Open Access   Article Go Back

Authentication and Encryption in Cloud using Linear Algebra

T. Aruna1

Section:Research Paper, Product Type: Journal Paper
Volume-07 , Issue-17 , Page no. 22-24, May-2019

Online published on May 22, 2019

Copyright © T. Aruna . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: T. Aruna, “Authentication and Encryption in Cloud using Linear Algebra,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.17, pp.22-24, 2019.

MLA Style Citation: T. Aruna "Authentication and Encryption in Cloud using Linear Algebra." International Journal of Computer Sciences and Engineering 07.17 (2019): 22-24.

APA Style Citation: T. Aruna, (2019). Authentication and Encryption in Cloud using Linear Algebra. International Journal of Computer Sciences and Engineering, 07(17), 22-24.

BibTex Style Citation:
@article{Aruna_2019,
author = {T. Aruna},
title = {Authentication and Encryption in Cloud using Linear Algebra},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {07},
Issue = {17},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {22-24},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1302},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1302
TI - Authentication and Encryption in Cloud using Linear Algebra
T2 - International Journal of Computer Sciences and Engineering
AU - T. Aruna
PY - 2019
DA - 2019/05/22
PB - IJCSE, Indore, INDIA
SP - 22-24
IS - 17
VL - 07
SN - 2347-2693
ER -

           

Abstract

Cloud computing a new concept of Modern World and it combines all the service models and technologies together to deliver IT enterprise. The objective of this algorithm is to provide the security to end user to protect files or data from the unauthorized user. Privacy is an important issue for any technology through which unauthorized user can access your file or data in a cloud. I have presenting an encryption algorithm to deal with the privacy problems in cloud computing and protect the data stored in the cloud.

Key-Words / Index Term

Computing, Encryption, Decryption

References

[1]. Arjunkumar ,Byung Gook Lee , AnuKumari “secure storage and access of data in cloud computing” .IEEE on ICTC, 2012.
[2]. M.M .Auxilia and K. Raja, “semantic based access control for ensuring data security in cloud computing”, IEEE conference on reader, Communication and computing 2012
[3]. Meer SoheilAbolghasemi , MahadiMokkarmi “using location based encryption to improve the security of data access in Cloud computing”, IEEE conference on advances in computing communications and informatics,2013.
[4]. Rao Srinivasa and V .Nageswara Rao , “Cloud computing an overview “, computing,pp71-76,2009
[5]. Kulkarni .G “A security aspects in cloud computing”, Computer Engineering, IEEE,PP 547-550,2012.