{"created":"2020-09-01T14:45:21.365121+00:00","id":4420,"links":{},"metadata":{"_buckets":{"deposit":"b7f6fd90-d82c-4231-a3e3-2f9d942604b0"},"_deposit":{"id":"4420","owners":[],"pid":{"revision_id":0,"type":"recid","value":"4420"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/4420","sets":["1582963302567:1597824273898"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Study on Cryptographic Algorithms for Cloud Data Security","subitem_1551255648112":"en_US"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"Cloud computing is a distributed computingparadigm in which computing resources, software,applications, information, and infrastructures aredynamically offered as services over the internet. Sincedistributed services are shared via the open network,the security of cloud data is required to be consideredas a major issue in the cloud computing environment.Therefore, there is a need to protect cloud data againstunauthorized accesses, or denial of service,modification, etc. To provide secure cloud data,cryptography can play as a technical control toaddress security issues undergone in cloud computing.In this paper, we have studied some of existing, wellknown cryptographic algorithms that are adoptable toprovide better security of data in cloud computing."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value_mlt":[{"interim":"cloud computing"},{"interim":"security issues"},{"interim":"cryptography"},{"interim":"encryption"},{"interim":"decryption"}]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-10-25"}],"displaytype":"preview","filename":"Study on Cryptographic Algorithms for Cloud Data Security.pdf","filesize":[{"value":"525 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/4420/files/Study on Cryptographic Algorithms for Cloud Data Security.pdf"},"version_id":"1c515eb3-23be-44ee-b1e5-a8d36b99a606"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Thirteenth International Conference On Computer Applications (ICCA 2015)","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Aye, Hnin Mya"},{"subitem_authors_fullname":"Win, Si Si Mar"},{"subitem_authors_fullname":"Soe, Thin Thin"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2015-02-05"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/2354"},"item_title":"Study on Cryptographic Algorithms for Cloud Data Security","item_type_id":"21","owner":"1","path":["1597824273898"],"publish_date":"2019-10-25","publish_status":"0","recid":"4420","relation_version_is_last":true,"title":["Study on Cryptographic Algorithms for Cloud Data Security"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2021-12-13T01:53:33.947817+00:00"}