( ISSN 2277 - 9809 (online) ISSN 2348 - 9359 (Print) ) New DOI : 10.32804/IRJMSH

Impact Factor* - 6.2311


**Need Help in Content editing, Data Analysis.

Research Gateway

Adv For Editing Content

   No of Download : 24    Submit Your Rating     Cite This   Download        Certificate

COMPARISION BETWEEN PROPOSED APPROCH AND OTHER CRYPTOGRAPHICS ALGORITHM FOR CLOUD COMPUTING

    2 Author(s):  MUKESH KUMAR, PAWAN KUMAR

Vol -  13, Issue- 1 ,         Page(s) : 138 - 145  (2022 ) DOI : https://doi.org/10.32804/IRJMSH

Abstract

While cloud computing models are full of advantages compared to on-site models, they’re still susceptible to both inside and outside attacks. Therefore, cloud developers need to take security measures to protect their users’ sensitive data from cyber attacks. This paper is written for cloud developers and service providers who want to increase the security of their cloud service solutions. In this paper comparison between proposed approach and other algorithms has been done on the basis of throughput for different file sizes.

[1] Wei Ren, Linchen Yu, Ren Gao, Feng Xiong, "Lightweight and Compromise Resilient Storage Outsourcing with Distributed Secure Accessibility in Mobile Cloud Computing",Volume 16, Number 5, October 2011, 09llpp.520-528
 [2] Niroshinie Fernando , Seng W. Loke , Wenny Rahayu, “Mobile cloud computing: A survey” ScienceDirect- 2012.
 [3] Hoang T. Dinh, Chonho Lee, Dusit Niyato, and Ping Wang “A Survey of Mobile Cloud Computing: Architecture, Applications, and Approaches”, 2012.

*Contents are provided by Authors of articles. Please contact us if you having any query.






Bank Details