Index Link

  • RootNode

Item

{"_buckets": {"deposit": "b7f6fd90-d82c-4231-a3e3-2f9d942604b0"}, "_deposit": {"id": "4420", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4420"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4420", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Study on Cryptographic Algorithms for Cloud Data Security", "subitem_1551255648112": "en_US"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Cloud computing is a distributed computingparadigm in which computing resources, software,applications, information, and infrastructures aredynamically offered as services over the internet. Sincedistributed services are shared via the open network,the security of cloud data is required to be consideredas a major issue in the cloud computing environment.Therefore, there is a need to protect cloud data againstunauthorized accesses, or denial of service,modification, etc. To provide secure cloud data,cryptography can play as a technical control toaddress security issues undergone in cloud computing.In this paper, we have studied some of existing, wellknown cryptographic algorithms that are adoptable toprovide better security of data in cloud computing."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "cloud computing"}, {"interim": "security issues"}, {"interim": "cryptography"}, {"interim": "encryption"}, {"interim": "decryption"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-10-25"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "Study on Cryptographic Algorithms for Cloud Data Security.pdf", "filesize": [{"value": "525 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 525000.0, "url": {"url": "https://meral.edu.mm/record/4420/files/Study on Cryptographic Algorithms for Cloud Data Security.pdf"}, "version_id": "1c515eb3-23be-44ee-b1e5-a8d36b99a606"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Thirteenth International Conference On Computer Applications (ICCA 2015)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Aye, Hnin Mya"}, {"subitem_authors_fullname": "Win, Si Si Mar"}, {"subitem_authors_fullname": "Soe, Thin Thin"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2015-02-05"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/2354"}, "item_title": "Study on Cryptographic Algorithms for Cloud Data Security", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004420", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-10-25"}, "publish_date": "2019-10-25", "publish_status": "0", "recid": "4420", "relation": {}, "relation_version_is_last": true, "title": ["Study on Cryptographic Algorithms for Cloud Data Security"], "weko_shared_id": -1}

Study on Cryptographic Algorithms for Cloud Data Security

http://hdl.handle.net/20.500.12678/0000004420
8929d5eb-45bf-43c8-835b-9af1d698c475
b7f6fd90-d82c-4231-a3e3-2f9d942604b0
None
Name / File License Actions
Study Study on Cryptographic Algorithms for Cloud Data Security.pdf (525 Kb)
Publication type
Article
Upload type
Publication
Title
Title Study on Cryptographic Algorithms for Cloud Data Security
Language en_US
Publication date 2015-02-05
Authors
Aye, Hnin Mya
Win, Si Si Mar
Soe, Thin Thin
Description
Cloud computing is a distributed computingparadigm in which computing resources, software,applications, information, and infrastructures aredynamically offered as services over the internet. Sincedistributed services are shared via the open network,the security of cloud data is required to be consideredas a major issue in the cloud computing environment.Therefore, there is a need to protect cloud data againstunauthorized accesses, or denial of service,modification, etc. To provide secure cloud data,cryptography can play as a technical control toaddress security issues undergone in cloud computing.In this paper, we have studied some of existing, wellknown cryptographic algorithms that are adoptable toprovide better security of data in cloud computing.
Keywords
cloud computing, security issues, cryptography, encryption, decryption
Identifier http://onlineresource.ucsy.edu.mm/handle/123456789/2354
Journal articles
Thirteenth International Conference On Computer Applications (ICCA 2015)
Conference papers
Books/reports/chapters
Thesis/dissertations
0
0
views
downloads
Views Downloads

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats