Chapter 7 Security algorithms for secure cloud environment
Maryam Saleem, Maryam Rasheed, and Muhammad Imran Tariq
Department of Computer Science, Superior University, Lahore, Pakistan
Shahzadi Tayyaba
University of Lahore, Pakistan
Muhammad Arfan Jaffar
Department of Computer Science, Superior University, Lahore, Pakistan
CONTENTS
- 7.1 Introduction
- 7.1.1 History of cloud computing
- 7.1.2 Cloud computing
- 7.1.3 Cloud services and models
- 7.1.4 Cloud service model
- 7.1.5 Cloud deployment models
- 7.1.6 Cloud security problems
- 7.1.7 Goals of security
- 7.1.8 Types of text
- 7.1.9 Encryption and decryption method
- 7.1.10 Keys
- 7.1.11 Types of security algorithms
Get Security and Privacy Trends in Cloud Computing and Big Data now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.