A survey on different encryption schemes in the cloud computing
Publish place: First National Conference on Advances in computer science and information retrieval approaches
Publish Year: 1392
نوع سند: مقاله کنفرانسی
زبان: English
View: 1,346
This Paper With 5 Page And PDF Format Ready To Download
- Certificate
- من نویسنده این مقاله هستم
استخراج به نرم افزارهای پژوهشی:
شناسه ملی سند علمی:
BPJ01_316
تاریخ نمایه سازی: 29 دی 1392
Abstract:
Cloud computing is one of the emerging technologies that is being used widely on these days. Internet technology is growing more and more quickly, and people can process, store, or share their data by using its ability. Recently, the cloud has emerged to provide various application services to satisfy users' requirement As the data is shared over the network and storing data in the cloud causes serious concern over data confidentiality. There are many encryption and re_encryption schemes that provide security concerns such as confidentiality, integrity, and availalability and access control in clouds. This paper presents a survey on various encryption methods that provide security, confidentiality, scalable and flexible fine grained access control.
Keywords:
Authors
Faramarz Safi Isfahani
Faculty of Computer Islamic Azad University,Najafabad Branch (IAUN); Najafabad, Esfahan, Iran
Somaye Hosseini
Islamic Azad University,Najafabad Branch (IAUN); Najafabad, Esfahan, Iran