Efficient data security using hybrid cryptography on cloud computing
P Chinnasamy, S Padmavathi, R Swathy… - … : Proceedings of ICICCT …, 2021 - Springer
Services are distributed among all servers and between the users and individuals in the
cloud environment. Cloud providers have trouble guaranteeing file protection as security is …
cloud environment. Cloud providers have trouble guaranteeing file protection as security is …
A hybrid secure cloud platform maintenance based on improved attribute-based encryption strategies
In the modern era, Cloud Platforms are the most needed port to maintain documents
remotely with proper security norms. The concept of cloud environments is similar to the …
remotely with proper security norms. The concept of cloud environments is similar to the …
Security and detection mechanism in IoT-based cloud computing using hybrid approach
M Vashishtha, P Chouksey, DS Rajput… - … Journal of Internet …, 2021 - inderscienceonline.com
The combination of RSA and RC4 is accepted for the generation of key to get the superior
security method, on image, blowfish algorithm is applied. In this method, initially cloud …
security method, on image, blowfish algorithm is applied. In this method, initially cloud …
Encryption Techniques for Smart Systems Data Security Offloaded to the Cloud
With technological advancement, cloud computing paradigms are gaining massive
popularity in the ever-changing technological advancement. The main objective of the cloud …
popularity in the ever-changing technological advancement. The main objective of the cloud …
[PDF][PDF] Content sniffing attack detection in client and server side: A survey
BS Thakur, S Chaudhary - International Journal of Advanced Computer …, 2013 - Citeseer
In today's environment we cannot think about internet. It has the interface of client and
server. After analysing several research studies, we conclude that the communication …
server. After analysing several research studies, we conclude that the communication …
Data security in cloud architecture based on Diffie Hellman and elliptical curve cryptography
R Ganesan - Cryptology ePrint Archive, 2014 - eprint.iacr.org
Technological advancements in cloud computing due to increased connectivity and
exponentially proliferating data has resulted in migration towards cloud architecture. Cloud …
exponentially proliferating data has resulted in migration towards cloud architecture. Cloud …
Enhanced RSA algorithm with varying key sizes for data security in cloud
IG Amalarethinam, HM Leena - 2017 World Congress on …, 2017 - ieeexplore.ieee.org
Cloud Computing is a distributed and centralized network of inter connected and inter
related systems with one or more IT resources provisioned based on pay-on-demand usage …
related systems with one or more IT resources provisioned based on pay-on-demand usage …
Modified RSA cryptosystem based on offline storage and prime number
The most common public key algorithm is RSA cryptosystem used for encryption and
decryption. It is the first public key algorithm which provides security to transfer and saving of …
decryption. It is the first public key algorithm which provides security to transfer and saving of …
RETRACTED ARTICLE: Modified adaptive neuro fuzzy inference system based load balancing for virtual machine with security in cloud computing environment
In a heterogeneous environment, computation over internet is provided by a popular
paradigm called cloud computing. In a cloud heterogeneous environment, service providing …
paradigm called cloud computing. In a cloud heterogeneous environment, service providing …
Cloud computing: An emerging technology
D Xu - 2010 International Conference On Computer Design …, 2010 - ieeexplore.ieee.org
Cloud Computing is a novel buzzword in information technology domain. It's an emerging
technology and it has been give much attention by both research community and industries …
technology and it has been give much attention by both research community and industries …