Using Public Key Algorithms in Cloud Computing Security

Begum, Masarath and ., Komal and Tarnalle, Shilpa (2024) Using Public Key Algorithms in Cloud Computing Security. In: Current Approaches in Engineering Research and Technology Vol. 2. B P International, pp. 34-42. ISBN 978-81-973195-1-8

Full text not available from this repository.

Abstract

Centered on its inherent data sharing and low latency features, cloud infrastructure is considered as an effective alternative to conventional information technology. Cloud service providers (CSPs) like Amazon, are capable of providing cloud users with various services by integrating powerful data centers. Users may utilize high-quality software to move their local data processing systems to cloud storage and save considerable investments in their local infrastructures. Annotation techniques by utilizing the pairs of meaning attributes are usually more descriptive, as they provide more details than the untyped methods. A new solution to use more concise queries with such annotations is the "pay-as-you-go" querying technique in data spaces.

Item Type: Book Section
Subjects: Open STM Article > Multidisciplinary
Depositing User: Unnamed user with email support@openstmarticle.com
Date Deposited: 14 May 2024 10:41
Last Modified: 14 May 2024 10:41
URI: http://asian.openbookpublished.com/id/eprint/1376

Actions (login required)

View Item
View Item