@article{Srilakshmi_Bhargavi_2019, title={Cloud Computing Security Using Cryptographic Algorithms}, volume={8}, url={https://ojs.trp.org.in/index.php/ajcst/article/view/2082}, DOI={10.51983/ajcst-2019.8.S3.2082}, abstractNote={<p>Cloud computing is a new and fast emergent technology in field of computation and data storage as a service at very eye-catching facilities. It provides fast and well organized on demand services for storage, network, software, and hardware through the Internet. Applications that run in the cloud can balance various elements comprising load balancing, bandwidth, security and size of data. Major problems to cloud adoption are data privacy and security, because the data owner and the service provider are not within the similar trusted domain. Safety issues are increasingly significant in lowest layer Infrastructure as a Service (IaaS) to higher Platform as a Service (PaaS). In this paper we present range of dissimilar techniques or security algorithms exploiting to uphold the secrecy and security of the cloud with cryptographic algorithms.</p>}, number={S3}, journal={Asian Journal of Computer Science and Technology }, author={Srilakshmi, K. and Bhargavi, P.}, year={2019}, month={May}, pages={76–80} }