2019
DOI: 10.1007/978-3-030-24322-7_29
|View full text |Cite
|
Sign up to set email alerts
|

Sensitive Information Security in Network as a Service Model in Cloud-IPSec

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 7 publications
0
4
0
Order By: Relevance
“…In cloud computing readying, knowledge centers area unit sometimes closely-held by cloud service suppliers [16]. However, fog service suppliers will be totally completely different parties.…”
Section: A Authentication By Trustmentioning
confidence: 99%
See 1 more Smart Citation
“…In cloud computing readying, knowledge centers area unit sometimes closely-held by cloud service suppliers [16]. However, fog service suppliers will be totally completely different parties.…”
Section: A Authentication By Trustmentioning
confidence: 99%
“…Data Search: Retrieving data for privacy, end-user knowledge must be encrypted before being sent to the cloud [16]. This challenges the use of educational economy services.…”
Section: Dmentioning
confidence: 99%
“…B. Harikrishna et al When sensitive information is stored in the public domain, problems arise when consumers leave the environment altogether because they are not sure that the information is on the cloud [10]. Different encoding techniques such as AES, DES and RSA in the name of various statistics as required in memory and computer time [9]. AES requires less time to be evaluated without RSA and DSA.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Data security has become a major problem in the field of cloud ecosystems because data is available in various parts of the world to access the Internet for free as it progresses. The global security record for mid-2018, with a cloud data migration of approximately 86.67%, a global analyst estimates that this range can be 100% [8,9]. Change the data of two or more people, so that unauthorized people can access real data.…”
mentioning
confidence: 99%