Security Algorithms in Cloud Computing
Citations
58 citations
26 citations
Cites background from "Security Algorithms in Cloud Comput..."
...Due to high demand on cloud usage [5], every cloud service provider is encouraged to provide data security to its user [6], [7]....
[...]
13 citations
Cites background from "Security Algorithms in Cloud Comput..."
...The algorithm has key (symmetric cryptographic) to do encryption and decryption [1], [2] [6]....
[...]
...Gaining better data security [5], a proposed model is needed to avoid unauthorized person [6]....
[...]
...So, cloud service provider provides security for user’s data [5], [6]....
[...]
11 citations
Cites background from "Security Algorithms in Cloud Comput..."
...However, since symmetric algorithms like Blowfish requires the same key for encryption and decryption, secrecy and size of the secret key are the only means of defense [2][20][22]....
[...]
...Several cryptographic algorithms or cryptoalgorithms have been developed, categorized as either symmetric or asymmetric [2][14][17][18][19], of which symmetric algorithms show good performance with respect to speed [20][16] and security through strong key size [16]....
[...]
10 citations
References
185 citations
141 citations
96 citations
67 citations
51 citations
"Security Algorithms in Cloud Comput..." refers background in this paper
...It implies that customer's information and ciphering should be held esoteric from equally cloud service and different punter[13]....
[...]