Analysis the Cloud Computing Algorithm with the Cryptography Based Identity Management
Enhancing Data Security in Cloud Computing
Keywords:
cloud computing, algorithm, cryptography, identity management, data-centric security, IT services, encryption algorithms, RSA encryption algorithm, Triple DES encryption algorithm, data storageAbstract
Cloud computing is an approach to convey IT services on request and pay per utilization, and it can stores gigantic measure of data. Clients just consider how to spare their very own touchy data from being taken and when they use encryption algorithms like RSA Encryption Algorithm or Triple DES Encryption Algorithm, time for encrypting or decrypting encrypted data is longer. RSA is a cryptography technique used to encrypt and decrypt data, RSA is a hilter kilter cryptographic algorithm, which means that companies must use two separate keys to encrypt data, one is a public key, and the other is a secret key. RSA is generally a moderate encryption algorithm. Interestingly, Data Centric Security (DCS) is a developing methodology that expects to give data proprietors full control of their data security from inside the data itself, all through the data's lifecycle on the cloud.Published
2018-01-01
How to Cite
[1]
“Analysis the Cloud Computing Algorithm with the Cryptography Based Identity Management: Enhancing Data Security in Cloud Computing”, JASRAE, vol. 14, no. 2, pp. 1356–1363, Jan. 2018, Accessed: Mar. 16, 2025. [Online]. Available: https://ignited.in/index.php/jasrae/article/view/7397
Issue
Section
Articles
How to Cite
[1]
“Analysis the Cloud Computing Algorithm with the Cryptography Based Identity Management: Enhancing Data Security in Cloud Computing”, JASRAE, vol. 14, no. 2, pp. 1356–1363, Jan. 2018, Accessed: Mar. 16, 2025. [Online]. Available: https://ignited.in/index.php/jasrae/article/view/7397