![](/jspui/image/bnner.jpg)
Please use this identifier to cite or link to this item:
http://localhost:8080/xmlui/handle/123456789/318
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Verma, Neha | - |
dc.date.accessioned | 2024-09-04T10:23:42Z | - |
dc.date.available | 2024-09-04T10:23:42Z | - |
dc.date.issued | 2022 | - |
dc.identifier.uri | http://localhost:8080/xmlui/handle/123456789/318 | - |
dc.description | In the context of big data, the factors a ecting data security are gradually increasing, so security protection is particularly important. Among many security protection methods, cloud computing technology has become the rst choice of many users. Currently, information storage mainly includes computer hard disk storage and mobile device storage [1]. Data encryption, hashing, tokenization, and access control are all data security solutions that protect data across all platforms and apps. Encryption is the process of masking or hiding data by changing the format so that it can no longer be interpreted or understood unless decrypted. As a result, the data remain but are scrambled or hidden. Tokenization is a process in which you try not to own the data, similar to how credit card merchants store the information instead of encrypting it and giving it a key; imagine it as a safe deposit box. Hashing is a mathematical equation or algorithm that is used to process information. Organizations all over the world are investing heavily in information technology | en_US |
dc.language.iso | en | en_US |
dc.publisher | Hindawi Scientific Programming | en_US |
dc.subject | Cloud Computing | en_US |
dc.subject | Technology | en_US |
dc.title | Application of Cloud Computing Technology in Computer Secure Storage | en_US |
dc.type | Article | en_US |
Appears in Collections: | VSIT |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.