Cloud computing security using encryption technique.
Geethu ThomasPrem Jose VP. AfsarPublished in: CoRR (2013)
Keyphrases
- cloud computing
- cloud storage
- security issues
- cloud computing environment
- data privacy
- network access
- encryption scheme
- identity management
- distributed computing
- data management
- key management
- cloud services
- trusted computing
- big data
- computing resources
- encryption algorithm
- data center
- security mechanisms
- business models
- computing infrastructure
- service providers
- computing technologies
- cloud computing platform
- security analysis
- ciphertext
- access control
- computing platform
- information security
- databases
- database
- standard model
- security requirements
- limited resources
- data sharing
- load balancing
- data mining