earticle

논문검색

Cloud Security Algorithms

초록

영어

Cloud computing appear to be a very popular and interesting computing technology. Every third person is using cloud computing directly or indirectly for example e-mail, most commonly used application of cloud computing, you can access your mail anywhere anytime. Your e-mail account is not visible on your personal computer but you have to access that with the help of internet. Like e-mail cloud computing provide many other services such as storage of any kind of data, access to different applications, resources etc. So users can easily access and store data with low cost and without worrying about how these services are provided to user. Due to this flexibility everyone is transferring data to cloud. To store data on cloud user has to send their data to the third party who will manage and store data. So it is very important for the company to secure that data. Data is said to be secured if confidentiality, availability, integrity is present. To secure data we have different algorithms. In this paper we will discuss the different cryptography of algorithms.

목차

Abstract
 1. Introduction
 2. Existing Algorithms
  2.1. Data Encryption Standard (DES)
  2.2. Advance Encryption Algorithm (AES)
  2.3. Triple- DES (TDES)
  2.4. Blowfish Algorithm
  2.4. IDEA
  2.5. Homomorphic Encryption
  2.6. RSA
  2.7. Diffie- Hellman Key Exchange
 3. Conclusion
 4. Future Scope
 References

저자정보

  • Er. Ashima Pansotra Research Scholar, DAV University, Jalandhar
  • Er. Simar Preet Singh Assistant Professor, DAV University, Jalandhar

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

      0개의 논문이 장바구니에 담겼습니다.