Hash Key Based Effective Algorithm for Security in Cloud Infrastructure

Provided by: International Journal on Computer Science and Technology (IJCST)
Topic: Cloud
Format: PDF
Cloud computing is one of the growing domain in which remote resources are used on demand basis without having the physical infrastructure at the client end. In cloud computing, the actual resources are installed and deployed at remote locations. These resources are accessed remotely with different network based protocols. Cloud computing technology is considered as a metaphor for Internet/Web based services in which there is the provision of computational resources on-demand and hides end-user knowledge of the physical location and configuration of server. This paper underlines assorted aspects of cloud technology and simulation including the implementation of secured dynamic key based algorithm in cloud infrastructure.

Find By Topic