Comparison of Various Encryption Algorithms for Data Security in the Cloud Computing

Publish Year: 1398
نوع سند: مقاله کنفرانسی
زبان: English
View: 440

This Paper With 7 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

GERMANCONF03_137

تاریخ نمایه سازی: 12 شهریور 1399

Abstract:

The Cloud computing, as an ascending technology, will change the world of information technology in the future. Unlike the traditional hosting service, cloud computing provides remote services to maintain data and applications. In spite of the rapid developments in the field, many challenges including security, data confidentiality, and privacy are still debate. Cryptographic algorithms play a vital role in information security systems. It is considered as a method of converting plain text into cipher text for data security against unauthorized access. Cryptographic as a service in the cloud computing environment provides a high level of security against unauthorized access. In this review, we intend to discuss Symmetric and Asymmetric Algorithms in terms of the security and confidentiality issue which are required to protect the data stored in the cloud.

Authors

Seyedeh Maryam Shahrokhi

Department of Electrical and Computer Engineering, Faculty of Khorramabad, Lorestan Branch, Technical and Vocational University (TVU), Lorestan, Iran