2020
DOI: 10.30534/ijeter/2020/71842020
|View full text |Cite
|
Sign up to set email alerts
|

Encrypting and decrypting different files over different algorithm on Cloud Platform

Abstract: Now-a-day applications like e-banking, online marketing, medical data application, etc., are attacked by many malware. Especially in cloud computing, the data security is the most important aspects and the speed is also taken into account. This internet turns into the main intermediate between machine and mankind for smiles to tears. Similarly, the online transaction becomes the main event in human life for all-purpose like purchase vegetables to diamonds. In our paper, we plan to show the security and perform… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 6 publications
(7 reference statements)
0
1
0
Order By: Relevance
“…Platform security Data sharing, software, hardware, application Combination of AES, Blowfish and Twofish security algorithms for secure data sharing (40). Enhanced role-based access algorithms to secure IoT-based cloud (41).…”
Section: Types Risks Approachesmentioning
confidence: 99%
“…Platform security Data sharing, software, hardware, application Combination of AES, Blowfish and Twofish security algorithms for secure data sharing (40). Enhanced role-based access algorithms to secure IoT-based cloud (41).…”
Section: Types Risks Approachesmentioning
confidence: 99%