2021
DOI: 10.18495/comengapp.v10i1.354
|View full text |Cite
|
Sign up to set email alerts
|

A Computer Security System for Cloud Computing Based on Encryption Technique

Abstract: In recent years, progressively data proprietors have embraced cloud storage service, by which they will subcontract their data to the cloud server to significantly reduce the local storage overhead, due to the rapid growth in the cloud computing market and development. Cloud computing is the delivery of hosting services that are provided to clients over the web. It is quite common, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, appli… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 13 publications
0
4
0
Order By: Relevance
“…Any attempt to alter the data would require changing every hash ID, which is just not doable. Thus, Blockchain system offers security via cryptographic encryption algorithms [19][20][21].…”
Section: E Securitymentioning
confidence: 99%
“…Any attempt to alter the data would require changing every hash ID, which is just not doable. Thus, Blockchain system offers security via cryptographic encryption algorithms [19][20][21].…”
Section: E Securitymentioning
confidence: 99%
“…Public and private sectors have become more aware of cloud computing (CC) because of the highly regarded joint networks linking individuals and organizations across the globe (Neicu et al, 2020). CC delivers a state-of-the-art industrial framework for the on-demand, prevalent, and convenient entree to the virtual and allocated means like services, networks, applications, storage, and servers (Daniel and Momoh, 2021). CC service technology encompasses (i) Infrastructure as a Service with computing and storage as its emphasis, (ii) Software as a Service with software application as its core; and (iii) Platform as a Service, which supplies the devices to build and accommodate web applications (Tsai, 2021).…”
Section: Introductionmentioning
confidence: 99%
“…14 Many cryptographic techniques have already been used in real-world situations. 15 Because of their processing complexity, classic encryption methods cannot keep up with the increasing demands of modern smart applications, particularly those involving many limitedresource devices. 16 A private cloud is hosted either internally or externally by a single organization.…”
Section: Introduction Of the Private Cloud Platformmentioning
confidence: 99%
“…Cryptographic techniques are the most often utilized to protect user privacy in cloud computing 14 . Many cryptographic techniques have already been used in real-world situations 15 . Because of their processing complexity, classic encryption methods cannot keep up with the increasing demands of modern smart applications, particularly those involving many limited-resource devices 16 .…”
Section: Introduction Of the Private Cloud Platformmentioning
confidence: 99%