Abstract

This paper aims to present the survey of cloud computing security. A cloud computing security is defined so that it can help to clarify cloud security. Cloud computing has evolved to become an essential component of both current and future information technologies. This technology was created to be used in conjunction with the internet, and it includes features such as data storage, remote access, and so on. Various cryptographic encryption algorithms are compared in terms of their various key features. The primary goal is to highlight such attacks and provide recommendations for resolving data breaching issues using cryptographic algorithms such as Symmetric Key Cryptographic Algorithms (DES, 3DES, AES), Asymmetric Key Cryptographic Algorithms (RSA, DSA, Diffie-Hellman Algorithm), and Hashing Algorithms (MD5, SHA). So, in the paper cloud security challenges and the cryptographic algorithms used to prevent them are discussed.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call