Skip navigation
DSpace logo
  • Home
  • Browse
    • Communities
      & Collections
    • Browse Items by:
    • Issue Date
    • Author
    • Title
    • Subject
  • Sign on to:
    • My DSpace
    • Receive email
      updates
    • Edit Profile

  1. About
  2. Faculty & Student Research Papers
  3. VSIT
Please use this identifier to cite or link to this item: http://localhost:8080/xmlui/handle/123456789/318
Title: Application of Cloud Computing Technology in Computer Secure Storage
Authors: Verma, Neha
Keywords: Cloud Computing
Technology
Issue Date: 2022
Publisher: Hindawi Scientific Programming
Description: In the context of big data, the factors a ecting data security are gradually increasing, so security protection is particularly important. Among many security protection methods, cloud computing technology has become the rst choice of many users. Currently, information storage mainly includes computer hard disk storage and mobile device storage [1]. Data encryption, hashing, tokenization, and access control are all data security solutions that protect data across all platforms and apps. Encryption is the process of masking or hiding data by changing the format so that it can no longer be interpreted or understood unless decrypted. As a result, the data remain but are scrambled or hidden. Tokenization is a process in which you try not to own the data, similar to how credit card merchants store the information instead of encrypting it and giving it a key; imagine it as a safe deposit box. Hashing is a mathematical equation or algorithm that is used to process information. Organizations all over the world are investing heavily in information technology
URI: http://localhost:8080/xmlui/handle/123456789/318
Appears in Collections:VSIT

Files in This Item:
File Description SizeFormat 
Neha.pdf299.5 kBAdobe PDFView/Open
Show full item record


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Customized & Implemented by - eLibSol India