Comparative Study on Various Security Algorithms in Cloud Computing
Cloud computing is a model for enabling, convenient, network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction. It is often provided "as a service" over the Internet, remote access server typically in the form of infrastructure as a service (IaaS), platform as a service (PaaS), or software as a service (SaaS). This paper deals with a brief study about various security algorithms, security issues and security attacks in cloud computing.
Cite this Article:
Santhisri K, Lakshmi PRSM. Comparative Study on Various Security Algorithms in Cloud Computing. Recent Trends in Programming Languages. 2015 2(1): 1–6p.
Priyanka Arora, Arun Singh, Himanshu Tyagi. Analysis of Performance by Using Security Algorithm on Cloud Network. International Conference on Emerging Trends in Engineering and Management (ICETM2012), 23–24 jun 2012.
Mamoon Yunus. "Swamp Computing" a.k.a. Cloud computing. Web Security Journal. 2009-12-28. Retrieved 2010-01-25.
Philip Wik. Thunderclouds: Managing SOA-Cloud Risk. Service Technology Magazine. 2011–10. Retrieved 2011-21-21.
Winkler Vic. Cloud Computing: Virtual Cloud Security Concerns. Technet Magazine, Microsoft. Retrieved 12 Feb 2012.
Hickey Kathleen. Dark Cloud: Study Finds Security Risks In Virtualization. Government Security News. Retrieved 12 Feb 2012.
Padmapriya A, Subhasri P. Cloud Computing: Security Challenges & Encryption Practices. International Journal of Advanced Research in Computer Science and Software Engineering. Mar 2013; 3(3).
Security Analysis of Cloud Computing. (http://cloudcomputing.sys-con.com/node/1330353).
Bhavna Makhija, VinitKumar Gupta, Indrajit Rajput “Enhanced Data Security in Cloud Computing with Third Party Auditor”. International Journal of Advanced Research in Computer Science and Software Engineering. Feb 2013; 3(2).
Jay Singh, Brajesh Kumar, Asha Khatri. Securing Storage Data in Cloud Using RC5 Algorithm. International Journal of Advanced Computer Research. Dec 2012; 2(4).
Arsi Kalpana, Sudha Singaraju. Data Security in Cloud Computing using RSA Algoritham. IJRCCT. 2012; 1(4). http://www.mytestbox.com/miscellaneous/cloud computing-grid-computing-utility-computing-list-top- providers/
Abhishek Mohta, Ravi Kant Sahu, LK Awasthi. Robust Data Security for Cloud while using Third Party Auditor. International Journal of Advanced Research in Computer Science and Software Engineering. Feb 2012; 2(2).
Neha Jain, Gurpreet Kaur. Implementing DES Algorithm in Cloud for Data Security. VSRD-IJCSIT. 2012; 2(4): 31p.
- There are currently no refbacks.