Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "b7f6fd90-d82c-4231-a3e3-2f9d942604b0"}, "_deposit": {"id": "4420", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4420"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4420", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Study on Cryptographic Algorithms for Cloud Data Security", "subitem_1551255648112": "en_US"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Cloud computing is a distributed computingparadigm in which computing resources, software,applications, information, and infrastructures aredynamically offered as services over the internet. Sincedistributed services are shared via the open network,the security of cloud data is required to be consideredas a major issue in the cloud computing environment.Therefore, there is a need to protect cloud data againstunauthorized accesses, or denial of service,modification, etc. To provide secure cloud data,cryptography can play as a technical control toaddress security issues undergone in cloud computing.In this paper, we have studied some of existing, wellknown cryptographic algorithms that are adoptable toprovide better security of data in cloud computing."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "cloud computing"}, {"interim": "security issues"}, {"interim": "cryptography"}, {"interim": "encryption"}, {"interim": "decryption"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-10-25"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "Study on Cryptographic Algorithms for Cloud Data Security.pdf", "filesize": [{"value": "525 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 525000.0, "url": {"url": "https://meral.edu.mm/record/4420/files/Study on Cryptographic Algorithms for Cloud Data Security.pdf"}, "version_id": "1c515eb3-23be-44ee-b1e5-a8d36b99a606"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Thirteenth International Conference On Computer Applications (ICCA 2015)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Aye, Hnin Mya"}, {"subitem_authors_fullname": "Win, Si Si Mar"}, {"subitem_authors_fullname": "Soe, Thin Thin"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2015-02-05"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/2354"}, "item_title": "Study on Cryptographic Algorithms for Cloud Data Security", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004420", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-10-25"}, "publish_date": "2019-10-25", "publish_status": "0", "recid": "4420", "relation": {}, "relation_version_is_last": true, "title": ["Study on Cryptographic Algorithms for Cloud Data Security"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Study on Cryptographic Algorithms for Cloud Data Security

http://hdl.handle.net/20.500.12678/0000004420
http://hdl.handle.net/20.500.12678/0000004420
8929d5eb-45bf-43c8-835b-9af1d698c475
b7f6fd90-d82c-4231-a3e3-2f9d942604b0
None
Preview
Name / File License Actions
Study Study on Cryptographic Algorithms for Cloud Data Security.pdf (525 Kb)
Publication type
Article
Upload type
Publication
Title
Title Study on Cryptographic Algorithms for Cloud Data Security
Language en_US
Publication date 2015-02-05
Authors
Aye, Hnin Mya
Win, Si Si Mar
Soe, Thin Thin
Description
Cloud computing is a distributed computingparadigm in which computing resources, software,applications, information, and infrastructures aredynamically offered as services over the internet. Sincedistributed services are shared via the open network,the security of cloud data is required to be consideredas a major issue in the cloud computing environment.Therefore, there is a need to protect cloud data againstunauthorized accesses, or denial of service,modification, etc. To provide secure cloud data,cryptography can play as a technical control toaddress security issues undergone in cloud computing.In this paper, we have studied some of existing, wellknown cryptographic algorithms that are adoptable toprovide better security of data in cloud computing.
Keywords
cloud computing, security issues, cryptography, encryption, decryption
Identifier http://onlineresource.ucsy.edu.mm/handle/123456789/2354
Journal articles
Thirteenth International Conference On Computer Applications (ICCA 2015)
Conference papers
Books/reports/chapters
Thesis/dissertations
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 14:45:25.420175
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL