New Age Cyber Threat Mitigation for Cloud Computing Networks

Security Algorithms For Cloud Computing

Author(s): Akashdeep Bhardwaj * .

Pp: 29-41 (13)

DOI: 10.2174/9789815136111123010005

* (Excluding Mailing and Handling)

Abstract

With growing awareness and concerns regarding Cloud Computing and Information Security, there is growing awareness and usage of Security Algorithms in data systems and processes. This chapter presents a brief overview and comparison of Cryptographic algorithms, with an emphasis on Symmetric algorithms should be used for Cloud-based applications and services that require data and link encryption. In this chapter, we review Symmetric and Asymmetric algorithms with an emphasis on Symmetric Algorithms for security consideration on which one should be used for Cloud-based applications and services that require data and link encryption.


Keywords: Asymmetric, AES, Cryptography, 3DES, MD5, RSA, RC6, Security Algorithm, Symmetric.

Related Journals
Related Books
© 2024 Bentham Science Publishers | Privacy Policy