Crypto Cloud Computing with Symmetric and Asymmetric Cryptography for Information Security and Storage

  • et al.
N/ACitations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The resources and the services that the cloud provides are attractive for the users and are distinct from one cloud provider to another. The concerning aspect is how much securely our data stored in cloud is and how the data is protected against attacks. Various encryption algorithms or techniques of cryptography are used to protect data against attacks and also provides authenticity and confidentiality of data I an online and offline environment. Therefore in this paper various cryptographic aspects are covered, predominantly compares different algorithms with suggested solutions and results including cloud data protection. Authentication of data, confidentiality of data and data integrity aspects are the primary factors that have to be addressed in today’s social networking and in the distributed environments. Cryptography and crypto cloud computing plays major role in secure transfer and storage of information.

Cite

CITATION STYLE

APA

Jyothi*, V. E., Lakshmi, M. P., & Krishna, R. R. (2020). Crypto Cloud Computing with Symmetric and Asymmetric Cryptography for Information Security and Storage. International Journal of Recent Technology and Engineering (IJRTE), 8(5), 231–235. https://doi.org/10.35940/ijrte.d4387.018520

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free