Survey on Cloud Computing Security

7Citations
Citations of this article
138Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Cloud computing is considered as one of the renowned computing methods for pooling and providing various computing resources on demand basis. Cloud computing has grabbed its roots in the IT industry and has become a useful choice for small budget business and organizations. As multiple customers are sharing the same cloud, it will have many security challenges such as malicious user attack, user identity management, auditing, resource management, and integrity control. The main aim here is to provide security to the data by protecting it by unauthorized users during the time of information transmission by using different encrypting techniques such as Blowfish algorithm, RSA algorithm, secure hash algorithm 2, and message digest, on the user data in the cloud. In this paper, we present very recent techniques and algorithms proposed by various authors to secure the stored cloud data.

Cite

CITATION STYLE

APA

Sinchana, M. K., & Savithramma, R. M. (2020). Survey on Cloud Computing Security. In Lecture Notes in Networks and Systems (Vol. 103, pp. 1–6). Springer. https://doi.org/10.1007/978-981-15-2043-3_1

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free