<?xml version="1.0" encoding="utf-8"?><!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2d1 20170631//EN" "JATS-journalpublishing1.dtd">
<ArticleSet>
  <Article>
    <Journal>
      <PublisherName>IJIRCSTJournal</PublisherName>
      <JournalTitle>International Journal of Innovative Research in Computer Science and Technology</JournalTitle>
      <PISSN>I</PISSN>
      <EISSN>S</EISSN>
      <Volume-Issue>Volume 8 Issue 3</Volume-Issue>
      <PartNumber/>
      <IssueTopic>Computer Science and Engineering</IssueTopic>
      <IssueLanguage>English</IssueLanguage>
      <Season>May - June 2020</Season>
      <SpecialIssue>N</SpecialIssue>
      <SupplementaryIssue>N</SupplementaryIssue>
      <IssueOA>Y</IssueOA>
      <PubDate>
        <Year>2020</Year>
        <Month>06</Month>
        <Day>27</Day>
      </PubDate>
      <ArticleType>Computer Sciences</ArticleType>
      <ArticleTitle>Analysis of Frameworks in Cloud Environment</ArticleTitle>
      <SubTitle/>
      <ArticleLanguage>English</ArticleLanguage>
      <ArticleOA>Y</ArticleOA>
      <FirstPage>251</FirstPage>
      <LastPage>254</LastPage>
      <AuthorList>
        <Author>
          <FirstName>Ashima Narang</FirstName>          
          <AuthorLanguage>English</AuthorLanguage>
          <Affiliation/>
          <CorrespondingAuthor>Y</CorrespondingAuthor>
          <ORCID/>
             
        </Author>
      </AuthorList>
      <DOI>https://doi.org/10.21276/ijircst.2020.8.3.38</DOI>
      <Abstract>Cloud is one of the advances, whose utilization is being expanded step by step for various purposes according to client&amp;#39;s prerequisite. For the most part this innovation is utilized for capacity reason as a result of this, the clients need not to have any equipment stockpiling gadgets rather than that their information will be put away on the system. These frameworks must be increasingly secure with the goal that they give secrecy, protection and assurance for their consumer loyalty. Different calculations were created to make sure about cloud systems yet these calculations can&amp;#39;t meet the prerequisites of the clients. In this paper, there is a comparison, of a hybrid approach and the individual algorithm to get the best results.</Abstract>
      <AbstractLanguage>English</AbstractLanguage>
      <Keywords>RSA, ECC, Hybrid, Cloud Computing, Encryption</Keywords>
      <URLs>
        <Abstract>https://ijircst.org/abstract.php?article_id=420</Abstract>
      </URLs>      
    </Journal>
  </Article>
</ArticleSet>