Skip navigation
DSpace logo
  • Home
  • Browse
    • Communities
      & Collections
    • Browse Items by:
    • Issue Date
    • Author
    • Title
    • Subject
  • Sign on to:
    • My DSpace
    • Receive email
      updates
    • Edit Profile

  1. About
  2. Faculty & Student Research Papers
  3. VSIT
Please use this identifier to cite or link to this item: http://localhost:8080/xmlui/handle/123456789/318
Full metadata record
DC FieldValueLanguage
dc.contributor.authorVerma, Neha-
dc.date.accessioned2024-09-04T10:23:42Z-
dc.date.available2024-09-04T10:23:42Z-
dc.date.issued2022-
dc.identifier.urihttp://localhost:8080/xmlui/handle/123456789/318-
dc.descriptionIn the context of big data, the factors a ecting data security are gradually increasing, so security protection is particularly important. Among many security protection methods, cloud computing technology has become the rst choice of many users. Currently, information storage mainly includes computer hard disk storage and mobile device storage [1]. Data encryption, hashing, tokenization, and access control are all data security solutions that protect data across all platforms and apps. Encryption is the process of masking or hiding data by changing the format so that it can no longer be interpreted or understood unless decrypted. As a result, the data remain but are scrambled or hidden. Tokenization is a process in which you try not to own the data, similar to how credit card merchants store the information instead of encrypting it and giving it a key; imagine it as a safe deposit box. Hashing is a mathematical equation or algorithm that is used to process information. Organizations all over the world are investing heavily in information technologyen_US
dc.language.isoenen_US
dc.publisherHindawi Scientific Programmingen_US
dc.subjectCloud Computingen_US
dc.subjectTechnologyen_US
dc.titleApplication of Cloud Computing Technology in Computer Secure Storageen_US
dc.typeArticleen_US
Appears in Collections:VSIT

Files in This Item:
File Description SizeFormat 
Neha.pdf299.5 kBAdobe PDFView/Open
Show simple item record


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Customized & Implemented by - eLibSol India