Review of Key Management and Distribution Technique for Data Dynamics for Storage Security in Cloud Computing

  • Kumar D
  • Sheetalani D
N/ACitations
Citations of this article
7Readers
Mendeley users who have this article in their library.

Abstract

Data storage and retrieval is major issue in cloud environments. For data storage and retrieval used authentication and authorization process. The authentication and authorization process used cryptography technique. The cryptography technique provides symmetric and asymmetric crypto systems. The symmetric technique is week in compression of asymmetric technique. Various authors used the concept of asymmetric cryptography technique for the process of data over the cloud network.

Cite

CITATION STYLE

APA

Kumar, D. R., & Sheetalani, Dr. J. (2017). Review of Key Management and Distribution Technique for Data Dynamics for Storage Security in Cloud Computing. IOSR Journal of Computer Engineering, 19(03), 38–49. https://doi.org/10.9790/0661-1903013849

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free