Cloud Security with Encryption Using Hybrid Algorithm and Secured Endpoints

Download Now
Provided by: International Journal of Computer Science and Information Technologies
Topic: Cloud
Format: PDF
Cloud providers generally states that they are not responsible for the security that means leakage of the subscribed data or unauthorized modification of the data to make secure key for the purpose of securing cloud for transactions. It would have a private cloud for highly secure transactions and it would use a public cloud for upper layer of its application. To enhance security in the cloud is a very important task. In this paper, the authors have proposed an encryption technique called hybrid algorithm in order to provide privacy in the cloud.
Download Now

Find By Topic