ECDSA Algorithm for Cloud Security 
B.Gahani Nath1, B.B.V.Satya Varaprasad2, K.Sai Manidhar3, Sridevi Sakhamuri4

1B.Gahani Nath, B.Tech Student, Department of Electronics & Computer Engineering, Koneru Lakshmaiah Education Foundation, Vaddeswaram (A.P), India.
2B.B.V.Satya varaprasad, Asst. Professor, Department of Electronics & Computer Engineering, Koneru Lakshmaiah Education Foundation, Vaddeswaram (A.P), India.
3K.Sai Manidhar, B.Tech Student, Department of Electronics & Computer Engineering, Koneru Lakshmaiah Education Foundation, Vaddeswaram (A.P), India.
4Sridevi Sakhamuri, Asst. Professor, Department of Electronics & Computer Engineering, Koneru Lakshmaiah Education Foundation, Vaddeswaram (A.P), India.

Manuscript received on 18 April 2019 | Revised Manuscript received on 25 April 2019 | Manuscript published on 30 April 2019 | PP: 1726-1729 | Volume-8 Issue-4, April 2019 | Retrieval Number: D6634048419/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Cloud computing is the provision of a variety of computing services—servers, databases, storage, programming, network etc—over the Internet (“the cloud”) to offer quicker development, adjustable resources and economies of scale. You just pay for what you use, helping bring down your working costs, run your framework on the go effectively and scale up your resources as your business grows.
Keywords: Cloud Computing, Server, Database, Network

Scope of the Article: Cloud Computing