Data storage and retrieval is major issue in cloud environments. For data storage and retrieval used authentication and authorization process. The authentication and authorization process used cryptography technique. The cryptography technique provides symmetric and asymmetric crypto systems. The symmetric technique is week in compression of asymmetric technique. Various authors used the concept of asymmetric cryptography technique for the process of data over the cloud network.
CITATION STYLE
Kumar, D. R., & Sheetalani, Dr. J. (2017). Review of Key Management and Distribution Technique for Data Dynamics for Storage Security in Cloud Computing. IOSR Journal of Computer Engineering, 19(03), 38–49. https://doi.org/10.9790/0661-1903013849
Mendeley helps you to discover research relevant for your work.