Author(s) :
S Karthika, A Kavitha
Conference Name :
International Conference on Recent Trends in Computing & Communication Technologies (ICRCCT’2K24)
Abstract :
Cloud memory management is a critical aspect of efficient data storage and retrieval in cloud computing environments. Hybrid algorithms have emerged as a promising solution to optimize memory management by combining the strengths of different approaches. This abstract explores the integration of hybrid algorithms in cloud memory management to enhance performance and scalability. Hash codes play a crucial role in data integrity verification and security. Comparing the hash codes generated by different algorithms, such as SHA1 and SHA2, provides insights into their efficiency, collision resistance, and cryptographic strength. This comparison aids in selecting the most suitable algorithm for specific security requirements in cloud environments. Data security is paramount in cloud computing, especially when sensitive information is stored or transmitted. Hybrid methods like homomorphic encryption combined with Proxy Re Encryption offer a robust approach to securing data while allowing for secure computation and sharing. This abstract delves into the implementation and benefits of using hybrid methods for enhancing data security in cloud environments. By exploring the integration of hybrid algorithms in cloud memory management, comparing hash codes for SHA1 and SHA2, and leveraging hybrid methods for data security, this abstract aims to provide valuable insights into optimizing cloud computing systems for improved performance, security, and efficiency.
No. of Downloads :
1