Need for Key Management in Cloud and Comparison of Various Encryption Algorithm

Authors

  • Malyadri K  Research Scholar, Computer Science, Rayalaseema University, Kurnool, Andhra Pradesh, India

Keywords:

Network Security, Security Threats, Encryption Algorithms

Abstract

If the design of the world wide web is moderated, it can minimize the possible attacks that could be sent out all over the network. Knowing the assault techniques allows our company to arise along with necessary security. Many companies get themselves from the net using firewall softwares and file encryption operations. Your business creates an "intranet" to stay linked to the internet, however, safeguarded from possible hazards. The safety and security risks are increasing day after day and making high speed wired/wireless network and also net services, unsteady and unstable. Currently-- a - days protection solutions works a lot more notably towards satisfying the reducing side requirements these days' expanding markets. The need is likewise generated into the regions like defence, were protected as well as authenticated get access to of resources is the vital issues connected to info protection. This paper gives the importance towards the need for key management in cloud and also compares various encryption algorithms.

References

  1. I. Kotenko and also A. Chechulin, "Attack choices in and also protection assessment in SIEM units," International Deals on Systems-Scientific Research as well as Functions, vol. 8, pp. 129-- 147, December 2013.
  2. I. Kotenko, I. Saenko, O. Polubelova, as well as E. Doynikova, "The ontology of metrics for surveillance examination and choice support in SIEM systems," in Proc. of the 8th International Seminar on Schedule, Dependability as well as Protection (ARES'thirteen), Regensburg, Germany. IEEE, September 2013, pp. 638-- 645.
  3. M. S. Ahmed, E. Al-Shaer, and also L. Khan, "An unfamiliar measurable approach for gauging system safety," in Proc. of The 27th IEEE Seminar on Pc Communications (INFOCOM'08), Phoenix Az, Arizona, UNITED STATES. IEEE, April 2008, pp. 1957-- 1965.
  4. C. W. Axelrod, "Audit for worth and also anxiety in protection metrics," Information Solution Control Publication, vol. 6, pp. 1-6, 2008.
  5. B. A. Blakely, "Cyberprints were determining cyber aggressors through attribute analysis," PhD treatise, Iowa State University, 2012.

Downloads

Published

2016-07-30

Issue

Section

Research Articles

How to Cite

[1]
Malyadri K, " Need for Key Management in Cloud and Comparison of Various Encryption Algorithm, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 1, Issue 1, pp.132-138, July-August-2016.