Security Algorithms for Cloud Computing

64Citations
Citations of this article
245Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

With growing awareness and concerns regards to Cloud Computing and Information Security, there is growing awareness and usage of Security Algorithms into data systems and processes. This paper presents a brief overview and comparison of Cryptographic algorithms, with an emphasis on Symmetric algorithms which should be used for Cloud based applications and services that require data and link encryption. In this paper we review Symmetric and Asymmetric algorithms with emphasis on Symmetric Algorithms for security consideration on which one should be used for Cloud based applications and services that require data and link encryption.

Cite

CITATION STYLE

APA

Bhardwaj, A., Subrahmanyam, G. V. B., Avasthi, V., & Sastry, H. (2016). Security Algorithms for Cloud Computing. In Procedia Computer Science (Vol. 85, pp. 535–542). Elsevier B.V. https://doi.org/10.1016/j.procs.2016.05.215

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free