2017
DOI: 10.9790/0661-1903013849
|View full text |Cite
|
Sign up to set email alerts
|

Review of Key Management and Distribution Technique for Data Dynamics for Storage Security in Cloud Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 26 publications
0
0
0
Order By: Relevance
“…Dharam Raj Kumar et al [9] conducted an experimental assessment of key generation techniques in cloud data storage over the internet. Their study identifies several issues with existing cryptographic methods used for data storage and retrieval, such as latency, key management overhead, and vulnerability to attacks.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Dharam Raj Kumar et al [9] conducted an experimental assessment of key generation techniques in cloud data storage over the internet. Their study identifies several issues with existing cryptographic methods used for data storage and retrieval, such as latency, key management overhead, and vulnerability to attacks.…”
Section: Literature Reviewmentioning
confidence: 99%