Protection for Cloud Computing Using Level-Based Cryptography

Download Now
Provided by: International Journal of Computing Science and Information Technology (IJCSIT)
Topic: Cloud
Format: PDF
Cloud computing is a recently developed new technology for complex systems with massive-scale services sharing among numerous users. Today most cloud computing system use asymmetric and traditional public key cryptography to provide data security and mutual authentication. Cloud computing providers have setup several data centers at different geographical locations over the internet in order to optimally serve needs of their customers around the world. Level-based cryptography has some attraction characteristics that seem to fit well the requirements of cloud computing.
Download Now

Find By Topic