publication . Other literature type . Article . 2013

Cloud Computing Cryptography "State-Of-The-Art"

Jasim, Omer K.; Abbas, Safia; El-Sayed M. El-Horbaty; Abdel-Badeeh M. Salem;
Open Access English
  • Published: 02 Oct 2013
  • Publisher: Zenodo
Cloud computing technology is very useful in present day to day life, it uses the internet and the central remote servers to provide and maintain data as well as applications. Such applications in turn can be used by the end users via the cloud communications without any installation. Moreover, the end users’ data files can be accessed and manipulated from any other computer using the internet services. Despite the flexibility of data and application accessing and usage that cloud computing environments provide, there are many questions still coming up on how to gain a trusted environment that protect data and applications in clouds from hackers and intruders. T...
free text keywords: Cloud Computing, Cloud Encryption Model, Quantum Key Distribution.
Download fromView all 3 versions
Other literature type . 2013
Provider: Datacite
Article . 2013
Provider: ZENODO
Other literature type . 2013
Provider: Datacite
Any information missing or wrong?Report an Issue