A Performance-Based Comparative Encryption and Decryption Technique for Image and Video for Mobile Computing
RB Alothman, II Saada, BSB Al-Brge - Journal of Cases on …, 2022 - igi-global.com
When data exchange advances through the electronic system, the need for information
security has become a must. Protection of images and videos is important in today's visual …
security has become a must. Protection of images and videos is important in today's visual …
Privacy preserving in TPA for secure cloud by using encryption technique
With all data services of cloud, it's not only stored the data, although shared the data among
the multiple users or clients, which make doubt in its integrity due to the existence of …
the multiple users or clients, which make doubt in its integrity due to the existence of …
[PDF][PDF] A Comprehensive Survey on Storage Techniques in Cloud Computing
AS Choure, SM Bansode - International Journal of Computer Applications, 2015 - Citeseer
It has been great development in cloud computing since past few years. It offers different
kinds of services for example Software as a Service (SaaS), Platform as a Service (PaaS) …
kinds of services for example Software as a Service (SaaS), Platform as a Service (PaaS) …
[PDF][PDF] A review on cloud storage security
AK GULSHAN - International journal of innovation in engineering … - researchgate.net
The security in cloud computing is an important concern. Suppose there is an important
confidential data and needed to be store on any cloud database. So firstly, the bigger …
confidential data and needed to be store on any cloud database. So firstly, the bigger …
[PDF][PDF] An Auditing Protocol for Protected Data Storage in Cloud Computing
A Sharma, EM Katoch - academia.edu
Cloud computing is a mechanism which provides us resources, information as per user
requirement by the help of internet. Cloud is used to store important content material for a …
requirement by the help of internet. Cloud is used to store important content material for a …
[ОПИСАНИЕ][C] A Review on Auditing Protocol for Secure Data Storage in Cloud Computing
A Sharma, EM Katoch