ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Survey on Security Threats and Security Algorithms in Cloud Computing

Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 4)

Publication Date:

Authors : ; ;

Page : 2196-2200

Keywords : Cloud Computing Security Threats; Security Algorithms; Blowfish; MD5;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Cloud Computing is an emerging technology which provides services on demand from shared pool of computing resources. Cloud computing has at its core services like platform, infrastructure and software as a service. Benefits of cloud storage are easy access, performance, high availability, cost efficiency and many others. So each and every organization is moving its data to the cloud, that means it uses the storage service provided by the cloud provider. So there is a need to protect the data against unauthorized access, modification or denial of services, data loss, data breach etc. Cloud security is must which will break the hindrance the acceptance of the cloud by the organizations. There are a number of security algorithms which may be implemented to the cloud. This paper is a survey of different security issues to cloud and different cryptographic algorithms adoptable to better security for the cloud.

Last modified: 2021-06-30 21:44:39