Time Complexity Analysis of RSA, OTP and Hash Algorithms in Cloud Data
By: Shanmuga, Priya M.
Contributor(s): Thiruselvan, P.
Publisher: New Delhi Journals Pub 2019Edition: Vol.5(2), Jul-Dec.Description: 29-38p.Subject(s): EXTC EngineeringOnline resources: Click here In: International journal of embedded systems and emerging technologiesSummary: Cloud Computing security refers to protection of data in cloud, its applications and the underlying infrastructure using some set of polices, controls and technologies. It is an important trend in information technology throughout the world. Security of a data has a major issue in cloud computing environment. Now a days the data protection technique uses symmetric and uneven encryption algorithms with the strong authentication techniques. This paper proposes the contrast of the performances for number of present security strategies used to offer safety within the area of computing with the extraordinary parameters. it will likely be used to enhance the safety of data storage in a cloud surroundings.Item type | Current location | Call number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|
Articles Abstract Database | School of Engineering & Technology Archieval Section | Not for loan | 2020-2021188 |
Cloud Computing security refers to protection of data in cloud, its applications and the underlying infrastructure using some set of polices, controls and technologies. It is an important trend in information technology throughout the world. Security of a data has a major issue in cloud computing environment. Now a days the data protection technique uses symmetric and uneven encryption algorithms with the strong authentication techniques. This paper proposes the contrast of the performances for number of present security strategies used to offer safety within the area of computing with the extraordinary parameters. it will likely be used to enhance the safety of data storage in a cloud surroundings.
There are no comments for this item.