Donthireddy Vijaya Lakshmi, Mohammed Yaseen, K. Akhil, Jogi Naga Shankar Manikanta, T. Shankar, Basant Sah
{"title":"云计算中的安全方法","authors":"Donthireddy Vijaya Lakshmi, Mohammed Yaseen, K. Akhil, Jogi Naga Shankar Manikanta, T. Shankar, Basant Sah","doi":"10.1109/ICSMDI57622.2023.00047","DOIUrl":null,"url":null,"abstract":"Information integrity and secure accessibility with the various mathematical methods are essential in the cloud environment for the creation of a protected system, which compels to do a comprehensive study and presents the techniques of safeguarding systems. Many applications need a secure zone of execution for providing essential services by avoiding security flaws. This paper highlights protection techniques such as stream cipher, block cipher with the hashing function, and another strategy employed globally to ensure maximum privacy by lowering risks and threats.","PeriodicalId":373017,"journal":{"name":"2023 3rd International Conference on Smart Data Intelligence (ICSMDI)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Approaches of Security in Cloud Computing\",\"authors\":\"Donthireddy Vijaya Lakshmi, Mohammed Yaseen, K. Akhil, Jogi Naga Shankar Manikanta, T. Shankar, Basant Sah\",\"doi\":\"10.1109/ICSMDI57622.2023.00047\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Information integrity and secure accessibility with the various mathematical methods are essential in the cloud environment for the creation of a protected system, which compels to do a comprehensive study and presents the techniques of safeguarding systems. Many applications need a secure zone of execution for providing essential services by avoiding security flaws. This paper highlights protection techniques such as stream cipher, block cipher with the hashing function, and another strategy employed globally to ensure maximum privacy by lowering risks and threats.\",\"PeriodicalId\":373017,\"journal\":{\"name\":\"2023 3rd International Conference on Smart Data Intelligence (ICSMDI)\",\"volume\":\"17 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-03-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 3rd International Conference on Smart Data Intelligence (ICSMDI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSMDI57622.2023.00047\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 3rd International Conference on Smart Data Intelligence (ICSMDI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSMDI57622.2023.00047","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Information integrity and secure accessibility with the various mathematical methods are essential in the cloud environment for the creation of a protected system, which compels to do a comprehensive study and presents the techniques of safeguarding systems. Many applications need a secure zone of execution for providing essential services by avoiding security flaws. This paper highlights protection techniques such as stream cipher, block cipher with the hashing function, and another strategy employed globally to ensure maximum privacy by lowering risks and threats.