Secure data transmission in cloud computing using message storage & retrieval algorithms

2Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.

Abstract

Our economic assets are limited, yet our valuation necessitates seems to be boundless. The requirement meant for valuation remedies continues growing inconclusively, no matter the accessibility of assets, the requirement for further continues. Now the cloud does its job, Cloud Computing (CC) acquires its title as a metaphor for the web. In general, the web is spoken to within the system figure like a cloud. The cloud symbol speaks to the entire so as to further objects to facilitate the system function. Various businesses is being gradually moving to the utilization of CC, since CC vows toward slash functional as well as investment expense also all the further significantly consent to Software sectors center around intentional activities as an alternative of maintaining the information hub operating. Guaranteeing the protection of CC is a key aspect within the CC condition, like clients frequently piles up touchy data through cloud repository suppliers, yet those suppliers might be dishonest. On the way to guarantee the protection as well as rightness of users information within the cloud, this document recommends another pattern on behalf of information safety in CC.

Cite

CITATION STYLE

APA

Yogesh Rajkumar, R., & Kaliyamurthie, K. P. (2019). Secure data transmission in cloud computing using message storage & retrieval algorithms. International Journal of Engineering and Advanced Technology, 9(1), 7193–7196. https://doi.org/10.35940/ijeat.A2064.109119

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free