ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Survey on Cloud Computing Security Algorithms

Journal: International Journal of Science and Research (IJSR) (Vol.5, No. 4)

Publication Date:

Authors : ; ;

Page : 1865-1867

Keywords : Cloud; Algorithms; public; private; encryption; decryption;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

with the fantastic growth of sensitive information on cloud, cloud storage security is becoming more important than even before. The cloud data and its services reside in relatively scalable data centres and can be accessed from everywhere. The growth of the cloud users has been accompanied with a growth in malicious activities in the cloud. More and more vulnerabilities are get discovered, and nearly every day, new upcoming security advisories are published. Millions of users are surfing the Cloud system for various purposes, therefore they need purely safe and persistent services. The future of cloud, especially in extending the range of applications, involves a much higher degree of privacy, and authentication. Any technology cant be said perfect until it is 100 % free from any vulnerability. So whenever a new technology is introduced the security is the first feature that is countable. There are many technologies that are used for online data storage, accessing the data at any location and provide the online usage of any software. Cloud computing is the technology that provides the online data storage and the most important services that it provides software on hiring facility. In this paper, a survey on some of the cloud security algorithms is performed and compared.

Last modified: 2021-07-01 14:33:56