International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064

Downloads: 106 | Views: 211

Survey Paper | Information Technology | India | Volume 5 Issue 4, April 2016 | Rating: 6.4 / 10

Survey on Cloud Computing Security Algorithms

Akash Kanthale | S. P. Potdar

Abstract: with the fantastic growth of sensitive information on cloud, cloud storage security is becoming more important than even before. The cloud data and its services reside in relatively scalable data centres and can be accessed from everywhere. The growth of the cloud users has been accompanied with a growth in malicious activities in the cloud. More and more vulnerabilities are get discovered, and nearly every day, new upcoming security advisories are published. Millions of users are surfing the Cloud system for various purposes, therefore they need purely safe and persistent services. The future of cloud, especially in extending the range of applications, involves a much higher degree of privacy, and authentication. Any technology cant be said perfect until it is 100 % free from any vulnerability. So whenever a new technology is introduced the security is the first feature that is countable. There are many technologies that are used for online data storage, accessing the data at any location and provide the online usage of any software. Cloud computing is the technology that provides the online data storage and the most important services that it provides software on hiring facility. In this paper, a survey on some of the cloud security algorithms is performed and compared.

Keywords: Cloud, Algorithms, public, private, encryption, decryption

Edition: Volume 5 Issue 4, April 2016,

Pages: 1865 - 1867

How to Download this Article?

Type Your Valid Email Address below to Receive the Article PDF Link

Verification Code will appear in 2 Seconds ... Wait