TY - BOOK AU - Sahar Mohammed Abduljalil Abdullah AU - Ehab E. Hassanein , AU - Osman Hegazy , TI - Secured services In cloud computing environment / PY - 2014/// CY - Cairo : PB - Sahar Mohammed Abduljalil Abdullah , KW - Cloud Computing KW - Cloud computing services KW - Securing services N1 - Thesis (M.Sc.) - Cairo University - Faculty of Computers and Information - Department of Information System; Issued also as CD N2 - Securing services is always of vital importance and because of the critical nature of cloud computing and large amounts of complex data it carries, the need is even important. Cryptographic algorithms are one of the most important areas in security. They are sequences of processes, or rules, used to encipher and decipher messages in a cryptographic system. In simple terms, they're processes that protect data by making sure that unwanted people can't access it. Unfortunately, when the dataset size is huge, both memory use and computational cost can still be very expensive. In addition, single processor{u2019}s memory and CPU resources are very limited, which make the algorithm performance inefficient. The rapid advances in cloud computing has introduced a variety of security issues; each requires certain skills and knowledge. While developing business services requires conducting analysis and design for the business activities that does not include common security functions for these services UR - http://172.23.153.220/th.pdf ER -