Donthireddy Vijaya Lakshmi, Mohammed Yaseen, K. Akhil, Jogi Naga Shankar Manikanta, T. Shankar, Basant Sah
{"title":"Approaches of Security in Cloud Computing","authors":"Donthireddy Vijaya Lakshmi, Mohammed Yaseen, K. Akhil, Jogi Naga Shankar Manikanta, T. Shankar, Basant Sah","doi":"10.1109/ICSMDI57622.2023.00047","DOIUrl":null,"url":null,"abstract":"Information integrity and secure accessibility with the various mathematical methods are essential in the cloud environment for the creation of a protected system, which compels to do a comprehensive study and presents the techniques of safeguarding systems. Many applications need a secure zone of execution for providing essential services by avoiding security flaws. This paper highlights protection techniques such as stream cipher, block cipher with the hashing function, and another strategy employed globally to ensure maximum privacy by lowering risks and threats.","PeriodicalId":373017,"journal":{"name":"2023 3rd International Conference on Smart Data Intelligence (ICSMDI)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 3rd International Conference on Smart Data Intelligence (ICSMDI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSMDI57622.2023.00047","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Information integrity and secure accessibility with the various mathematical methods are essential in the cloud environment for the creation of a protected system, which compels to do a comprehensive study and presents the techniques of safeguarding systems. Many applications need a secure zone of execution for providing essential services by avoiding security flaws. This paper highlights protection techniques such as stream cipher, block cipher with the hashing function, and another strategy employed globally to ensure maximum privacy by lowering risks and threats.