Abstract: Cloud computing is a basic term in the development of computers; it is the ability to access, share a collection of sources that are owned and stored by another party over the internet. Once we have shared the information over the internet, we must consider the security problems such as confidentiality, integrity, and authentication. In this paper, we reviewed some of the security techniques in the field of the security of data stored in the cloud storage with combination with transitions issues. Also, we compare RSA, AES, MD5, BLOWFISH, and Diffie-Hellman, techniques. Then monitored and recorded the most important results obtained.

Keywords: Cloud computing, Security, Confidentiality, Integrity, Authentication.


PDF | DOI: 10.17148/IARJSET.2020.7817

Open chat