Secured services In cloud computing environment /

Sahar Mohammed Abduljalil Abdullah

Secured services In cloud computing environment / تأمين الخدمات في بيئة الحوسبه السحابيـه Sahar Mohammed Abduljalil Abdullah ; Supervised Osman Hegazy , Ehab E. Hassanein - Cairo : Sahar Mohammed Abduljalil Abdullah , 2014 - 77 Leaves : charts ; 30cm

Thesis (M.Sc.) - Cairo University - Faculty of Computers and Information - Department of Information System

Securing services is always of vital importance and because of the critical nature of cloud computing and large amounts of complex data it carries, the need is even important. Cryptographic algorithms are one of the most important areas in security. They are sequences of processes, or rules, used to encipher and decipher messages in a cryptographic system. In simple terms, they're processes that protect data by making sure that unwanted people can't access it. Unfortunately, when the dataset size is huge, both memory use and computational cost can still be very expensive. In addition, single processors memory and CPU resources are very limited, which make the algorithm performance inefficient. The rapid advances in cloud computing has introduced a variety of security issues; each requires certain skills and knowledge. While developing business services requires conducting analysis and design for the business activities that does not include common security functions for these services



Cloud Computing Cloud computing services Securing services
Cairo University Libraries Portal Implemented & Customized by: Eng. M. Mohamady Contacts: new-lib@cl.cu.edu.eg | cnul@cl.cu.edu.eg
CUCL logo CNUL logo
© All rights reserved — Cairo University Libraries
CUCL logo
Implemented & Customized by: Eng. M. Mohamady Contact: new-lib@cl.cu.edu.eg © All rights reserved — New Central Library
CNUL logo
Implemented & Customized by: Eng. M. Mohamady Contact: cnul@cl.cu.edu.eg © All rights reserved — Cairo National University Library