Achieving cloud security using third party auditor, MD5 and identity-based encryption

BP Gajendra, VK Singh - 2016 International Conference on …, 2016 - ieeexplore.ieee.org
In recent years, Cloud computing has enjoyed a tremendous rise in popularity. It provides
facilities for users to use cloud applications or platform without the need of any software …

Cloud storage security scheme using DNA computing with morse code and zigzag pattern

A Murugan, R Thilagavathy - 2017 IEEE International …, 2017 - ieeexplore.ieee.org
Storing and exchange of data in cloud computing become the necessity of modern working
pattern in IT industry. Cloud computing provides multitudinous benefits to both service …

RSA-CP-IDABE: a secure framework for multi-user and multi-owner cloud environment

S Chandel, G Yang, S Chakravarty - Information, 2020 - mdpi.com
Cloud has become one of the most widely used technologies to store data due to its
availability, flexibility, and low cost. At the same time, the security, integrity, and privacy of …

Secure data transference architecture for cloud computing using cryptography algorithms

M Khari, M Kumar - 2016 3rd International Conference on …, 2016 - ieeexplore.ieee.org
Cloud computing provides the massive potential for technological transformation in
traditional distributed network services. In general cloud computing services provide an …

[PDF][PDF] Securing cloud data using DNA and Morse code: A triple encryption scheme

A Murugan, R Thilagavathy - International Journal of Control …, 2017 - researchgate.net
Cloud computing offers utility-oriented IT services to users. Cloud computing provides us
cheaper, faster, flexible, efficient environment. Due to various advancements many …

[PDF][PDF] Triple Encryption Scheme with Parallel Zigzag Pattern for Cloud Data Storage Scheme

A Murugan, R Thilagavathy - International Journal of Applied …, 2018 - researchgate.net
Cloud computing provides customer the way to share resources and IT services that belong
to different organization and government. Cloud computing is an on-demand service model …

[PDF][PDF] Secure the Cloud Data Transmissionusing an Improved RSA Algorithm

R Thilagavathy, A Murugan - Indian Journal of Science and …, 2017 - researchgate.net
Objectives: To overcome the cloud data security challenges, a few recommendations have
been proposed along with RSA encryption algorithm. Methods: The RSA algorithm can be …

[PDF][PDF] Performance analysis of text and image steganography with RSA algorithm in cloud computing

IA Adamu, B Souley - International Journal of Software Engineering …, 2018 - academia.edu
Cloud computing provides a lot of shareable resources payable on demand to the users.
The drawback with cloud computing is the security challenges since the data in the cloud …

Comparison of Novel STE-AMM and EDES-ACM Frameworks with a Standard Cryptography Mechanism

H Rohil - Computational Intelligence in Analytics and Information … - taylorfrancis.com
One of the tremendous services that the cloud environment offers is data sharing and
storage. However, one of the prime concerns encountered in the cloud is security. It also …

[PDF][PDF] Authentication using unique identification number in cloud network using RSA algorithm

D Sarddar, M Biswas, P Sen, R Pandit - International Journal of Grid …, 2017 - academia.edu
Each country would like to make its websites secure. Now a days each countrymen use
internet moreover the cloud make it that much feasible. Every sensitive detail has been …