A survey on different encryption schemes in the cloud computing

Publish Year: 1392
نوع سند: مقاله کنفرانسی
زبان: English
View: 1,346

This Paper With 5 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

BPJ01_316

تاریخ نمایه سازی: 29 دی 1392

Abstract:

Cloud computing is one of the emerging technologies that is being used widely on these days. Internet technology is growing more and more quickly, and people can process, store, or share their data by using its ability. Recently, the cloud has emerged to provide various application services to satisfy users' requirement As the data is shared over the network and storing data in the cloud causes serious concern over data confidentiality. There are many encryption and re_encryption schemes that provide security concerns such as confidentiality, integrity, and availalability and access control in clouds. This paper presents a survey on various encryption methods that provide security, confidentiality, scalable and flexible fine grained access control.

Authors

Faramarz Safi Isfahani

Faculty of Computer Islamic Azad University,Najafabad Branch (IAUN); Najafabad, Esfahan, Iran

Somaye Hosseini

Islamic Azad University,Najafabad Branch (IAUN); Najafabad, Esfahan, Iran