Elaborating Security Algorithms in Cloud Environment

Whenever one decides to travel from his/her source to destination, he/she boards a bus or a train. After taking a ticket, the person hold back to his/her seat till the destination is reached. Similarly other passengers in the bus or train takes their particular tickets as per their individual destinations and it hardly bothers one where they go. Same is the story in case of cloud computing. Cloud computing is very similar to such a bus or a train which carries data and information for multiple and different users and permits them to access its service at minimal cost. The term “Cloud” originated from a network design that was utilized by concerned network engineers to represent the location of different network devices and inter-connection among them [1, 5]. The Fig. 1 below displays the set up involved in cloud computing.