Downloads provided by UsageCounts
Virtual computing resources are provided via a cloud system that is both clever and intelligent. Based on the user's request, computing resources are made available. A hybrid cloud is the best option for storing and accessing user data for cloud deployments. Maintaining security in a hybrid cloud environment is time-consuming. This study provides a novel strategy for securing data in the hybrid cloud by ensuring the user's data is protected. Users' data in a hybrid cloud is protected using cryptographic approaches provided in this approach. Using this strategy, users' data may be protected in public and private clouds using various encryption methods. The suggested data security paradigm offers various advantages to both consumers and providers in terms of data security. Three symmetric encryption methods are offered as a service in the cloud. The concept is implemented as a cloud-based application hosted in the cloud, and the effectiveness of three strategies is assessed. They are evaluated in terms of performance and security. Using the recommended encryption methods in a hybrid cloud environment is more efficient than using other methods. The proposed technique can be used for relational data. It can be modified and enhanced to process multimedia data.
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 10 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Top 10% | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Top 10% | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Top 10% |
| views | 1 | |
| downloads | 8 |

Views provided by UsageCounts
Downloads provided by UsageCounts