WASET
	@article{(Open Science Index):https://publications.waset.org/pdf/17363,
	  title     = {Cloud Computing Cryptography "State-of-the-Art"},
	  author    = {Omer K. Jasim and  Safia Abbas and  El-Sayed M. El-Horbaty and  Abdel-Badeeh M. Salem},
	  country	= {},
	  institution	= {},
	  abstract     = {Cloud computing technology is very useful in present day to day life, it uses the internet and the central remote servers to provide and maintain data as well as applications. Such applications in turn can be used by the end users via the cloud communications without any installation. Moreover, the end users’ data files can be accessed and manipulated from any other computer using the internet services. Despite the flexibility of data and application accessing and usage that cloud computing environments provide, there are many questions still coming up on how to gain a trusted environment that protect data and applications in clouds from hackers and intruders. This paper surveys the “keys generation and management” mechanism and encryption/decryption algorithms used in cloud computing environments, we proposed new security architecture for cloud computing environment that considers the various security gaps as much as possible. A new cryptographic environment that implements quantum mechanics in order to gain more trusted with less computation cloud communications is given.
},
	    journal   = {International Journal of Nuclear and Quantum Engineering},
	  volume    = {7},
	  number    = {8},
	  year      = {2013},
	  pages     = {1161 - 1164},
	  ee        = {https://publications.waset.org/pdf/17363},
	  url   	= {https://publications.waset.org/vol/80},
	  bibsource = {https://publications.waset.org/},
	  issn  	= {eISSN: 1307-6892},
	  publisher = {World Academy of Science, Engineering and Technology},
	  index 	= {Open Science Index 80, 2013},
	}