Comparison of Various Encryption Algorithms for Data Security in the Cloud Computing
محل انتشار: سومین کنگره بین المللی علوم و مهندسی
سال انتشار: 1398
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 461
فایل این مقاله در 7 صفحه با فرمت PDF قابل دریافت می باشد
- صدور گواهی نمایه سازی
- من نویسنده این مقاله هستم
استخراج به نرم افزارهای پژوهشی:
شناسه ملی سند علمی:
GERMANCONF03_137
تاریخ نمایه سازی: 12 شهریور 1399
چکیده مقاله:
The Cloud computing, as an ascending technology, will change the world of information technology in the future. Unlike the traditional hosting service, cloud computing provides remote services to maintain data and applications. In spite of the rapid developments in the field, many challenges including security, data confidentiality, and privacy are still debate. Cryptographic algorithms play a vital role in information security systems. It is considered as a method of converting plain text into cipher text for data security against unauthorized access. Cryptographic as a service in the cloud computing environment provides a high level of security against unauthorized access. In this review, we intend to discuss Symmetric and Asymmetric Algorithms in terms of the security and confidentiality issue which are required to protect the data stored in the cloud.
کلیدواژه ها:
نویسندگان
Seyedeh Maryam Shahrokhi
Department of Electrical and Computer Engineering, Faculty of Khorramabad, Lorestan Branch, Technical and Vocational University (TVU), Lorestan, Iran