Survey on Security Threats and Security Algorithms in Cloud Computing
Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 4)Publication Date: 2015-04-05
Authors : Kapil A. Ughade; Nitin R. Chopde;
Page : 2196-2200
Keywords : Cloud Computing Security Threats; Security Algorithms; Blowfish; MD5;
Abstract
Cloud Computing is an emerging technology which provides services on demand from shared pool of computing resources. Cloud computing has at its core services like platform, infrastructure and software as a service. Benefits of cloud storage are easy access, performance, high availability, cost efficiency and many others. So each and every organization is moving its data to the cloud, that means it uses the storage service provided by the cloud provider. So there is a need to protect the data against unauthorized access, modification or denial of services, data loss, data breach etc. Cloud security is must which will break the hindrance the acceptance of the cloud by the organizations. There are a number of security algorithms which may be implemented to the cloud. This paper is a survey of different security issues to cloud and different cryptographic algorithms adoptable to better security for the cloud.
Other Latest Articles
- A Prospective Comparison of the Ondansetron Plus Aprepitant, Versus Ondansetron for the Prevention of Chemotherapy Induced Nausea and Vomiting
- Experimental Analysis on Effect of Design Parameters on the Performance of Single Loop Pulsating Heat Pipe
- Electro Magnetic Shielding Effectiveness of High Density Polyethylene Based Composite Materials
- Real and Reactive Power Flow Analysis&Simulation with UPFC Connected to a Transmission Line
- Key Agreement Protocol Based On EC-MQV Algorithm for Cooperative Wireless Communication
Last modified: 2021-06-30 21:44:39