Loading

An Analysis of Cloud Security Models in Real-Time Distributed Computing
Lakshmi Naga Divya Tamma1, Shaik Shakeel Ahamad2

1Lakshmi Naga Divya Tamma, Department of CSE, KLU, Guntur, India.
2Dr. Shaik Shakeel Ahamad, Department of Information Technology, CCIS, Majmah University, Al Majmaah, Riyadh, Kingdom of Saudi Arabia KL University, Guntur India.
Manuscript received on 07 April 2019 | Revised Manuscript received on 20 April 2019 | Manuscript published on 30 April 2019 | PP: 1753-1757 | Volume-8 Issue-6, April 2019 | Retrieval Number: F5094048619/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Cloud security plays a vital role in the distributed environment for sharing structured or unstructured data in a secured way. As the size of the cloud data increases, it is difficult to secure the user’s data using the traditional cloud security models. Most of the traditional cloud security algorithms such as AES, DES, ECC, RSA etc are used to encrypt the limited structured data to the cloud server. However, these algorithms are independent of cloud user credentials due to high computational time and memory. In this paper, different types of traditional cloud security and encryption models are summarized along with limitations or issues.
Keyword: Attribute Based Encryption, Cloud Service Providers, CPABE, KPABE.
Scope of the Article: Cloud Computing