encryption based algorithms to overcome them

L Khanna, A Jaiswal - International Journal of Advanced Research in …, 2013