A Review of Security Algorithms in Cloud Computing

##plugins.themes.academic_pro.article.main##

Virangna Pal
Prasanth Chowdary
Prabhakar Gaur

Abstract

Cloud Computing is method of computation that allows for storage and access to information over the web, as compared to the traditional use of hard drives. Due to its numerous benefits, the most important of which being access to the information from any place and time, the field of cloud computing has seen phenomenal growth amongst individual users and enterprises alike in the past few years. These administrations are conveyed by an outside supplier, in the form of Infrastructure, Platform, Software as services. The number of clients that store their information on the Cloud multiplies, the need for security the customer's information becomes pertinent. In this paper, we audit the algorithms that are currently used in providing security in all cloud based transactions in the premise of various constraints, for example, mechanism, features, and so on.

 

##plugins.themes.academic_pro.article.details##

How to Cite
Pal, V., Chowdary, P., & Gaur, P. (2016). A Review of Security Algorithms in Cloud Computing. The International Journal of Science & Technoledge, 4(10). Retrieved from http://internationaljournalcorner.com/index.php/theijst/article/view/124021

Most read articles by the same author(s)