2019
DOI: 10.51983/ajcst-2019.8.1.2118
|View full text |Cite
|
Sign up to set email alerts
|

Comparative Analysis of Hash Authentication Algorithms and ECC Based Security Algorithms in Cloud Data

Abstract: Cloud computing is ensuring the security of stored data in cloud computing servers is one of the mainly demanding issues. In Cloud numerous security issues arises such as authentication, integrity and confidentiality. Different encryption techniques attempt to overcome these data security issues to an enormous extent. Hashing algorithm plays an important role in data integrity, message authentication, and digital signature in modern information security. For security purpose using encryption algorithm like ECC… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
references
References 7 publications
0
0
0
Order By: Relevance