International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 114

Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 4, April 2015


Survey on Security Threats and Security Algorithms in Cloud Computing

Kapil A. Ughade | Prof. Nitin R. Chopde


Abstract: Cloud Computing is an emerging technology which provides services on demand from shared pool of computing resources. Cloud computing has at its core services like platform, infrastructure and software as a service. Benefits of cloud storage are easy access, performance, high availability, cost efficiency and many others. So each and every organization is moving its data to the cloud, that means it uses the storage service provided by the cloud provider. So there is a need to protect the data against unauthorized access, modification or denial of services, data loss, data breach etc. Cloud security is must which will break the hindrance the acceptance of the cloud by the organizations. There are a number of security algorithms which may be implemented to the cloud. This paper is a survey of different security issues to cloud and different cryptographic algorithms adoptable to better security for the cloud.


Keywords: Cloud Computing Security Threats, Security Algorithms, Blowfish, MD5


Edition: Volume 4 Issue 4, April 2015,


Pages: 2196 - 2200


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Kapil A. Ughade, Prof. Nitin R. Chopde, "Survey on Security Threats and Security Algorithms in Cloud Computing", International Journal of Science and Research (IJSR), Volume 4 Issue 4, April 2015, pp. 2196-2200, https://www.ijsr.net/get_abstract.php?paper_id=SUB153568

Similar Articles with Keyword 'Security Algorithms'

Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena [3] | A. Komathi [2]

Share this Article

Downloads: 110

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2810 - 2816

Parallelization of Symmetric and Asymmetric security Algorithms for MultiCore Architectures

T. Balamurugan | T. Hemalatha

Share this Article
Top