Analysis of Various Encryption Schemes of Cloud Computing
Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.8, No. 6)Publication Date: 2019-06-30
Authors : Satmeer Kaur; Inderdeep Kaur;
Page : 177-182
Keywords : Fully Disk Encryption; Fully homomorphic encryption; cloud security;
Abstract
The cloud computing is the decentralized network is much vulnerable to certain security attacks. The various security techniques are proposed by researchers to improve security of the network. The fully homomorphic and fully disk encryption techniques are proposed by the researchers to increase security of the network. It is analyzed that fully homomorphic encryption is the efficient technique than the fully disk encryption. The various improvement which are proposed in the fully homomorphic encryption is reviewed in this paper in terms of certain parameters.
Other Latest Articles
- Big Data Prediction Framework for Weather Temperature Based on Map-Reduce Algorithm
- Detection and Prevention of Black-Hole Attack in MANETS
- Dnipro Pharmacology School: a 100 years’ journey (to the centenial of the department of pharmacology and clinical pharmacology of Dnipropetrovsk medical academy). Part I: 1918-1943
- Analysis of the states of the activity of the laboratory service of the industrial region of Ukraine and the ways of it optimization
- Harmful occupational factors of shoe productions: noise and vibration
Last modified: 2019-07-05 21:03:56