[go: up one dir, main page]

Velmurugan et al., 2020 - Google Patents

Security based approach of SHA 384 and SHA 512 algorithms in cloud environment

Velmurugan et al., 2020

View PDF
Document ID
14727253856148814152
Author
Velmurugan T
Karthiga S
Publication year
Publication venue
J Comput Sci

External Links

Snippet

Cloud computing is going to be the next big thing in the era of internet world. As the world moves ahead towards enhancement of the cloud features we also have to take a serious consideration of the enhancing cloud securities to protect the end-user's data. The major …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis

Similar Documents

Publication Publication Date Title
Kumar et al. TPA auditing to enhance the privacy and security in cloud systems
Manthiramoorthy et al. Comparing several encrypted cloud storage platforms
Agarwal et al. A survey on cloud computing security issues and cryptographic techniques
Ahamed et al. Cloud computing: Security and reliability issues
US20240205249A1 (en) Protection of cloud storage devices from anomalous encryption operations
Shajan et al. Survey of security threats and countermeasures in cloud computing
Athena et al. Survey on public key cryptography scheme for securing data in cloud computing
Bakro et al. Hybrid blockchain-enabled security in cloud storage infrastructure using ECC and AES algorithms
Velmurugan et al. Security based approach of SHA 384 and SHA 512 algorithms in cloud environment
Kumar et al. A survey on cloud computing security threats, attacks and countermeasures: A review
Shirgaonkar et al. Cloud computing security using cryptographic algorithms
Sangui et al. Cloud Security Using Honeypot Network and Blockchain: A Review
Chinedu et al. Security of cloud virtualized resource on a SaaS encryption solution
Baban et al. Securing a Web-Based Hospital Management System Using a Combination of AES and HMAC.
Bhagawat et al. Survey on data security issues in cloud environment
Faizi et al. Secured Cloud for Enterprise Computing.
Reddy et al. A systematic approach towards security concerns in cloud
Wanjale et al. Security of sensitive data in cloud computing
Naseem et al. An Analysis of Different Security Models and the Obstacles of Ensuring Security and Privacy while Storing Data on the Cloud
Naje et al. Addressing Cloud Security Challenges through Blockchain Technology
Rao et al. A novel third party integrity checker (TPIC) based data auditing for security of the dynamic streaming client data in a cloud infrastructure
Charanarur et al. A taxonomical review on cloud security and its solutions
Arora et al. Mathematical foundations of data security in cloud environment
Chikezie et al. Mitigating Malicious Software Threat in Cloud Computing Models Using-Multi-Factor-Authentication-in-Cloud-Computing
Harwood Locking up passwords–for good