Applying_Encryption_Algorithm_for_Data_S
Applying_Encryption_Algorithm_for_Data_S
2
Computer Science And Engineering, Punjab Technical University, Beant College of engineering and Technology
Gurdaspur, Punjab, India
Copyright (c) 2013 International Journal of Computer Science Issues. All Rights Reserved.
IJCSI International Journal of Computer Science Issues, Vol. 10, Issue 1, No 1, January 2013
ISSN (Print): 1694-0784 | ISSN (Online): 1694-0814
www.IJCSI.org 368
This deployment model share resources with many D. Ownership: Once data has been relegated to the cloud,
organizations in a community that shares common some worry about losing their rights or being unable to
concerns (like security, governance, compliance etc). It protect the rights of their customers. Many cloud providers
typically refers to special-purpose cloud computing address this issue with well-skilled user-sided agreements.
environments shared and managed by a number of related According to the agreement, users would be wise to seek
organizations participating in a common domain or vertical advice from their favourite legal representative [10].
market [12].
Copyright (c) 2013 International Journal of Computer Science Issues. All Rights Reserved.
IJCSI International Journal of Computer Science Issues, Vol. 10, Issue 1, No 1, January 2013
ISSN (Print): 1694-0784 | ISSN (Online): 1694-0814
www.IJCSI.org 369
Copyright (c) 2013 International Journal of Computer Science Issues. All Rights Reserved.
IJCSI International Journal of Computer Science Issues, Vol. 10, Issue 1, No 1, January 2013
ISSN (Print): 1694-0784 | ISSN (Online): 1694-0814
www.IJCSI.org 370
Copyright (c) 2013 International Journal of Computer Science Issues. All Rights Reserved.