Downloads: 114 | Views: 286
Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 4, April 2015 | Popularity: 6.3 / 10
Survey on Security Threats and Security Algorithms in Cloud Computing
Kapil A. Ughade, Prof. Nitin R. Chopde
Abstract: Cloud Computing is an emerging technology which provides services on demand from shared pool of computing resources. Cloud computing has at its core services like platform, infrastructure and software as a service. Benefits of cloud storage are easy access, performance, high availability, cost efficiency and many others. So each and every organization is moving its data to the cloud, that means it uses the storage service provided by the cloud provider. So there is a need to protect the data against unauthorized access, modification or denial of services, data loss, data breach etc. Cloud security is must which will break the hindrance the acceptance of the cloud by the organizations. There are a number of security algorithms which may be implemented to the cloud. This paper is a survey of different security issues to cloud and different cryptographic algorithms adoptable to better security for the cloud.
Keywords: Cloud Computing Security Threats, Security Algorithms, Blowfish, MD5
Edition: Volume 4 Issue 4, April 2015
Pages: 2196 - 2200
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 99
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2394 - 2397Multilayered Security Approach for Cloud Data Centers using Hash Functions
Jashanpreet Pal Kaur, Rajbhupinder Kaur
Downloads: 101
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1525 - 1529Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image
Maulik P. Chaudhari, Neha Parmar
Downloads: 107
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015
Pages: 1324 - 1327Improving Security for Digital Signature by Using Steganography
G. Pranitha, Ch. Suman Chakravarthy
Downloads: 108
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 2302 - 2305Detection and Prevention of Cooperative Wormhole Attack in a MANET
Anuradha T, Padmashree S. Shedbalkar
Downloads: 109
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 1844 - 1847A Providing Security on Cloud Data Hadoop using Symmetric Encryption and Identity Authentication
Kale Rohitkumar Bhausaheb, R.L.Paikrao