Corpus ID: 17745402

Cryptographic Techniques , Threats and Privacy Challenges in Cloud Computing

@inproceedings{George2015CryptographicT,
  title={Cryptographic Techniques , Threats and Privacy Challenges in Cloud Computing},
  author={J. George and Dr. M. Hemalatha},
  year={2015}
}
Cryptography is essential for the security and integrity of the data that is stored in the cloud. Several cryptographic techniques are used to protect the integrity of data for various applications. A particular security method makes use of different cryptographic techniques to encrypt data and make it into an un-readable form, which can then be decrypted only with the help of a key. A number of cryptographic techniques are available for use in protection of data in various applications… CONTINUE READING

Tables from this paper

References

SHOWING 1-10 OF 23 REFERENCES
Designing of Cryptography Based Security System for Cloud Computing
  • N. Sengupta, J. Holmes
  • Computer Science
  • 2013 International Conference on Cloud & Ubiquitous Computing & Emerging Technologies
  • 2013
  • 15
Randomness testing of modern encryption techniques in cloud environment
  • 28
Enhancing Data Security and Storage in Cloud Computing Environment
  • 6
  • PDF
Cloud Computing Security--Trends and Research Directions
  • 158
  • PDF
Cryptography Challenges for Computational Privacyin Public Clouds
  • Sashank Dara
  • Computer Science
  • 2013 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)
  • 2013
  • 8
  • PDF
Enhancing Cloud Computing Security using AES Algorithm
  • 62
  • PDF
Classification of Security Issues and Solutions in Cloud Environments
  • 13
Security Concerns in Cloud Computing
  • 61
A Quantitative Analysis of Current Security Concerns and Solutions for Cloud Computing
  • 278
  • PDF
Comparative study of attribute based encryption techniques in cloud computing
  • 11