UGC Approved Journal no 63975(19)

ISSN: 2349-5162 | ESTD Year : 2014
Call for Paper
Volume 11 | Issue 4 | April 2024

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 6 Issue 2
February-2019
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIRAB06191


Registration ID:
197720

Page Number

1033-1039

Share This Article


Jetir RMS

Title

CRYPTOGRAPHIC ALGORITHMS ARE USED IN CLOUD COMPUTING FOR SECURITY: A STUDY

Abstract

Cloud computing is the technology for providing the computing services such as servers, storage, database, and networking etc over the internet on pay per use pattern. It is more popular in today’s era as it helps in cost reduction associated with computing. Although it is one of the most prominent technology for such kind of services, the limitation of the technology is the “Data Security and Integrity” in the environment. Cloud computing is one of the latest technology trend of the IT trade for business area. Cloud computing security converged into a demanding topic in the sector of information technology and computer science research programs. Regardless of the fact that cloud computing offers great advantages to the end users, there are several challenging issues that are mandatory to be addressed. It offers an on demand and scalable access to a shared pool of resources hosted in a data centre at providers’ site. The cloud computing is a way to deliver IT services on demand and pay per usage, and it can stores huge amount of data. But until now many companies don’t wish to use cloud computing technology due to concerns about data secrecy and protection. So we need cryptographic algorithms that can provide a highly secure communication, data integrity and authentication, along with the non-repudiation communication and data confidentiality. It reduces the overheads of up-front investments and financial risks for the end-user. In This paper discusses about symmetric key cryptographic algorithms DES,3DES,AES,RC and Asymmetric key cryptographic algorithms RSA,ECC,Diffie-Hellman,DSS.

Key Words

Cloud computing, confidentiality, cryptographic algorithms, data integrity, DES, AES, RSA, EC.

Cite This Article

"CRYPTOGRAPHIC ALGORITHMS ARE USED IN CLOUD COMPUTING FOR SECURITY: A STUDY", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.6, Issue 2, page no.1033-1039, February-2019, Available :http://www.jetir.org/papers/JETIRAB06191.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"CRYPTOGRAPHIC ALGORITHMS ARE USED IN CLOUD COMPUTING FOR SECURITY: A STUDY", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.6, Issue 2, page no. pp1033-1039, February-2019, Available at : http://www.jetir.org/papers/JETIRAB06191.pdf

Publication Details

Published Paper ID: JETIRAB06191
Registration ID: 197720
Published In: Volume 6 | Issue 2 | Year February-2019
DOI (Digital Object Identifier):
Page No: 1033-1039
Country: -, -, - .
Area: Engineering
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

0002902

Print This Page

Current Call For Paper

Jetir RMS