Santhisri et al., 2015 - Google Patents
Comparative study on various security algorithms in cloud computingSanthisri et al., 2015
View PDF- Document ID
- 9570838361425117710
- Author
- Santhisri K
- Lakshmi P
- Publication year
- Publication venue
- Recent Trends in Programming Languages
External Links
Snippet
Cloud computing is a model for enabling, convenient, network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction. It is often provided" as a service" …
- 230000000052 comparative effect 0 title description 3
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11604901B2 (en) | Systems and methods for using extended hardware security modules | |
Sugumaran et al. | An architecture for data security in cloud computing | |
Agarwal et al. | A survey on cloud computing security issues and cryptographic techniques | |
Kulkarni et al. | Security frameworks for mobile cloud computing: A survey | |
Khan et al. | SSM: Secure-Split-Merge data distribution in cloud infrastructure | |
Azougaghe et al. | An efficient algorithm for data security in cloud storage | |
Michalas | Sharing in the rain: Secure and efficient data sharing for the cloud | |
Soofi et al. | Security issues in SaaS delivery model of cloud computing | |
Junghanns et al. | Engineering of secure multi-cloud storage | |
Santhisri et al. | Comparative study on various security algorithms in cloud computing | |
Castiglione et al. | A secure file sharing service for distributed computing environments | |
Jayalekshmi et al. | A study of data storage security issues in cloud computing | |
Patil et al. | Towards secure and dependable storage services in cloud computing | |
Dey et al. | Security and privacy issues in mobile cloud computing | |
Guha et al. | Review of information authentication in mobile cloud over SaaS & PaaS layers | |
Khan et al. | Hybrid cryptography for cloud computing | |
Idrissi et al. | Security of mobile agent platforms using access control and cryptography | |
Bobde et al. | An approach for securing data on Cloud using data slicing and cryptography | |
Kopacz et al. | Cloud Computing Security and Future | |
Tamilselvi | Data storage security in cloud computing using AES | |
Ngo | Cloud Security: Private Cloud Solution with End-to-end Encryption | |
Banerjee et al. | A nobel cryptosystem for group data sharing in cloud storage | |
Siopi et al. | DeCStor: A Framework for Privately and Securely Sharing Files Using a Public Blockchain | |
Balamurugan et al. | An enhanced security framework for a cloud application | |
Mohammadi | Considerations on models, algorithms and security challenges in cloud computing |