Published Fast: - If it's accepted, We aim to get your article published online in 48 hours.

Home / Articles

No Article found
Using A Dual Layered Security Approach, Cloud Based Applications Can Be Highly Confidential In The Face of A Crypto Analysis Attack : Review
Author Name

Dikshika Maliwad Assistant Professor, CSD, Lnct (bhopal) indore campus, Indore

Abstract

Security is one of the important non-functional requirements of every solution. Early days, security and data privacy was just luxury part of software development and it was optional requirement but nowadays, it plays critical role in daily life. This research paper has been made to observe the need of security algorithms in cloud computing. This works observe that current security level of existing applications and also recommend improved security solutions to enhance the security level as well performance of proposed architecture. This work recommends that RC6 and Blowfish algorithm can be used to achieve confidentiality during communication. The complete work will proposed a security architecture having solution to achieve confidentiality, integrity with strong authentication policy for cloud computing.



Published On :
2024-07-26

Article Download :
Publish your academic thesis as a book with ISBN Contact – connectirj@gmail.com
Visiters Count :