Cloud security ecosystem for data security and privacy
A Arora, A Khanna, A Rastogi… - 2017 7th international …, 2017 - ieeexplore.ieee.org
In the past couple of years Cloud Computing has become an eminent part of the IT industry.
As a result of its economic benefits more and more people are heading towards Cloud …
As a result of its economic benefits more and more people are heading towards Cloud …
A simple and secured cryptography system of cloud computing
SMJ Islam, ZH Chaudhury… - 2019 IEEE Canadian …, 2019 - ieeexplore.ieee.org
Cloud computing is a vast growing technology in the IT industries. Cloud Service Providers
(CSP) are offering various suitable and flexible services to the users. Users of cloud …
(CSP) are offering various suitable and flexible services to the users. Users of cloud …
A new approach in multi cloud environment to improve data security
GP Kanna, V Vasudevan - 2017 International Conference on …, 2017 - ieeexplore.ieee.org
Cloud computing is a growing technology, provides way to access information and to share,
transmit huge content of raw data information such as text, various type of image and videos …
transmit huge content of raw data information such as text, various type of image and videos …
Secured Auto Encryption and Authentication Process for Cloud Computing Security
In the IT sector, cloud computing is a rapidly expanding technology. Users are being offered
more and more flexible and appropriate services by cloud service providers (CSP). Cloud …
more and more flexible and appropriate services by cloud service providers (CSP). Cloud …
Enhance data security in cloud computing with digital signature & hybrid cryptographic algorithm
P Jain, P Muskara, P Jain - 2021 International Conference on …, 2021 - ieeexplore.ieee.org
The proposed paper focuses on a hybrid cryptographic algorithm that aims to provide
integrity & confidentiality to our sensitive data. With the use of cryptographic algorithms and …
integrity & confidentiality to our sensitive data. With the use of cryptographic algorithms and …
On the use of financial valuation techniques in requirements engineering
M Ocieszak, K Wnuk, D Callele - 2018 1st International …, 2018 - ieeexplore.ieee.org
This paper investigates methods and techniques from finance for supporting value
estimation for features or requirements. We discuss the applicability and challenges …
estimation for features or requirements. We discuss the applicability and challenges …
[PDF][PDF] INFORMATION SECURITY AND PRIVACY IN CLOUD USING HYBRID CRYPTOGRAPHIC ALGORITHM
K PRIYA - ijeast.com
From couple of years Cloud storage is turning into a critical perspective in IT. Subsequently
numerous IT experts are prominent in utilizing Cloud in view of its various modern …
numerous IT experts are prominent in utilizing Cloud in view of its various modern …
[PDF][PDF] Research Article Elliptic Curve Diffie-Hellman Random Keys Using Artificial Neural Network and Genetic Algorithm for Secure Data over Private Cloud
O Alesawy, RC Muniyandi - 2016 - researchgate.net
Background: Achieving secure communication and safeguarding sensitive data from
unauthorized access over public networks are major concerns in cloud servers. Unique and …
unauthorized access over public networks are major concerns in cloud servers. Unique and …
[PDF][PDF] Password Security using Mutation Technique in Cloud Computing
A Magotra, A Srivastava, NS Heena - 2010 - bharatpublication.com
In the past few decades, Cloud computing is playing a significant role in the industry,
whether it's the IT sector, Health sector or supply chain management. As a result of its easy …
whether it's the IT sector, Health sector or supply chain management. As a result of its easy …