Welcome to IJSDR UGC CARE norms ugc approved journal norms IJRTI Research Journal | ISSN : 2455-2631
International Peer Reviewed & Refereed Journals, Open Access Journal
ISSN Approved Journal No: 2455-2631 | Impact factor: 8.15 | ESTD Year: 2016
Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 8.15 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(DOI)

Issue: March 2023

Volume 8 | Issue 3

Impact factor: 8.15

Click Here For more Info

Imp Links for Author
Imp Links for Reviewer
Research Area
Subscribe IJSDR
Visitor Counter

Copyright Infringement Claims
Indexing Partner
Published Paper Details
Paper Title: Usage of Social Spider Optimization Algorithm for Cryptography Technique for the Data Security in Cloud Network
Authors Name: Srinivas Reddy Baddam , Dr. M. Raghvender Sharma , Retired Prof. M V Ramana Murthy
Unique Id: IJSDR2303016
Published In: Volume 8 Issue 3, March-2023
Abstract: Cloud computing is an Internet-based computing model that uses a pay-per-use approach and makes a variety of resources available to Cloud Users (CU) through Cloud Service Providers (CSP) on demand. It encourages the virtualization of physical resources to increase productivity and the simultaneous completion of many tasks. The Cloud Computing Environment (CCE) offers a variety of deployment patterns to reflect different cloud categories that are controlled by organizations or academic institutions. Data storage in the cloud (also known as "cloud computing") provides a rapid and efficient means to gain access to one's information via a third-party service provider, enabling corporate expansion at a lower cost. Systems for storing larger amounts of data on storage servers are made possible by cloud data storage. Since the data saved in the cloud are kept for a longer period of time and are accessible through the internet, hackers can take the data stored there and send it elsewhere. This compromises data integrity and makes cloud data consumers unhappy. In order to improve security in cloud environments and cut down on the time required for cryptographic encryption, this article introduced unique cryptographic algorithms.
Keywords: Cloud-Storage, Cryptographic-Tactics, Data Confidentiality, Data Integrity, Data Storage
Cite Article: "Usage of Social Spider Optimization Algorithm for Cryptography Technique for the Data Security in Cloud Network", International Journal of Science & Engineering Development Research (www.ijsdr.org), ISSN:2455-2631, Vol.8, Issue 3, page no.78 - 81, March-2023, Available :http://www.ijsdr.org/papers/IJSDR2303016.pdf
Downloads: 00041
Publication Details: Published Paper ID: IJSDR2303016
Registration ID:204364
Published In: Volume 8 Issue 3, March-2023
DOI (Digital Object Identifier):
Page No: 78 - 81
Publisher: IJSDR | www.ijsdr.org
ISSN Number: 2455-2631

Click Here to Download This Article

Article Preview

Click here for Article Preview

Major Indexing from www.ijsdr.org
Google Scholar ResearcherID Thomson Reuters Mendeley : reference manager Academia.edu
arXiv.org : cornell university library Research Gate CiteSeerX DOAJ : Directory of Open Access Journals
DRJI Index Copernicus International Scribd DocStoc

Track Paper
Important Links
Conference Proposal
DOI (A digital object identifier)

Providing A digital object identifier by DOI
How to GET DOI and Hard Copy Related
Open Access License Policy
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License
Creative Commons License
This material is Open Knowledge
This material is Open Data
This material is Open Content
Social Media

Indexing Partner