Details

Analysing the Security and Cryptographic Features in Cloud

Rishita Tyagi

Manipal University, Jaipur

51-56

Vol: 9, Issue: 3, 2019

Receiving Date: 2019-05-29 Acceptance Date:

2019-08-26

Publication Date:

2019-09-12

Download PDF

Abstract

Distributed computing conveys figuring administrations over the web instead of keeping records on a restrictive group drive or local memory drives. Processing administrations can incorporate workers, storage, information bases, systems administration, and programming. The fundamental explanation and extraordinary benefit of utilizing the cloud are that the client can store and access the put-away information whenever and get every one of its administrations for a minimal expense. Notwithstanding this, Security has consistently been a major worry with distributed computing because the client doesn't directly keep up with the data in the cloud. When the client transfers or stores information during a distributed computing system, the data proprietors will probably not comprehend how their information is being sent. The client is unconscious of whether the data is being gathered, examined, and got to by an outsider. To overcome the security issues, different cryptography techniques are proposed. This paper focused on distributed computing fundamentals and talked about additional cryptography calculations present in the current work.

Keywords: Distributed computing; cloud; cryptography

References

  1. M. A. Vouk, (2008), Cloud computing - Issues, research and implementations; Proc. Int. Conf. Inf. Technol. Interfaces, ITI, pp. 31–40
  2. P. S. Wooley, (February 2011), Identifying Cloud Computing Security Risks; Contin. Educ., vol. 1277.
  3. S. Subashini and V. Kavitha, (January 2011), A survey on security issues in service delivery models of cloud computing; J. Netw. Comput. Appl., vol. 34, no. 1, pp. 1–11.
  4. C. Modi, D. Patel, B. Borisaniya, A. Patel, and M. Rajarajan, (2013), A survey on security issues and solutions at different layers of Cloud computing; J. Supercomput., vol. 63, no. 2, pp. 561–592
  5. V. J. Winkler, (2011), Securing the Cloud; Cloud Comput. Secur. Tech. tactics. Elsevier.
  6. A. U. Khan, M. Oriol, M. Kiran, M. Jiang, and K. Djemame, (2012), Security risks and their management in cloud computing; 4th IEEE Int. Conf. Cloud Comput. Technol. Sci. Proc., pp. 121–128.
  7. T. Mather, S. Kumaraswamy, and S. Latif, (2009), Cloud Security and Privacy, p. 299
  8. F. Yahya, V. Chang, J. Walters, and B. Wills, (2014), Security Challenges in Cloud Storage; pp. 1–6.
  9. Vijaya Pinjarkar, Neeraj Raja, Krunal Jha, Ankeet Dalvi, (2016), Single Cloud Security Enhancement using key Sharing Algorithm; Recent and Innovation Trends in Computing and Communication.
  10. Vijaya Pinjarkar, Neeraj Raja, Krunal Jha, Ankeet Dalvi, (2016), Single Cloud Security Enhancement using key Sharing Algorithm; Recent and Innovation Trends in Computing and Communication.
  11. Swapnila S Mirajkar, Santoshkumar Biradar, (2014), Enhance Security in Cloud Computing; International Journal of Advanced Research in Computer Science and Software Engineering
  12. Ashalatha R, (2012), A survey on security as a challenge in cloud computing, International Journal of Advanced Technology & Engineering Research (IJATER) National Conference on Emerging Trends in Technology.
  13. G. L. Prakash, M. Prateek and I. Singh, (April 2014), Data Encryption and Decryption Algorithms using Key Rotations for Data Security in Cloud System; International Journal Of Engineering And Computer Science vol. 3, issue 4, pp. 5215- 5223.
  14. S Mahim, (March 2018), Secure file storage on cloud using cryptography; Mumbai
  15. Ahmed Albugmi Madini, O. Alassafi Robert Walters, (2016), Data Security in Cloud Computing
Back

Disclaimer: All papers published in IJRST will be indexed on Google Search Engine as per their policy.

We are one of the best in the field of watches and we take care of the needs of our customers and produce replica watches of very good quality as per their demands.

alexistogel toto online

bandar alexistogel

alexistogel bandar gacor

alexistogel link

alexistogel online

alexistogel bandar togel

link alternatif alexistogel

alexistogel

alexistogel

alexistogel

alexistogel daftar

alexistogel toto macau

alexistogel bandar macau

alexistogel slot

alexistogel agen slot

situs alexistogel

alexistogel

alexistogel

alexistogel

alexistogel

alexistogel bandar slot

alexistogel

Alexistogel Toto Macau

bandar alexistogel

slot alexistogel

alexistogel bandar togel

alexistogel

alexistogel slot

alexistogel

daftar alexistogel

alexistogel online

rtp alexistogel

alexistogel slot

alexistogel gacor

link alternatif alexistogel

alexistogel login

alexistogel

alexistogel slot dana

agen togel online

bandar togel online

alexistogel rtp

alexistogel slot

alexistogel daftar

slot online dana

situs slot online

alexistogel

bandar togel online

slot online terpercaya

togel slot online

agen slot online gacor

rtp live slot online

bandar slot online

bandar slot online gacor

agen slot online

daftar bandar togel slot

bandar togel online

togel slot hari ini

link alternatif togel slot

rtp slot online gacor

slot online gacor

alexistogel terpercaya

rtp slot gacor

tips slot maxwin

togel slot gacor

prediksi togel

game slot gacor

trik slot online

prediksi togel jitu

daftar togel slot online

slot online gacor

trik slot bonus

prediksi togel

RTP LIVE

Bandar Toto Macau

Situs Slot Gacor

bandarbola855 resmi

bandarbola855 gacor

bandarbola855 slot

link bandarbola855

bandarbola855 rtp

bandarbola855 link

bandarbola855 bandar

bandarbola855

bandarbola855 slot

bandarbola855 terpercaya

bandarbola855 slot

bandarbola855 daftar

bandarbola855 link

bandarbola855

bandarbola855

bandarbola855

iosbet

iosbet

link iosbet

slot online iosbet

iosbet link login

slot iosbet

iosbet gacor

iosbet

slot iosbet

agen iosbet

bandar iosbet

iosbet

iosbet link

iosbet

iosbet

iosbet

iosbet

liatogel

login liatogel

liatogel totomacau