UGC Approved Journal no 63975(19)

ISSN: 2349-5162 | ESTD Year : 2014
Call for Paper
Volume 11 | Issue 3 | March 2024

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 4 Issue 12
December-2017
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR1712243


Registration ID:
516705

Page Number

452-458

Share This Article


Jetir RMS

Title

CLOUD COMPUTING USING FOR VARIOUS CRYPTOGRAPHIC ALGORITHM

Authors

Abstract

Cloud computing is the delivery of computing services over the web instead of keeping files on a proprietary disk drive or local memory device. Computing services can include servers, storage, databases, networking, and software. The main reason and great advantage for using the cloud are that the user can store and access the stored data in the cloud from anywhere anytime and getting all its services for a low cost. Despite, Security has always been a big concern with cloud computing because the customer does not directly maintain the information stored in the cloud. Cloud Computing Environment (CCE) provides several deployment models to represent several categories of cloud owned by organization or institutes. However, CCE provide resources to Cloud Users through several services like PaaS, SaaS, IaaS. Cloud Computing is a notion based on the concept of summing up physical resources and displaying them as an unacknowledged resource. It is a model for producing resources, for sorting out applications, and for manifesto-independent user access to services. Cloud can come in different types, and the services and the applications that possibly run on clouds may or may not be provided by a cloud service provider. There are two unique group of models namely deployment models and service models. Service models consists of IaaS , SaaS, PaaS . The Deployment or deployment model consists of Public Cloud, Private Cloud, Hybrid Cloud, Community Cloud, Cloud Computing has lots of distinct properties that make it very important. privacy seems to be anunique concern in cloud Various types of service models under cloud computing facilitate various levels of privacy services. We will get the minimum security in IaaS (Infrastructure as a Service) and most with a SaaS provider. In this paper, we will focus upon the reviewing and understanding cloud security issues by proposing crypto algorithms and effective measures so as to ensure the data security in cloud.

Key Words

CLOUD COMPUTING USING FOR VARIOUS CRYPTOGRAPHIC ALGORITHM

Cite This Article

"CLOUD COMPUTING USING FOR VARIOUS CRYPTOGRAPHIC ALGORITHM", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.4, Issue 12, page no.452-458, December-2017, Available :http://www.jetir.org/papers/JETIR1712243.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"CLOUD COMPUTING USING FOR VARIOUS CRYPTOGRAPHIC ALGORITHM", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.4, Issue 12, page no. pp452-458, December-2017, Available at : http://www.jetir.org/papers/JETIR1712243.pdf

Publication Details

Published Paper ID: JETIR1712243
Registration ID: 516705
Published In: Volume 4 | Issue 12 | Year December-2017
DOI (Digital Object Identifier):
Page No: 452-458
Country: -, -, India .
Area: Engineering
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

000129

Print This Page

Current Call For Paper

Jetir RMS