Loading

Crypto Cloud Computing with Symmetric and Asymmetric Cryptography for Information Security and Storage
Veerapaneni Esther Jyothi1, M. Prasanna Lakshmi2, R.Rama Krishna3

1Veerapaneni Esther Jyothi*, Department of Computer Applications, V.R.Siddhartha Engineering College, Vijayawada, India.
2M.Prasanna Lakshmi,, Department of Computer Applications, V.R.Siddhartha Engineering College, Vijayawada, India.
3R.Rama Krishna, Department of Computer Applications, V.R.Siddhartha Engineering College, Vijayawada, India.
Manuscript received on January 02, 2020. | Revised Manuscript received on January 15, 2020. | Manuscript published on January 30, 2020. | PP: 231-235 | Volume-8 Issue-5, January 2020. | Retrieval Number: D4387118419/2020©BEIESP | DOI: 10.35940/ijrte.D4387.018520

Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The resources and the services that the cloud provides are attractive for the users and are distinct from one cloud provider to another. The concerning aspect is how much securely our data stored in cloud is and how the data is protected against attacks. Various encryption algorithms or techniques of cryptography are used to protect data against attacks and also provides authenticity and confidentiality of data I an online and offline environment. Therefore in this paper various cryptographic aspects are covered, predominantly compares different algorithms with suggested solutions and results including cloud data protection. Authentication of data, confidentiality of data and data integrity aspects are the primary factors that have to be addressed in today’s social networking and in the distributed environments. Cryptography and crypto cloud computing plays major role in secure transfer and storage of information.
Keywords: Algorithms, Authentication, Crypto cloud computing, Cryptography.
Scope of the Article: Authentication, Authorization, Accounting.