ISBN-13: 9786138911890 / Angielski / Miękka / 2019 / 144 str.
Computing becomes novel when the requirements are offered as services similar to the utilities like water, electricity, internet connection etc. which are leased on payment. Cloud computing started the innovation by provisioning the demands of the Information Technology (IT) structure. Apart from IT premises, the ordinary user can also hire the resources by pay-on-demand basis. The users desire to store their large volume of sensitive data in clouds than in the in-house storage without buying the large storage capacity devices. Even though the confidentiality of the data is preserved by the Cloud Service Providers, there is a provision for acquiring the knowledge about the users' data.Thus the chance of securing the data by the users is more than the Cloud Service Providers.The strength of the Cryptographic Security Algorithms basically lie on the keys used. Thus the proposed algorithms and the procedure concentrate on the key management. They are Key Generation Genetic Algorithm (KGGA), Asymmetric Addition Chaining Cryptographic Algorithm (ACCA) and Key Authentication and Authorization Procedure (KAAP). Hence this book offers Key Management tasks to secure user's data in cloud.