UGC Approved Journal no 63975(19)

ISSN: 2349-5162 | ESTD Year : 2014
Call for Paper
Volume 11 | Issue 4 | April 2024

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 8 Issue 7
July-2021
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR2107762


Registration ID:
313252

Page Number

g231-g234

Share This Article


Jetir RMS

Title

Cloud Computing – Cryptography

Abstract

Cloud Cryptography is encryption that safeguards data stored within the cloud. Several measures are being placed within cloud cryptography which adds a strong layer of protection to secure data to avoid being breached, hacked or affected by malware. Any data hosted by cloud providers are secured with encryption, permitting users to access shared cloud services securely and conveniently. Cloud Cryptography secures sensitive data without delaying the delivery of information. Cryptography within the cloud employs coding techniques to secure information which will be used or hold on within the cloud. It permits users to handily and firmly access shared cloud services, as any information that's hosted by cloud suppliers is protected with coding. Cryptography within the cloud protects sensitive information while not delaying info exchange. Cryptography within the cloud permits for securing essential information on the far side your company IT atmosphere, wherever that information is not any longer beneath your management. Cryptography knowledgeable Ralph sociologist Poore explains that “information in motion and knowledge at rest square measure best protected by cryptanalytic security measures. within the cloud, we have a tendency to don’t have the posh of getting actual, physical management over the storage of knowledge, that the solely manner we will make sure that the data is protected is for it to be hold on cryptographically, with USA maintaining management of the cryptanalytic key.”

Key Words

Ciphertext, Cloud Provider, Cryptography, Encryption, Decryption, MitM

Cite This Article

"Cloud Computing – Cryptography", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.8, Issue 7, page no.g231-g234, July-2021, Available :http://www.jetir.org/papers/JETIR2107762.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"Cloud Computing – Cryptography", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.8, Issue 7, page no. ppg231-g234, July-2021, Available at : http://www.jetir.org/papers/JETIR2107762.pdf

Publication Details

Published Paper ID: JETIR2107762
Registration ID: 313252
Published In: Volume 8 | Issue 7 | Year July-2021
DOI (Digital Object Identifier):
Page No: g231-g234
Country: Sangali, Maharatra, India .
Area: Science & Technology
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

0001795

Print This Page

Current Call For Paper

Jetir RMS