Hybrid cryptography algorithms in cloud computing: A review

SA Ahmad, AB Garko - 2019 15th International conference on …, 2019 - ieeexplore.ieee.org
it's observed that most people and firms are migrating to the cloud, because the cloud is
much cheaper and convenient. For some computer owners, finding enough storage space to …

[PDF][PDF] A review on recent steganography techniques in cloud computing

OM Ahmed, WM Abduallah - Academic Journal of Nawroz …, 2017 - researchgate.net
As with the growth of information on the cloud, cloud security is seen as more essential than
before. Presently, millions of users are utilizing the cloud. The security of cloud computing is …

A group-key-based sensitive attribute protection in cloud storage using modified random Fibonacci cryptography

M Sumathi, S Sangeetha - Complex & Intelligent Systems, 2021 - Springer
Cloud computing is an eminent technology for providing a data storage facility with efficient
storage, maintenance, management and remote backups. Hence, user data are shifted from …

[PDF][PDF] Encryption and tokenization-based system for credit card information security

GB Iwasokun, TG Omomule… - International Journal of …, 2018 - researchgate.net
Existing methods for promoting credit card information security have exhibited
confidentiality, privacy and integrity failures. In most cases, sensitive and classified data or …

Cloud data security and various security algorithms

K Tyagi, SK Yadav, M Singh - Journal of Physics: Conference …, 2021 - iopscience.iop.org
The term Cloud computing is a most trending and promisingtechnology. It is the most basic
need for many organizations. Cloud technology has many advantages as user can access …

[PDF][PDF] A light weight encryption over big data in information stockpiling on cloud

U Narayanan, V Paul, S Joseph - Indonesian Journal of …, 2020 - pdfs.semanticscholar.org
Data is growing exponentially in the fast Changing World of Information and
Communications Technology. Information from sensors, cell phones, social networking sites …

[PDF][PDF] A review on cloud computing security

OI Omotosho - International Journal of Computer Science and Mobile …, 2019 - academia.edu
Cloud computing is commonly used to represent any work done on a computer, mobile or
any device, where the data and possibly the application being used do not reside on the …

[PDF][PDF] Security in cloud computing using hybrid of algorithms

J Kaur, DS Garg - … Journal of Engineering Research and General …, 2015 - pnrsolution.org
Cloud Computing is a fast evolving technology in the field of IT industry. It is well known for
its on demand service to the users remotely over Internet. It provides the users with the …

[PDF][PDF] Using steganography for secure data storage in cloud computing

WA Awadh, AS Hashim - International Research Journal of …, 2017 - academia.edu
Cloud computing is one of the popular method of accessing shared and dynamically
configurable resources via the computer network on demand. The secure data storage on …

[PDF][PDF] An advanced security analysis by using blowfish algorithm

R Vasantha, RS Prasad - International Journal of Scientific …, 2017 - researchgate.net
Cloud computing give off an impression of being an extremely prominent and intriguing
processing innovation. Each third individual is utilizing distributed computing …