Rishita Tyagi
Manipal University, Jaipur
Download PDFDistributed computing conveys figuring administrations over the web instead of keeping records on a restrictive group drive or local memory drives. Processing administrations can incorporate workers, storage, information bases, systems administration, and programming. The fundamental explanation and extraordinary benefit of utilizing the cloud are that the client can store and access the put-away information whenever and get every one of its administrations for a minimal expense. Notwithstanding this, Security has consistently been a major worry with distributed computing because the client doesn't directly keep up with the data in the cloud. When the client transfers or stores information during a distributed computing system, the data proprietors will probably not comprehend how their information is being sent. The client is unconscious of whether the data is being gathered, examined, and got to by an outsider. To overcome the security issues, different cryptography techniques are proposed. This paper focused on distributed computing fundamentals and talked about additional cryptography calculations present in the current work.
Keywords: Distributed computing; cloud; cryptography
Disclaimer: Indexing of published papers is subject to the evaluation and acceptance criteria of the respective indexing agencies. While we strive to maintain high academic and editorial standards, International Journal of Research in Science and Technology does not guarantee the indexing of any published paper. Acceptance and inclusion in indexing databases are determined by the quality, originality, and relevance of the paper, and are at the sole discretion of the indexing bodies.