Header menu link for other important links
X
Cloud Computing Security using Cryptographic Algorithms
Shirgaonkar M., Shinde A., Sankpal P.,
Published in Institute of Electrical and Electronics Engineers Inc.
2022
Pages: 31 - 37
Abstract
This paper aims to present the survey of cloud computing security. A cloud computing security is defined so that it can help to clarify cloud security. Cloud computing has evolved to become an essential component of both current and future information technologies. This technology was created to be used in conjunction with the internet, and it includes features such as data storage, remote access, and so on. Various cryptographic encryption algorithms are compared in terms of their various key features. The primary goal is to highlight such attacks and provide recommendations for resolving data breaching issues using cryptographic algorithms such as Symmetric Key Cryptographic Algorithms (DES, 3DES, AES), Asymmetric Key Cryptographic Algorithms (RSA, DSA, Diffie-Hellman Algorithm), and Hashing Algorithms (MD5, SHA). So, in the paper cloud security challenges and the cryptographic algorithms used to prevent them are discussed. © 2022 IEEE.
About the journal
JournalProceedings - 6th International Conference on Computing Methodologies and Communication, ICCMC 2022
PublisherInstitute of Electrical and Electronics Engineers Inc.
Open AccessNo