CFP last date
20 June 2024
Call for Paper
July Edition
IJCA solicits high quality original research papers for the upcoming July edition of the journal. The last date of research paper submission is 20 June 2024

Submit your paper
Know more
Reseach Article

Survey of Security Algorithms in Cloud

by Swaranjeet Kaur, Amritpal Kaur
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 115 - Number 19
Year of Publication: 2015
Authors: Swaranjeet Kaur, Amritpal Kaur
10.5120/20259-2652

Swaranjeet Kaur, Amritpal Kaur . Survey of Security Algorithms in Cloud. International Journal of Computer Applications. 115, 19 ( April 2015), 23-27. DOI=10.5120/20259-2652

@article{ 10.5120/20259-2652,
author = { Swaranjeet Kaur, Amritpal Kaur },
title = { Survey of Security Algorithms in Cloud },
journal = { International Journal of Computer Applications },
issue_date = { April 2015 },
volume = { 115 },
number = { 19 },
month = { April },
year = { 2015 },
issn = { 0975-8887 },
pages = { 23-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume115/number19/20259-2652/ },
doi = { 10.5120/20259-2652 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:55:18.131313+05:30
%A Swaranjeet Kaur
%A Amritpal Kaur
%T Survey of Security Algorithms in Cloud
%J International Journal of Computer Applications
%@ 0975-8887
%V 115
%N 19
%P 23-27
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud Computing refers to the delivery of computing resources over the web. Computing resources are shared rather than having personal devices to handle applications. Information is accessed simply at anywhere, anyhow by connecting our device with web. Cloud Computing is predicated on web services used for storing, transferring and lots of alternative operations associated with information. Security is the major issue in cloud computing. The different algorithms have been proposed to provide security to critical data. This paper gives a brief introduction to some existing security algorithms in Cloud Computing.

References
  1. Rajendra Kumar Dwivedi,, 2012. From Grid Computing to Cloud Computing & Security Issues in Cloud Computing
  2. Qi Zhang, Lu Cheng, Raouf Boutaba, 2010. Cloud computing: state-of-the-art and research challenges
  3. M. Vijayapriya, 2013. Security Algorithm in Cloud Computing: overview
  4. Ms. Disha H. Parekh, Dr. R. Sridaran, 2013. An Analysis of Security Challenges in Cloud Computing
  5. Jaydip Sen, 2011. Security and Privacy Issues in Cloud Computing
  6. Ajey Singh, Dr. Maneesh Shrivastava, 2012. Overview of Attacks on Cloud Computing
  7. Randeep Kaur,Supriya Kinger, 2014 Analysis of Security Algorithms in CloudComputing
  8. Rashmi Nigoti, Manoj Jhuria, Dr. Shailendra Singh, 2013. A Survey of Cryptographic Algorithms for Cloud Computing
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Security issues and Security algorithms.