Security Algorithms in Cloud Computing
Rohini Bhardwaj,Tejinder Sharma +1 more
TLDR
Diverse calculations will be examined for security of information in distributed computing for cloud computing services.Abstract:
Cloud computing provides services over web with powerful resizable resources. Cloud computing facilities give advantages to the end user in terms of cost and ease of use. Cloud computing services require security during transfer of important data and censorious applications to shared and public cloud environments. To store information on cloud, client needs to exchange their information to the outsider who will deal with and store the information. So it is imperative for any association to secure that information. Information is said to be secured if the classification, accessibility, security is available. Numerous calculations have been use to secure the information. In this paper diverse calculations will examine for security of information in distributed computing.read more
Citations
More filters
Journal ArticleDOI
Enhancing the security of cloud data using hybrid encryption algorithm
TL;DR: This study combines homographic encryption and blowfish encryption to enhance cloud security and proposes a hybrid algorithm to enhance security of cloud data using encryption algorithm.
Journal ArticleDOI
A Systematic Literature Review Method On AES Algorithm for Data Sharing Encryption On Cloud Computing
TL;DR: An encryption-based proposed system is presented to secure system security during data transfer in order to prevent data theft by unauthorized person and Systematic Literature Review is proposed to generate suggestions and opportunities in AES cloud computing.
Proceedings ArticleDOI
Forecast Analysis of Research Chance on AES Algorithm to Encrypt during Data Transmission on Cloud Computing
TL;DR: The proposed system, Advanced Encryption Standard (AES) algorithm, will anticipate every irresponsible person to hack cloud system and will encrypt and decrypt information on data transmission and storage.
Securing One Time Password (OTP) for Multi-Factor Out-of-Band Authentication through a 128-bit Blowfish Algorithm
TL;DR: An innovative modification of the Blowfish algorithm designed to capitalize on its strengths but supports 128-bits block size text input using dynamic selection encryption method and reduction of cipher function execution through randomly determined rounds is introduced.
Proceedings ArticleDOI
AES and MD5 based secure authentication in cloud computing
Shefali Ojha,Vikram Rajput +1 more
TL;DR: This paper proposes present technique of encryption and decryption for data at the time of login but there is no authentication provided at the given time ofLogin due to only basis of trust value security is not provided.
References
More filters
Journal Article
Security in Cloud Computing usingCryptographic Algorithms
TL;DR: In this article, the proposed work plan is to eliminate the concerns regarding data privacy using cryptographic algorithms to enhance the security in cloud as per different perspective of cloud customers, which is a set of IT Services, for example network, software system, storage, hardware, software, and resources and these services are provided to a customer over a network.
Proceedings ArticleDOI
An efficient and secure data storage in Mobile Cloud Computing through RSA and Hash function
Preeti Garg,Vineet Sharma +1 more
TL;DR: This paper proposed a mechanism which uses the concept of RSA algorithm, Hash function along with several cryptography tools to provide better security to the data stored on the mobile cloud to ensure the correctness of users' data in the cloud.
Proceedings ArticleDOI
A hybrid data encryption technique using RSA and Blowfish for cloud computing on FPGAs
Viney Pal Bansal,Sandeep Singh +1 more
TL;DR: This hybrid Cryptosystem using RSA and Blowfish algorithm is considered for cloud computing where digital signature is must for user authentication and provides features of both symmetric and asymmetric cryptography.
Proceedings ArticleDOI
Parallelization of RSA Algorithm Based on Compute Unified Device Architecture
TL;DR: This paper presents a novel parallelized implement of RSA algorithm using JCUDA and Hadoop, demonstrating the speed of RSA algorithms enhanced dramatically compared to the original method on the CPU only.
Journal ArticleDOI
Cloud Security Algorithms
TL;DR: This paper will discuss the different cryptography of algorithms, which are important for the company to secure data when transferring data to cloud.