Open Access Open Access  Restricted Access Subscription Access

Cloud Computing - Cryptography: A Comprehensive Study on Methodologies and Applications

Subramani B S, Tejas Prasanna P, Rohan R, P Pavan

Abstract


Pall computing is an Internet-based computing paradigm that pays cloud druggies (CU) on a pay-per-use basis and makes many coffers available to them through Cloud Service Providers (CSP) on demand without requiring them to purchase the underlying infrastructure. To increase efficiency and the ability to complete several activities at once, it facilitates the virtualization of physical funds. A variety of deployment options are offered by the Cloud Computing Environment (CCE) to reflect the many orders of pall that organizations or institutions possess. Service models and deployment models are two distinct categories of models. SaaS, PaaS, and IaaS are examples of service models. Public Cloud, Private Pall, Mongrel Pall, and Community Cloud make up the deployment or deployment paradigm.

 

Although there are several distinct of cloud computing that make it very significant, sequestration appears to be a particular issue in pall. a variety of vibrant service model types under pall calculating grease colorful situations of sequestration services.


Full Text:

PDF

References


Google Platform Encryption Whitepaper. Encryption at Rest in Google Cloud Platform.Retrieved from https://cloud.google.com/security/encrypti onat rest/defaultencryption

Information Security Management System for Microsoft Cloud Infrastructure. Retrieved from http://aka.ms/mgmtcloud [3]. Cryptography: Theory & Practice, Douglas R. Stinson, Chapman and Hall Publications.

Discussion Group for Cloud Computing Use Cases, "Cloud Computing Use Cases Version 3.0," 2010.

Bernd Grobauer, Tobias Walloschek and Elmar Stöcker, "Understanding Cloud- Computing Vulnerabilities," IEEE Security and Privacy, vol. 99, 2010.

B, Omprakash & Metan, Jyoti & Konar, Anisha & Patil, Kavitha & KK, Chiranthan. (2024). Unravelling Malware Using Co- Existence Of Features. 1-6. 10.1109/ICAIT61638.2024.10690795.

Patil, Kavitha S et al. “Hybrid and Adaptive Cryptographic-based secure authentication approach in Io T based applications using hybrid encryption.” Pervasive Mob. Comput. 82 (2022): 101552.

N R, Deepak & Sriramulu, Balaji. (2015). A Review of Techniques used in EPS and 4G-LTE in Mobility Schemes.

Ravikumar, J. Gauging Deep Learning Archetypal Effectiveness in Haematological Reclamation.S COMPUT. SCI. 5, 963 (2024).

Deepak, N.R., Balaji, S. (2016). Uplink Channel Performance and Implementation of Software for Image Communication in 4G Network. In: Silhavy, R., Senkerik, R., Oplatkova, Z., Silhavy, P., Prokopova, Z. (eds) Software Engineering Perspectives and Application in Intelligent Systems. CSOC 2016. Advances in Intelligent Systems and Computing, vol 465. Springer, Cham.

N R, Deepak & Sriramulu, Balaji. (2015). A Review of Techniques used in EPS and 4G-LTE in Mobility Schemes. International Journal of Computer Applications. 109. 30-38. 10.5120/19219-

Deepak, N.R., Balaji, S. (2016). Uplink Channel Performance and Implementation of Software for Image Communication in 4G Network. In: Silhavy, R., Senkerik, R., Oplatkova, Z., Silhavy, P., Prokopova, Z. (eds) Software Engineering Perspectives and Application in Intelligent Systems. CSOC 2016. Advances in Intelligent Systems and Computing, vol 465. Springer, Cham. https://doi.org/10.1007/978-3-319-33622-0_10


Refbacks

  • There are currently no refbacks.