Authentication and Encryption in Cloud using Linear Algebra

Authors

  • T Aruna Dept. of Computer Applications, Islamiah Women’s Arts and Science College

Keywords:

Computing,, Encryption, Decryption

Abstract

Cloud computing a new concept of Modern World and it combines all the service models and technologies together to deliver IT enterprise. The objective of this algorithm is to provide the security to end user to protect files or data from the unauthorized user. Privacy is an important issue for any technology through which unauthorized user can access your file or data in a cloud. I have presenting an encryption algorithm to deal with the privacy problems in cloud computing and protect the data stored in the cloud.

References

[1] Arjunkumar ,Byung Gook Lee , AnuKumari “secure storage and access of data in cloud computing” .IEEE on ICTC, 2012.

[2] M.M .Auxilia and K. Raja, “semantic based access control for ensuring data security in cloud computing”, IEEE conference on reader, Communication and computing 2012

[3] Meer SoheilAbolghasemi , MahadiMokkarmi “using location based encryption to improve the security of data access in Cloud computing”, IEEE conference on advances in computing communications and informatics,2013.

[4] Rao Srinivasa and V .Nageswara Rao , “Cloud computing an overview “, computing,pp71-76,2009

[5] Kulkarni .G “A security aspects in cloud computing”, Computer Engineering, IEEE,PP 547-550,2012.

Downloads

Published

2025-11-25

How to Cite

[1]
T. Aruna, “Authentication and Encryption in Cloud using Linear Algebra”, Int. J. Comp. Sci. Eng., vol. 7, no. 17, pp. 22–24, Nov. 2025.