Velmurugan et al., 2020 - Google Patents
Security based approach of SHA 384 and SHA 512 algorithms in cloud environmentVelmurugan et al., 2020
View PDF- Document ID
- 14727253856148814152
- Author
- Velmurugan T
- Karthiga S
- Publication year
- Publication venue
- J Comput Sci
External Links
Snippet
Cloud computing is going to be the next big thing in the era of internet world. As the world moves ahead towards enhancement of the cloud features we also have to take a serious consideration of the enhancing cloud securities to protect the end-user's data. The major …
- 230000002708 enhancing 0 abstract description 6
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Kumar et al. | TPA auditing to enhance the privacy and security in cloud systems | |
Manthiramoorthy et al. | Comparing several encrypted cloud storage platforms | |
Agarwal et al. | A survey on cloud computing security issues and cryptographic techniques | |
Ahamed et al. | Cloud computing: Security and reliability issues | |
US20240205249A1 (en) | Protection of cloud storage devices from anomalous encryption operations | |
Shajan et al. | Survey of security threats and countermeasures in cloud computing | |
Athena et al. | Survey on public key cryptography scheme for securing data in cloud computing | |
Bakro et al. | Hybrid blockchain-enabled security in cloud storage infrastructure using ECC and AES algorithms | |
Velmurugan et al. | Security based approach of SHA 384 and SHA 512 algorithms in cloud environment | |
Kumar et al. | A survey on cloud computing security threats, attacks and countermeasures: A review | |
Shirgaonkar et al. | Cloud computing security using cryptographic algorithms | |
Sangui et al. | Cloud Security Using Honeypot Network and Blockchain: A Review | |
Chinedu et al. | Security of cloud virtualized resource on a SaaS encryption solution | |
Baban et al. | Securing a Web-Based Hospital Management System Using a Combination of AES and HMAC. | |
Bhagawat et al. | Survey on data security issues in cloud environment | |
Faizi et al. | Secured Cloud for Enterprise Computing. | |
Reddy et al. | A systematic approach towards security concerns in cloud | |
Wanjale et al. | Security of sensitive data in cloud computing | |
Naseem et al. | An Analysis of Different Security Models and the Obstacles of Ensuring Security and Privacy while Storing Data on the Cloud | |
Naje et al. | Addressing Cloud Security Challenges through Blockchain Technology | |
Rao et al. | A novel third party integrity checker (TPIC) based data auditing for security of the dynamic streaming client data in a cloud infrastructure | |
Charanarur et al. | A taxonomical review on cloud security and its solutions | |
Arora et al. | Mathematical foundations of data security in cloud environment | |
Chikezie et al. | Mitigating Malicious Software Threat in Cloud Computing Models Using-Multi-Factor-Authentication-in-Cloud-Computing | |
Harwood | Locking up passwords–for good |