Authors :
Aditya Sadanand Ghadi
Volume/Issue :
Volume 5 - 2020, Issue 12 - December
Google Scholar :
http://bitly.ws/9nMw
Scribd :
https://bit.ly/34dTfTn
Abstract :
Nowadays the growing use of mobile devices
and advancement in networking technology is leading us
to secure file storage over the network. Cryptography is
the most popular technology used for all types of data
security. This discussed paper is a broad survey of the
different approach which is used for securely storing
files, and sharing it over the network. This proposed
scheme will also ensure the whole model to have
confidentiality, integrity, and availability mechanisms to
be implemented in it.
Keywords :
Cryptography, Confidentiality, Integrity, Availability, Storage, and Security
Nowadays the growing use of mobile devices
and advancement in networking technology is leading us
to secure file storage over the network. Cryptography is
the most popular technology used for all types of data
security. This discussed paper is a broad survey of the
different approach which is used for securely storing
files, and sharing it over the network. This proposed
scheme will also ensure the whole model to have
confidentiality, integrity, and availability mechanisms to
be implemented in it.
Keywords :
Cryptography, Confidentiality, Integrity, Availability, Storage, and Security