Encryption Schemes & Security Issues in Cloud Computing
D Sasikumar1, S Saravanakumar2
1D Sasikumar, Research Scholar, Department of Computer Science and Engineering, BIHER-Bharath Institute of Higher Education and Research, Chennai (Tamil Nadu), India.
2S Saravanakumar, Professor, Department of Computer Science and Engineering, Karpagam College of Engineering, Coimbatore (Tamil Nadu), India.
Manuscript received on 01 June 2019 | Revised Manuscript received on 07 June 2019 | Manuscript published on 30 June 2019 | PP: 2413-2415 | Volume-8 Issue-8, June 2019 | Retrieval Number: H7351068819/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Cloud computing (CC) is the most recent innovation in the advanced globe. CC is the current innovation in the meadow of conveyed computing. The reception of innovation is developing step by step since it encourages the clients to use the checks during utilizing mutual puddle of assets with no the establishment of every product. Since CC accumulates the information and it’s dispersed assets in the earth, security has turned into the primary obstruction what is obstructing the organization of cloud situations. There is few clients’ utilized cloud to accumulate their own information, so information stockpiling security is necessary on the capacity medium. The real worry of cloud condition is security amid transfer the information on cloud server. Yet, security is the basic inhibitor that is looked by CC and it utilizes CC progressively troublesome. To take care of these issues, few encryption calculations which give security to the information put away on cloud. In this research work, an exertion is completed to analyze the security issues and also encryption calculations that give security to the cloud information.
Keywords: Cloud Computing, Models of Deployment, Issues in Security and Encryption Schemes.
Scope of the Article: Cloud Computing