Figure 2 - uploaded by Moorthy Muppidathi
Content may be subject to copyright.
Asymmetric Key Cryptography

Asymmetric Key Cryptography

Source publication
Article
Full-text available
In this technological era, cloud systems became a vital one to store data. Nowadays everyone store their important data in cloud architecture. It provides services and resources with the help of internet. On the other hand, security risks of cloud computing represent a major concern that slows down its market growth. There are many frameworks for h...

Context in source publication

Context 1
... is also referred to as public-key cryptography . The illustration of asymmetric key cryptography is shown in Figure 2. Asymmetric encryption tends to be slower as it imposes a high computational cost compared to symmetric algorithm. ...

Similar publications

Article
Full-text available
A Cloud contains a huge pool of assets, which could be reallocated to various purposes inside brief time allotments, and enables the cloud proprietor to profit altogether from economies of scale and in addition from factual multiplexing. Cloud benefits today are conveyed in easy to use way and offered on a remarkable scale. Cloud computing is being...
Article
Full-text available
Basically cloud computing security is essential nowadays, it has arisen as a technology to allow users as well as clients to access communications, data storage, software as well as exploitation Environment according to pay-as-what-use structure. Conventional digital forensic can’t be investigated due to some technical challenges like environmental...
Article
Full-text available
Cloud computing is a global technology for data storage and retrieving. Many organizations are switching their companies to cloud technology, so that they can lease cloud services for use on a membership or pay as you go basis rather than creating their own systems. Cloud service provider and the Cloud service accessibility are the two major proble...
Article
Full-text available
Many symmetric and asymmetric encryption algorithms have been developed in cloud computing to transmit data in a secure form. Cloud cryptography is a data encryption mechanism that consists of different steps and prevents the attacker from misusing the data. This paper has developed an efficient algorithm to protect the data from invaders and secur...
Article
Full-text available
In this technological era, cloud systems became a vital one to store data. Nowadays everyone store their important data in cloud architecture. It provides services and resources with the help of internet. On the other hand, security risks of cloud computing represent a major concern that slows down its market growth. There are many frameworks for h...