Amal Abdulbaqi Maryoosh, R. S. Mohammed, Raniah Ali Mustafa
{"title":"主题综述:基于密码学的云计算安全","authors":"Amal Abdulbaqi Maryoosh, R. S. Mohammed, Raniah Ali Mustafa","doi":"10.31695/ijerat.2019.3569","DOIUrl":null,"url":null,"abstract":"ABSTRACT The cloud computing providing to users and companies many services and facilities such as less cost, availability and risk management. The services of cloud computing are delivered in pay per usage way and on-demand and it can store huge amount of data. But the security concern is the main reason that makes companies afraid of using cloud computing and store their data on cloud servers. In this paper, we try to review and describe many encryption methods that used to protect data which stored in cloud computing and make a comparison among these methods.","PeriodicalId":424923,"journal":{"name":"International Journal of Engineering Research and Advanced Technology","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Subject Review: Cloud Computing Security Based on Cryptography\",\"authors\":\"Amal Abdulbaqi Maryoosh, R. S. Mohammed, Raniah Ali Mustafa\",\"doi\":\"10.31695/ijerat.2019.3569\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"ABSTRACT The cloud computing providing to users and companies many services and facilities such as less cost, availability and risk management. The services of cloud computing are delivered in pay per usage way and on-demand and it can store huge amount of data. But the security concern is the main reason that makes companies afraid of using cloud computing and store their data on cloud servers. In this paper, we try to review and describe many encryption methods that used to protect data which stored in cloud computing and make a comparison among these methods.\",\"PeriodicalId\":424923,\"journal\":{\"name\":\"International Journal of Engineering Research and Advanced Technology\",\"volume\":\"8 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Engineering Research and Advanced Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.31695/ijerat.2019.3569\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Engineering Research and Advanced Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.31695/ijerat.2019.3569","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Subject Review: Cloud Computing Security Based on Cryptography
ABSTRACT The cloud computing providing to users and companies many services and facilities such as less cost, availability and risk management. The services of cloud computing are delivered in pay per usage way and on-demand and it can store huge amount of data. But the security concern is the main reason that makes companies afraid of using cloud computing and store their data on cloud servers. In this paper, we try to review and describe many encryption methods that used to protect data which stored in cloud computing and make a comparison among these methods.