Survey on Cloud Computing Security Algorithms
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 106

Survey Paper | Information Technology | India | Volume 5 Issue 4, April 2016

Survey on Cloud Computing Security Algorithms

Akash Kanthale, S. P. Potdar

with the fantastic growth of sensitive information on cloud, cloud storage security is becoming more important than even before. The cloud data and its services reside in relatively scalable data centres and can be accessed from everywhere. The growth of the cloud users has been accompanied with a growth in malicious activities in the cloud. More and more vulnerabilities are get discovered, and nearly every day, new upcoming security advisories are published. Millions of users are surfing the Cloud system for various purposes, therefore they need purely safe and persistent services. The future of cloud, especially in extending the range of applications, involves a much higher degree of privacy, and authentication. Any technology cant be said perfect until it is 100 % free from any vulnerability. So whenever a new technology is introduced the security is the first feature that is countable. There are many technologies that are used for online data storage, accessing the data at any location and provide the online usage of any software. Cloud computing is the technology that provides the online data storage and the most important services that it provides software on hiring facility. In this paper, a survey on some of the cloud security algorithms is performed and compared.

Keywords: Cloud, Algorithms, public, private, encryption, decryption

Edition: Volume 5 Issue 4, April 2016

Pages: 1865 - 1867

Share this Article

How to Cite this Article?

Akash Kanthale, S. P. Potdar, "Survey on Cloud Computing Security Algorithms", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV161684, Volume 5 Issue 4, April 2016, 1865 - 1867

Enter Your Email Address




Similar Articles with Keyword 'Cloud'

Downloads: 2

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 91 - 93

A Scalable Two-Phase Bottom-Up Specialization Prospective for Data Anonymization Using Map Reduce on Cloud

Dilipprasad.E, Ajay.R, K. Durairaj

Share this Article

Downloads: 83

Research Paper, Information Technology, India, Volume 9 Issue 7, July 2020

Pages: 1598 - 1602

An Approach to Storage of Data on Cloud Computing and Challenges Involved

Pranshu Prenam, Rahul Chawda

Share this Article

Similar Articles with Keyword 'Algorithms'

Downloads: 103

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 2734 - 2737

Detection of Outliers Using Hybrid Algorithm on Categorical Datasets

Rachana P. Jakkulwar, Prof. R. A. Fadnavis

Share this Article

Downloads: 103

Research Paper, Information Technology, India, Volume 5 Issue 2, February 2016

Pages: 1465 - 1469

PTP Method in Network Security for Misbehavior Detection Using Entropy

Neha Pathak, R. S. Apare

Share this Article

Similar Articles with Keyword 'public'

Downloads: 6

Research Paper, Information Technology, India, Volume 10 Issue 5, May 2021

Pages: 307 - 310

CCTV Cameras Hacking and Prevention Techniques

Preeti Rana

Share this Article

Downloads: 86

Research Paper, Information Technology, India, Volume 3 Issue 10, October 2014

Pages: 1896 - 1909

Users Experience with E-Journal Features: A Research Survey of Aerospace Scientists and Engineers of Bangalore

R. Guruprasad, P. Marimuthu

Share this Article

Similar Articles with Keyword 'private'

Downloads: 101

Research Paper, Information Technology, India, Volume 5 Issue 9, September 2016

Pages: 1751 - 1754

Re-encryption based Attribute Revocation in Data Access Control for Multiauthority Cloud Storage

Kalyani G. Ktangale, Milind Penurkar

Share this Article

Downloads: 103

Survey Paper, Information Technology, Malaysia, Volume 3 Issue 4, April 2014

Pages: 754 - 759

The Ethical Dilemma of Professional IT

Cutifa Safitri, Yunura Azura, Jamaluddin Bin Ibrahim

Share this Article

Similar Articles with Keyword 'encryption'

Downloads: 101

Research Paper, Information Technology, India, Volume 5 Issue 9, September 2016

Pages: 1751 - 1754

Re-encryption based Attribute Revocation in Data Access Control for Multiauthority Cloud Storage

Kalyani G. Ktangale, Milind Penurkar

Share this Article

Downloads: 102

Research Paper, Information Technology, Nigeria, Volume 3 Issue 4, April 2014

Pages: 528 - 535

Document Security within Institutions Using Image Steganography Technique

Ahaiwe J.

Share this Article

Similar Articles with Keyword 'decryption'

Downloads: 102

Research Paper, Information Technology, Nigeria, Volume 3 Issue 4, April 2014

Pages: 528 - 535

Document Security within Institutions Using Image Steganography Technique

Ahaiwe J.

Share this Article

Downloads: 104

Research Paper, Information Technology, India, Volume 3 Issue 7, July 2014

Pages: 1360 - 1367

Implementation of Location based Encryption in GSM Cellular Network using OPNET

Vijay S. More, Uma R. Godase

Share this Article



Top