Survey on Cloud Computing Security Algorithms
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Views: 117 , Downloads: 103 | CTR: 88 % | Weekly Popularity: ⮙1

Survey Paper | Information Technology | India | Volume 5 Issue 4, April 2016

Survey on Cloud Computing Security Algorithms

Akash Kanthale, S. P. Potdar

with the fantastic growth of sensitive information on cloud, cloud storage security is becoming more important than even before. The cloud data and its services reside in relatively scalable data centres and can be accessed from everywhere. The growth of the cloud users has been accompanied with a growth in malicious activities in the cloud. More and more vulnerabilities are get discovered, and nearly every day, new upcoming security advisories are published. Millions of users are surfing the Cloud system for various purposes, therefore they need purely safe and persistent services. The future of cloud, especially in extending the range of applications, involves a much higher degree of privacy, and authentication. Any technology cant be said perfect until it is 100 % free from any vulnerability. So whenever a new technology is introduced the security is the first feature that is countable. There are many technologies that are used for online data storage, accessing the data at any location and provide the online usage of any software. Cloud computing is the technology that provides the online data storage and the most important services that it provides software on hiring facility. In this paper, a survey on some of the cloud security algorithms is performed and compared.

Keywords: Cloud, Algorithms, public, private, encryption, decryption

Edition: Volume 5 Issue 4, April 2016

Pages: 1865 - 1867

Share this Article

How to Cite this Article?

Akash Kanthale, S. P. Potdar, "Survey on Cloud Computing Security Algorithms", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV161684, Volume 5 Issue 4, April 2016, 1865 - 1867

117 PDF Views | 103 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Cloud'

Views: 47 , Downloads: 43 | CTR: 91 % | Weekly Popularity: ⮙2

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 91 - 93

A Scalable Two-Phase Bottom-Up Specialization Prospective for Data Anonymization Using Map Reduce on Cloud

Dilipprasad.E, Ajay.R, K. Durairaj

Share this Article

Views: 113 , Downloads: 80 | CTR: 71 % | Weekly Popularity: ⮙5

Research Paper, Information Technology, India, Volume 9 Issue 7, July 2020

Pages: 1598 - 1602

An Approach to Storage of Data on Cloud Computing and Challenges Involved

Pranshu Prenam, Rahul Chawda

Share this Article

Views: 134 , Downloads: 99 | CTR: 74 % | Weekly Popularity: ⮙4

Review Papers, Information Technology, India, Volume 3 Issue 9, September 2014

Pages: 2342 - 2346

Cloud Compiler Based on Android

Vijay R. Sonawane, Guruprasad S. Iyer, Dilip K. Jaiswal

Share this Article

Views: 127 , Downloads: 99 | CTR: 78 % | Weekly Popularity: ⮙4

Research Paper, Information Technology, Iraq, Volume 4 Issue 11, November 2015

Pages: 1736 - 1745

Recommendations to Evaluate and Choose Cloud Services and Deployment Models for e-Business Strategic Use: A Case Study of Malaysian SMEs

Haider N. Hussain

Share this Article

Views: 131 , Downloads: 100 | CTR: 76 % | Weekly Popularity: ⮙5

Research Paper, Information Technology, India, Volume 5 Issue 9, September 2016

Pages: 1751 - 1754

Re-encryption based Attribute Revocation in Data Access Control for Multiauthority Cloud Storage

Kalyani G. Ktangale, Milind Penurkar

Share this Article

Similar Articles with Keyword 'Algorithms'

Views: 114 , Downloads: 100 | CTR: 88 %

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 2734 - 2737

Detection of Outliers Using Hybrid Algorithm on Categorical Datasets

Rachana P. Jakkulwar, Prof. R. A. Fadnavis

Share this Article

Views: 150 , Downloads: 100 | CTR: 67 % | Weekly Popularity: ⮙5

Research Paper, Information Technology, India, Volume 5 Issue 2, February 2016

Pages: 1465 - 1469

PTP Method in Network Security for Misbehavior Detection Using Entropy

Neha Pathak, R. S. Apare

Share this Article

Views: 124 , Downloads: 101 | CTR: 81 % | Weekly Popularity: ⮙3

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 2441 - 2444

Privacy-Preservation of Centralized and Distributed Social Network by Using L-Diversity Algorithm

Shankaranand, P. Rajasekar

Share this Article

Views: 139 , Downloads: 102 | CTR: 73 % | Weekly Popularity: ⮙4

Survey Paper, Information Technology, India, Volume 5 Issue 8, August 2016

Pages: 1103 - 1107

Up in the Air: Cloud Computing Security and RSA Algorithm

Pooja Bharadwaj, Shivani Mankotia

Share this Article

Views: 141 , Downloads: 103 | CTR: 73 % | Weekly Popularity: ⮙3

Research Paper, Information Technology, India, Volume 3 Issue 7, July 2014

Pages: 1360 - 1367

Implementation of Location based Encryption in GSM Cellular Network using OPNET

Vijay S. More, Uma R. Godase

Share this Article

Similar Articles with Keyword 'public'

Views: 138 , Downloads: 82 | CTR: 59 % | Weekly Popularity: ⮙7

Research Paper, Information Technology, India, Volume 3 Issue 10, October 2014

Pages: 1896 - 1909

Users Experience with E-Journal Features: A Research Survey of Aerospace Scientists and Engineers of Bangalore

R. Guruprasad, P. Marimuthu

Share this Article

Views: 157 , Downloads: 99 | CTR: 63 % | Weekly Popularity: ⮙3

Research Paper, Information Technology, Kenya, Volume 3 Issue 9, September 2014

Pages: 1843 - 1851

Implementing a Web-based Routine Health Information System in Kenya: Factors Affecting Acceptance and Use

Josephine KARURI, Peter WAIGANJO, Daniel ORWA

Share this Article

Views: 140 , Downloads: 100 | CTR: 71 % | Weekly Popularity: ⮙4

Research Paper, Information Technology, Nigeria, Volume 5 Issue 5, May 2016

Pages: 2051 - 2058

ICTs and Child Labour in Nigeria: Patterns, Implications and Prevention Strategies

Jimoh Femi Olatunji, Amah Nnachi Lofty, Dr. Oyedemi Jacob

Share this Article

Views: 131 , Downloads: 100 | CTR: 76 % | Weekly Popularity: ⮙5

Research Paper, Information Technology, India, Volume 5 Issue 9, September 2016

Pages: 1751 - 1754

Re-encryption based Attribute Revocation in Data Access Control for Multiauthority Cloud Storage

Kalyani G. Ktangale, Milind Penurkar

Share this Article

Views: 150 , Downloads: 101 | CTR: 67 % | Weekly Popularity: ⮙5

Research Paper, Information Technology, Kenya, Volume 5 Issue 2, February 2016

Pages: 1723 - 1725

An E-Government-Integration Framework for County Governments in Kenya

Florence K. Maweu, Josphat Karani

Share this Article

Similar Articles with Keyword 'private'

Views: 131 , Downloads: 100 | CTR: 76 % | Weekly Popularity: ⮙5

Research Paper, Information Technology, India, Volume 5 Issue 9, September 2016

Pages: 1751 - 1754

Re-encryption based Attribute Revocation in Data Access Control for Multiauthority Cloud Storage

Kalyani G. Ktangale, Milind Penurkar

Share this Article

Views: 155 , Downloads: 102 | CTR: 66 % | Weekly Popularity: ⮙3

Survey Paper, Information Technology, Malaysia, Volume 3 Issue 4, April 2014

Pages: 754 - 759

The Ethical Dilemma of Professional IT

Cutifa Safitri, Yunura Azura, Jamaluddin Bin Ibrahim

Share this Article

Views: 140 , Downloads: 102 | CTR: 73 % | Weekly Popularity: ⮙5

Research Paper, Information Technology, India, Volume 3 Issue 6, June 2014

Pages: 1654 - 1660

Privacy Preserving Protocol for Two-Party Classifier Over Vertically Partitioned Dataset Using ANN

Smitha Iddalgave, Sumana M

Share this Article

Views: 145 , Downloads: 103 | CTR: 71 % | Weekly Popularity: ⮙6

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 3 Issue 10, October 2014

Pages: 1390 - 1394

Efficient Privacy Protection in Social Networks

Bharath Kumar Gowru, Ramadevi Polagani

Share this Article

Views: 117 , Downloads: 103 | CTR: 88 % | Weekly Popularity: ⮙1

Survey Paper, Information Technology, India, Volume 5 Issue 4, April 2016

Pages: 1865 - 1867

Survey on Cloud Computing Security Algorithms

Akash Kanthale, S. P. Potdar

Share this Article

Similar Articles with Keyword 'encryption'

Views: 143 , Downloads: 98 | CTR: 69 % | Weekly Popularity: ⮙2

Research Paper, Information Technology, Nigeria, Volume 3 Issue 4, April 2014

Pages: 528 - 535

Document Security within Institutions Using Image Steganography Technique

Ahaiwe J.

Share this Article

Views: 131 , Downloads: 100 | CTR: 76 % | Weekly Popularity: ⮙5

Research Paper, Information Technology, India, Volume 5 Issue 9, September 2016

Pages: 1751 - 1754

Re-encryption based Attribute Revocation in Data Access Control for Multiauthority Cloud Storage

Kalyani G. Ktangale, Milind Penurkar

Share this Article

Views: 140 , Downloads: 102 | CTR: 73 % | Weekly Popularity: ⮙5

Research Paper, Information Technology, India, Volume 3 Issue 6, June 2014

Pages: 1654 - 1660

Privacy Preserving Protocol for Two-Party Classifier Over Vertically Partitioned Dataset Using ANN

Smitha Iddalgave, Sumana M

Share this Article

Views: 132 , Downloads: 102 | CTR: 77 % | Weekly Popularity: ⮙4

Research Paper, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 2917 - 2919

E Voting Using Android System

Namrata Thakur, Vrushalee Ambavale

Share this Article

Views: 139 , Downloads: 102 | CTR: 73 % | Weekly Popularity: ⮙4

Survey Paper, Information Technology, India, Volume 5 Issue 8, August 2016

Pages: 1103 - 1107

Up in the Air: Cloud Computing Security and RSA Algorithm

Pooja Bharadwaj, Shivani Mankotia

Share this Article

Similar Articles with Keyword 'decryption'

Views: 143 , Downloads: 98 | CTR: 69 % | Weekly Popularity: ⮙2

Research Paper, Information Technology, Nigeria, Volume 3 Issue 4, April 2014

Pages: 528 - 535

Document Security within Institutions Using Image Steganography Technique

Ahaiwe J.

Share this Article

Views: 139 , Downloads: 102 | CTR: 73 % | Weekly Popularity: ⮙4

Survey Paper, Information Technology, India, Volume 5 Issue 8, August 2016

Pages: 1103 - 1107

Up in the Air: Cloud Computing Security and RSA Algorithm

Pooja Bharadwaj, Shivani Mankotia

Share this Article

Views: 141 , Downloads: 103 | CTR: 73 % | Weekly Popularity: ⮙3

Research Paper, Information Technology, India, Volume 3 Issue 7, July 2014

Pages: 1360 - 1367

Implementation of Location based Encryption in GSM Cellular Network using OPNET

Vijay S. More, Uma R. Godase

Share this Article

Views: 117 , Downloads: 103 | CTR: 88 % | Weekly Popularity: ⮙1

Survey Paper, Information Technology, India, Volume 5 Issue 4, April 2016

Pages: 1865 - 1867

Survey on Cloud Computing Security Algorithms

Akash Kanthale, S. P. Potdar

Share this Article

Views: 124 , Downloads: 105 | CTR: 85 % | Weekly Popularity: ⮙1

Research Paper, Information Technology, India, Volume 4 Issue 2, February 2015

Pages: 2030 - 2033

Establishing Secret Key in Wireless Environment by Using Techniques of Keyless Cryptosystem

Fatima Joselyn Mystica, Gopalakrishnan Prakash

Share this Article
Top