Cloud computing is the latest paradigm in IT field promising trends. It provides the resources similar to accessibility of data, minimum cost and several other uses. But the major issue for cloud is the security of the information which is stored in the cloud. Various methods and specialized techniques are combined together for providing information security to data which is stored in cloud in this paper. The aim of this paper is to analyze various cryptographic techniques and to discuss about various security techniques over cloud and user authentication which is most helpful and useful in the information security over cloud
%0 Journal Article
%1 Vishwakarma_2015
%A Vishwakarma, Priyanka
%A Sahare, Mahendra
%D 2015
%I Auricle Technologies, Pvt., Ltd.
%J International Journal on Recent and Innovation Trends in Computing and Communication
%K Availability Cloud Computing Confidentiality Decryption Encryption Security integrity
%N 2
%P 808--811
%R 10.17762/ijritcc2321-8169.150281
%T Analysis of Cloud Storage Information Security and It�s Various Methods
%U http://dx.doi.org/10.17762/ijritcc2321-8169.150281
%V 3
%X Cloud computing is the latest paradigm in IT field promising trends. It provides the resources similar to accessibility of data, minimum cost and several other uses. But the major issue for cloud is the security of the information which is stored in the cloud. Various methods and specialized techniques are combined together for providing information security to data which is stored in cloud in this paper. The aim of this paper is to analyze various cryptographic techniques and to discuss about various security techniques over cloud and user authentication which is most helpful and useful in the information security over cloud
@article{Vishwakarma_2015,
abstract = {Cloud computing is the latest paradigm in IT field promising trends. It provides the resources similar to accessibility of data, minimum cost and several other uses. But the major issue for cloud is the security of the information which is stored in the cloud. Various methods and specialized techniques are combined together for providing information security to data which is stored in cloud in this paper. The aim of this paper is to analyze various cryptographic techniques and to discuss about various security techniques over cloud and user authentication which is most helpful and useful in the information security over cloud},
added-at = {2015-08-04T08:47:35.000+0200},
author = {Vishwakarma, Priyanka and Sahare, Mahendra},
biburl = {https://www.bibsonomy.org/bibtex/221a3a6afd690235bbb9143ef9e1c6d7b/ijritcc},
doi = {10.17762/ijritcc2321-8169.150281},
interhash = {0f1934024ad87439fc7d8be5ca2c7f65},
intrahash = {21a3a6afd690235bbb9143ef9e1c6d7b},
journal = {International Journal on Recent and Innovation Trends in Computing and Communication},
keywords = {Availability Cloud Computing Confidentiality Decryption Encryption Security integrity},
month = {february},
number = 2,
pages = {808--811},
publisher = {Auricle Technologies, Pvt., Ltd.},
timestamp = {2015-08-04T08:49:39.000+0200},
title = {Analysis of Cloud Storage Information Security and It�s Various Methods},
url = {http://dx.doi.org/10.17762/ijritcc2321-8169.150281},
volume = 3,
year = 2015
}