Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

A Survey on Encryptions for Data Sharing in Cloud


     

   Subscribe/Renew Journal


Cloud computing basically insinuates putting off and procuring the information furthermore, programs on top of web in spite of PC’s equipment. It gives creating condition, capacity to deal with the assets, application programming over the cloud. It gives assets to clients on a compensation as you use premise. Cloud storage suppliers offer cloud encryption administrations to encode information before it is exchanged to the cloud for capacity. Run of the mill cloud encryption applications go from scrambled associations with constrained encryption just of information that is known to be delicate, (for example, account accreditations) to end-to-end encryption of any information that is transferred to the cloud. In these models, cloud storage suppliers encode information upon receipt, passing encryption keys to the clients so information can be securely decoded when required.


Keywords

End-To-End Encryption, Cloud Computing
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 269

PDF Views: 1




  • A Survey on Encryptions for Data Sharing in Cloud

Abstract Views: 269  |  PDF Views: 1

Authors

Abstract


Cloud computing basically insinuates putting off and procuring the information furthermore, programs on top of web in spite of PC’s equipment. It gives creating condition, capacity to deal with the assets, application programming over the cloud. It gives assets to clients on a compensation as you use premise. Cloud storage suppliers offer cloud encryption administrations to encode information before it is exchanged to the cloud for capacity. Run of the mill cloud encryption applications go from scrambled associations with constrained encryption just of information that is known to be delicate, (for example, account accreditations) to end-to-end encryption of any information that is transferred to the cloud. In these models, cloud storage suppliers encode information upon receipt, passing encryption keys to the clients so information can be securely decoded when required.


Keywords


End-To-End Encryption, Cloud Computing