Cloud Data Security through BB84 Protocol and Genetic Algorithm
In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authen...
Main Authors: | , |
---|---|
Format: | Article |
Language: | Arabic |
Published: |
College of Science for Women, University of Baghdad
2022-12-01
|
Series: | Baghdad Science Journal |
Subjects: | |
Online Access: | https://bsj.uobaghdad.edu.iq/index.php/BSJ/article/view/7281 |