This paper is published in Volume-2, Issue-5, 2016
Area
Cloud Computing
Author
Anuradha, Dr. Suman Sangwan
Org/Univ
DCRUST, Murthal, Sonepat, India
Keywords
Data Encryption, cloud computing, Encryption algorithms, security.
Citations
IEEE
Anuradha, Dr. Suman Sangwan. Implementing Multiple Security in the Cloud Environment, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.
APA
Anuradha, Dr. Suman Sangwan (2016). Implementing Multiple Security in the Cloud Environment. International Journal of Advance Research, Ideas and Innovations in Technology, 2(5) www.IJARIIT.com.
MLA
Anuradha, Dr. Suman Sangwan. "Implementing Multiple Security in the Cloud Environment." International Journal of Advance Research, Ideas and Innovations in Technology 2.5 (2016). www.IJARIIT.com.
Anuradha, Dr. Suman Sangwan. Implementing Multiple Security in the Cloud Environment, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.
APA
Anuradha, Dr. Suman Sangwan (2016). Implementing Multiple Security in the Cloud Environment. International Journal of Advance Research, Ideas and Innovations in Technology, 2(5) www.IJARIIT.com.
MLA
Anuradha, Dr. Suman Sangwan. "Implementing Multiple Security in the Cloud Environment." International Journal of Advance Research, Ideas and Innovations in Technology 2.5 (2016). www.IJARIIT.com.
Abstract
Cloud computing is continuously evolving and considered next generation architecture for computing. Typically, cloud computing is a combination of computing resources accessible via internet. Historically, the clients or the organizations store data in data centers with firewall and other security techniques to protect data against intruders. However, in cloud computing, since the data is stored anywhere across the globe, the client organizations have less control over the stored data. To build the trust for the growth of cloud computing, the cloud providers must protect the user data from unauthorized access and disclosure. Here in this work hybrid approach of encryption techniques and the storage of data are considered in the cloud system. The main advantage of the hybrid scheme is to provide more security in the cloud.