dc.contributor.author |
Tiwari, Jyoti Gangesh |
|
dc.contributor.author |
Chavan, Gayatri Sanjay |
|
dc.date.accessioned |
2021-10-01T09:21:06Z |
|
dc.date.available |
2021-10-01T09:21:06Z |
|
dc.date.issued |
2020-09 |
|
dc.identifier.issn |
2278-1021(Offline) |
|
dc.identifier.issn |
2319-5940(Print) |
|
dc.identifier.uri |
http://27.109.7.66:8080/xmlui/handle/123456789/708 |
|
dc.description |
International Journal of Advanced Research in Computer and Communication Engineering
Vol. 9, Issue 9, September 2020, P. 106-109 |
en_US |
dc.description.abstract |
During this paper we have a tendency to square measure reaching to discuss concerning completely different
technologies that square measure employed in cryptography technique, Cloud Cryptography is one amongst the vital
facet within the world of knowledge security. It includes completely different encoding and secret writing techniques that
square measure want to keep our Data safe and secure on cloud. In Cloud Cryptography we have a tendency to use public
and personal keys for Encrypting and Decrypting Data to keep up the integrity of knowledge. The quality with that cloud
computing manages Data secrecy, and data security makes the market hesitant concerning cloud computing thus, during
this paper we are going to discuss this parameter conjointly to clear the professionals of the cloud cryptography. |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
International Journal of Advanced Research in Computer and Communication Engineering |
en_US |
dc.subject |
Cloud Security |
en_US |
dc.subject |
cryptographic algorithm |
en_US |
dc.subject |
security infrastructure |
en_US |
dc.subject |
Hybrid cloud |
en_US |
dc.title |
Literature survey on cloud cryptography for data security |
en_US |
dc.type |
Article |
en_US |