
Analysis and assessment of various cryptographic techniques based on a variety of features
Author(s) -
Raghu Rajan,
G. Murugaboopathi,
C. Parthasarathy
Publication year - 2018
Publication title -
international journal of engineering and technology
Language(s) - English
Resource type - Journals
ISSN - 2227-524X
DOI - 10.14419/ijet.v7i1.9.9730
Subject(s) - cloud computing , computer science , computer security , scalability , cloud computing security , denial of service attack , cryptography , service (business) , resilience (materials science) , the internet , world wide web , database , business , operating system , physics , marketing , thermodynamics
Cloud computing process is an IT service invented for providing efficient network, software, hardware, storage, software systems and resource services. Cloud computing delivers service to the customers through a network. The IT and the management services involved in it is taken care by third parties that owns the physical infrastructure involved in the service. Cloud service provides us the ease to access information at any place, any time with minimum cost involved and high reliability, scalability and resilience. Because of these advantages many organizations are converting themselves to cloud. With growing demand it is necessary to consider the confidentiality of information and also secure it from unauthorized users, denial of services, modification, etc. Securing the storage and computation process in cloud is essential to avoid the above threats. Security protocol in cloud is enhanced through cryptographic algorithms to eliminate the various security threats in our work.