##plugins.themes.academic_pro.article.main##

Abstract

Cloud computing is a revolutionary computing paradigm, that enables flexible, on-demand, and low-cost
usage of computing resources, but when the data is outsourced to some cloud servers, various privacy
issues emerge on it. Various encryption schemes have been proposed to secure the cloud storage. However,
most work focuses on the data privacy and the access control. Data storage security means securing the
data on the storage media. So, security is very much important in cloud computing for ensuring data placed
on the secure mode in the cloud. To ensure security from third party's authentication is mandatory. In this
paper, we discuss a many techniques which are used to provide security in the field of cloud computing and
are compared based on their performance, pros and cons.

##plugins.themes.academic_pro.article.details##

How to Cite
Mrs. K. Vidhya M.E., (PhD)1 , V. Monika2 , S.S. Subasri3 , R.Sukanya4. (2016). Study of Algorithms for Securing Data Stored in Cloud. International Journal of Emerging Trends in Science and Technology, 3(04), 3763-3769. Retrieved from https://igmpublication.org/ijetst.in/index.php/ijetst/article/view/1046