M. Hossain, A. Ullah, Newaz Ibrahim Khan, Feroz Alam
{"title":"Design and Development of a Novel Symmetric Algorithm for Enhancing Data Security in Cloud Computing","authors":"M. Hossain, A. Ullah, Newaz Ibrahim Khan, Feroz Alam","doi":"10.4236/jis.2019.104012","DOIUrl":null,"url":null,"abstract":"Cloud computing \nis a kind of computing that depends on shared figuring assets instead of having \nnearby servers or individual gadgets to deal with applications. Technology is moving to the cloud more and more. \nIt’s not just a trend, the shift away from ancient package models to package as \nservice has steadily gained momentum over \nthe last ten years. Looking forward, the following decade of cloud computing guarantees \nsignificantly more approaches to work from anyplace, utilizing cell phones. Cloud computing \nfocused on better performances, better scalability and resource consumption but \nit also has some security issue with the data stored in it. The proposed \nalgorithm intents to come with some solutions that will reduce the security \nthreats and ensure far better security to the data stored in cloud.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":" ","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2019-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"信息安全(英文)","FirstCategoryId":"1093","ListUrlMain":"https://doi.org/10.4236/jis.2019.104012","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
Cloud computing
is a kind of computing that depends on shared figuring assets instead of having
nearby servers or individual gadgets to deal with applications. Technology is moving to the cloud more and more.
It’s not just a trend, the shift away from ancient package models to package as
service has steadily gained momentum over
the last ten years. Looking forward, the following decade of cloud computing guarantees
significantly more approaches to work from anyplace, utilizing cell phones. Cloud computing
focused on better performances, better scalability and resource consumption but
it also has some security issue with the data stored in it. The proposed
algorithm intents to come with some solutions that will reduce the security
threats and ensure far better security to the data stored in cloud.