Normal view MARC view ISBD view

Time Complexity Analysis of RSA, OTP and Hash Algorithms in Cloud Data

By: Shanmuga, Priya M.
Contributor(s): Thiruselvan, P.
Publisher: New Delhi Journals Pub 2019Edition: Vol.5(2), Jul-Dec.Description: 29-38p.Subject(s): EXTC EngineeringOnline resources: Click here In: International journal of embedded systems and emerging technologiesSummary: Cloud Computing security refers to protection of data in cloud, its applications and the underlying infrastructure using some set of polices, controls and technologies. It is an important trend in information technology throughout the world. Security of a data has a major issue in cloud computing environment. Now a days the data protection technique uses symmetric and uneven encryption algorithms with the strong authentication techniques. This paper proposes the contrast of the performances for number of present security strategies used to offer safety within the area of computing with the extraordinary parameters. it will likely be used to enhance the safety of data storage in a cloud surroundings.
Tags from this library: No tags from this library for this title. Log in to add tags.
    average rating: 0.0 (0 votes)
Item type Current location Call number Status Date due Barcode Item holds
Articles Abstract Database Articles Abstract Database School of Engineering & Technology
Archieval Section
Not for loan 2020-2021188
Total holds: 0

Cloud Computing security refers to protection of data in cloud, its applications and the underlying infrastructure using some set of polices, controls and technologies. It is an important trend in information technology throughout the world. Security of a data has a major issue in cloud computing environment. Now a days the data protection technique uses symmetric and uneven encryption algorithms with the strong authentication techniques. This paper proposes the contrast of the performances for number of present security strategies used to offer safety within the area of computing with the extraordinary parameters. it will likely be used to enhance the safety of data storage in a cloud surroundings.

There are no comments for this item.

Log in to your account to post a comment.

Click on an image to view it in the image viewer

Unique Visitors hit counter Total Page Views free counter
Implemented and Maintained by AIKTC-KRRC (Central Library).
For any Suggestions/Query Contact to library or Email: librarian@aiktc.ac.in | Ph:+91 22 27481247
Website/OPAC best viewed in Mozilla Browser in 1366X768 Resolution.

Powered by Koha