Comparison of Various Encryption Algorithms for Data Security in the Cloud Computing
Publish place: Third International Congress of Science and Engineering
Publish Year: 1398
نوع سند: مقاله کنفرانسی
زبان: English
View: 440
This Paper With 7 Page And PDF Format Ready To Download
- Certificate
- من نویسنده این مقاله هستم
استخراج به نرم افزارهای پژوهشی:
شناسه ملی سند علمی:
GERMANCONF03_137
تاریخ نمایه سازی: 12 شهریور 1399
Abstract:
The Cloud computing, as an ascending technology, will change the world of information technology in the future. Unlike the traditional hosting service, cloud computing provides remote services to maintain data and applications. In spite of the rapid developments in the field, many challenges including security, data confidentiality, and privacy are still debate. Cryptographic algorithms play a vital role in information security systems. It is considered as a method of converting plain text into cipher text for data security against unauthorized access. Cryptographic as a service in the cloud computing environment provides a high level of security against unauthorized access. In this review, we intend to discuss Symmetric and Asymmetric Algorithms in terms of the security and confidentiality issue which are required to protect the data stored in the cloud.
Keywords:
Authors
Seyedeh Maryam Shahrokhi
Department of Electrical and Computer Engineering, Faculty of Khorramabad, Lorestan Branch, Technical and Vocational University (TVU), Lorestan, Iran