2022 10th International Conference on Emerging Trends in Engineering and Technology - Signal and Information Processing (ICETET 2022
DOI: 10.1109/icetet-sip-2254415.2022.9791643
|View full text |Cite
|
Sign up to set email alerts
|

Survey of the Security Algorithms over Cloud Environment to Protect Information

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 18 publications
0
1
0
Order By: Relevance
“…The usage of cloud computing raises a number of security concerns, including data confidentiality and privacy [10,11], and 12]. The use of cryptographic algorithms has shown to be a viable and effective technique of ensuring the secrecy and privacy of cloud data [13][14][15][16], and [17].…”
Section: Introductionmentioning
confidence: 99%
“…The usage of cloud computing raises a number of security concerns, including data confidentiality and privacy [10,11], and 12]. The use of cryptographic algorithms has shown to be a viable and effective technique of ensuring the secrecy and privacy of cloud data [13][14][15][16], and [17].…”
Section: Introductionmentioning
confidence: 99%