利用RC6加密算法增强云计算的安全性

Salim Ali Abbas, Malik Mohammed
{"title":"利用RC6加密算法增强云计算的安全性","authors":"Salim Ali Abbas, Malik Mohammed","doi":"10.5120/IJAIS2017451715","DOIUrl":null,"url":null,"abstract":"Cloud computing give an impression of being an extremely well known and famous computing technology. Each person is utilizing cloud computing straightforwardly or indirectly such as email that usually utilized as an application of cloud computing. Everyone can get to the mail anyplace whenever. The email account is not obvious on personal PC but rather a person need to get to his account with the assistance of web. Like an email cloud computing give numerous different services, for example accessing to various applications, saving of any sort of information and so on. Clients can normally access and store information without fearing over how these services are given to client. Because of this adaptability everybody is exchanging information to the cloud, to store information on cloud client needs to send their information to the third party who will oversee and store information, so it is crucial for an organization to secure that information. Most difficult part is how to protect these data in light of the fact that these information can store anyplace in the cloud. This paper presents the proposed cryptographic algorithm used to address this issue. General Terms Cloud Computing, Security, Cryptography, Algorithms","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"43 1","pages":"27-32"},"PeriodicalIF":0.0000,"publicationDate":"2017-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Enhancing Security of Cloud Computing by using RC6 Encryption Algorithm\",\"authors\":\"Salim Ali Abbas, Malik Mohammed\",\"doi\":\"10.5120/IJAIS2017451715\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cloud computing give an impression of being an extremely well known and famous computing technology. Each person is utilizing cloud computing straightforwardly or indirectly such as email that usually utilized as an application of cloud computing. Everyone can get to the mail anyplace whenever. The email account is not obvious on personal PC but rather a person need to get to his account with the assistance of web. Like an email cloud computing give numerous different services, for example accessing to various applications, saving of any sort of information and so on. Clients can normally access and store information without fearing over how these services are given to client. Because of this adaptability everybody is exchanging information to the cloud, to store information on cloud client needs to send their information to the third party who will oversee and store information, so it is crucial for an organization to secure that information. Most difficult part is how to protect these data in light of the fact that these information can store anyplace in the cloud. This paper presents the proposed cryptographic algorithm used to address this issue. General Terms Cloud Computing, Security, Cryptography, Algorithms\",\"PeriodicalId\":92376,\"journal\":{\"name\":\"International journal of applied information systems\",\"volume\":\"43 1\",\"pages\":\"27-32\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-11-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International journal of applied information systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.5120/IJAIS2017451715\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International journal of applied information systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5120/IJAIS2017451715","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

云计算给人的印象是一种非常知名和著名的计算技术。每个人都直接或间接地使用云计算,例如通常用作云计算应用程序的电子邮件。每个人都可以随时随地拿到邮件。电子邮件帐户在个人电脑上并不明显,而是一个人需要在网络的帮助下进入他的帐户。像电子邮件一样,云计算提供许多不同的服务,例如访问各种应用程序,保存任何类型的信息等等。客户端通常可以访问和存储信息,而不必担心这些服务是如何提供给客户端的。由于这种适应性,每个人都在向云交换信息,为了在云客户端上存储信息,需要将他们的信息发送给将监督和存储信息的第三方,因此对组织来说,保护这些信息是至关重要的。最困难的部分是如何保护这些数据,因为这些信息可以存储在云中的任何地方。本文提出了一种用于解决这一问题的加密算法。通用术语云计算,安全,密码学,算法
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Enhancing Security of Cloud Computing by using RC6 Encryption Algorithm
Cloud computing give an impression of being an extremely well known and famous computing technology. Each person is utilizing cloud computing straightforwardly or indirectly such as email that usually utilized as an application of cloud computing. Everyone can get to the mail anyplace whenever. The email account is not obvious on personal PC but rather a person need to get to his account with the assistance of web. Like an email cloud computing give numerous different services, for example accessing to various applications, saving of any sort of information and so on. Clients can normally access and store information without fearing over how these services are given to client. Because of this adaptability everybody is exchanging information to the cloud, to store information on cloud client needs to send their information to the third party who will oversee and store information, so it is crucial for an organization to secure that information. Most difficult part is how to protect these data in light of the fact that these information can store anyplace in the cloud. This paper presents the proposed cryptographic algorithm used to address this issue. General Terms Cloud Computing, Security, Cryptography, Algorithms
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Enhancing the Fight against Social Media Misinformation: An Ensemble Deep Learning Framework for Detecting Deepfakes Securing Healthcare Systems in the Era of 6G Networks: A Perspective on the Enabling Technologies REVIEW OF ONLINE SHOPPING DESIGN IN NIGERIA: CHALLENGES AND OPPORTUNITIES Privacy And Security Issues: An Assessment of the Awareness Level of Smartphone Users in Nigeria Enhancing Fake News Identification in Social Media through Ensemble Learning Methods
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1