scispace - formally typeset
Open AccessJournal ArticleDOI

Security Algorithms in Cloud Computing

Rohini Bhardwaj, +1 more
- 15 Nov 2017 - 
- Vol. 178, Iss: 5, pp 33-37
TLDR
Diverse calculations will be examined for security of information in distributed computing for cloud computing services.
Abstract
Cloud computing provides services over web with powerful resizable resources. Cloud computing facilities give advantages to the end user in terms of cost and ease of use. Cloud computing services require security during transfer of important data and censorious applications to shared and public cloud environments. To store information on cloud, client needs to exchange their information to the outsider who will deal with and store the information. So it is imperative for any association to secure that information. Information is said to be secured if the classification, accessibility, security is available. Numerous calculations have been use to secure the information. In this paper diverse calculations will examine for security of information in distributed computing.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Enhancing the security of cloud data using hybrid encryption algorithm

TL;DR: This study combines homographic encryption and blowfish encryption to enhance cloud security and proposes a hybrid algorithm to enhance security of cloud data using encryption algorithm.
Journal ArticleDOI

A Systematic Literature Review Method On AES Algorithm for Data Sharing Encryption On Cloud Computing

TL;DR: An encryption-based proposed system is presented to secure system security during data transfer in order to prevent data theft by unauthorized person and Systematic Literature Review is proposed to generate suggestions and opportunities in AES cloud computing.
Proceedings ArticleDOI

Forecast Analysis of Research Chance on AES Algorithm to Encrypt during Data Transmission on Cloud Computing

TL;DR: The proposed system, Advanced Encryption Standard (AES) algorithm, will anticipate every irresponsible person to hack cloud system and will encrypt and decrypt information on data transmission and storage.

Securing One Time Password (OTP) for Multi-Factor Out-of-Band Authentication through a 128-bit Blowfish Algorithm

TL;DR: An innovative modification of the Blowfish algorithm designed to capitalize on its strengths but supports 128-bits block size text input using dynamic selection encryption method and reduction of cipher function execution through randomly determined rounds is introduced.
Proceedings ArticleDOI

AES and MD5 based secure authentication in cloud computing

TL;DR: This paper proposes present technique of encryption and decryption for data at the time of login but there is no authentication provided at the given time ofLogin due to only basis of trust value security is not provided.
References
More filters
Journal Article

Security in Cloud Computing usingCryptographic Algorithms

TL;DR: In this article, the proposed work plan is to eliminate the concerns regarding data privacy using cryptographic algorithms to enhance the security in cloud as per different perspective of cloud customers, which is a set of IT Services, for example network, software system, storage, hardware, software, and resources and these services are provided to a customer over a network.
Proceedings ArticleDOI

An efficient and secure data storage in Mobile Cloud Computing through RSA and Hash function

Preeti Garg, +1 more
TL;DR: This paper proposed a mechanism which uses the concept of RSA algorithm, Hash function along with several cryptography tools to provide better security to the data stored on the mobile cloud to ensure the correctness of users' data in the cloud.
Proceedings ArticleDOI

A hybrid data encryption technique using RSA and Blowfish for cloud computing on FPGAs

TL;DR: This hybrid Cryptosystem using RSA and Blowfish algorithm is considered for cloud computing where digital signature is must for user authentication and provides features of both symmetric and asymmetric cryptography.
Proceedings ArticleDOI

Parallelization of RSA Algorithm Based on Compute Unified Device Architecture

TL;DR: This paper presents a novel parallelized implement of RSA algorithm using JCUDA and Hadoop, demonstrating the speed of RSA algorithms enhanced dramatically compared to the original method on the CPU only.
Journal ArticleDOI

Cloud Security Algorithms

TL;DR: This paper will discuss the different cryptography of algorithms, which are important for the company to secure data when transferring data to cloud.
Related Papers (5)