An Overview on the Study of Data Encryption and Decryption in Cloud Computing

Authors

  • Swapnil Raj SOEIT, Sanskriti University, Mathura, Uttar Pradesh, India Author
  • Mrinal Paliwal SOEIT, Sanskriti University, Mathura, Uttar Pradesh, India Author

DOI:

https://doi.org/10.55524/

Keywords:

Cloud Computing, Decryption, Encryption, Privacy, Security

Abstract

 While big data technologies in cloud  computing are rapidly growing in popularity, privacy  issues have increased dramatically. Encrypting data in  real-time is one of the greatest important issues throughout  data acquisition and transfer. In order to reach an  acceptable performance level, many modern applications  forego data encryptions, which is unsuitable with privacy  issues. In light of cloud computing concepts and features,  this article examines various cloud computing systems and  analyzes the cloud computing security problem and  solution. Data privacy but instead service availability are  major security problems in cloud computing. A single  security solution will not address the cloud computing  security challenge; to defend the whole cloud computing  system, a mix of old and new technologies and procedures  must be employed in harmony. The author demonstrates  the use of encryption and decryption algorithms in terms  of data confidentiality, great computational efficiency, and  cloud-based system effectiveness. On top of this  architecture, they may enable dynamic block-level actions  on data encryption blocks for insertion, removal, including  update, which we believe will be future work for  enhancement. 

Downloads

Download data is not yet available.

References

S. K. Dash, J. P. Sahoo, S. Mohapatra, and S. P. Pati, “Sensor-Cloud: Assimilation of wireless sensor network and the cloud,” Lect. Notes Inst. Comput. Sci. Soc. Telecommun. Eng. LNICST, vol. 84, no. PART 1, pp. 455–464, 2012, doi: 10.1007/978-3-642-27299- 8_48.

M. Parhi, B. K. Pattanayak, and M. R. Patra, “A Multi agent-Based Framework for Cloud Service Description and Discovery Using Ontology,” Adv. Intell. Syst. Comput., vol. 308 AISC, no. VOLUME 1, pp. 337–348, 2015, doi: 10.1007/978-81-322-2012- 1_35.

M. R.-J. of S. and Software and undefined 2013, “Cloud computing security: The scientific challenge, and a survey of solutions,” Elsevier, vol. 86, pp. 2263– 2268, 2013, doi: 10.1016/j.jss.2012.12.025.

A. Bastia, M. Parhi, B. K. Pattanayak, and M. R. Patra, “Service Composition Using Efficient Multi-agents in Cloud Computing Environment,” Adv. Intell. Syst. Comput., vol. 308 AISC, no. VOLUME 1, pp. 357– 370, 2015, doi: 10.1007/978-81-322-2012-1_37.

F. Ahamed, … S. S.-C. of the, and undefined 2013, “Cloud computing: Security and reliability issues,” ibimapublishing.com, vol. 2013, p. 12, 2013, doi: 10.5171/2013.655710.

D. L.-I. C. Computing and undefined 2017, “Cloud computing changes data integration forever: What’s needed right now,” ieeexplore.ieee.org.

Y. Zhao, K. Ou, W. Zeng, and W. Song, “Research on cloud storage architecture and key technologies,” ACM Int. Conf. Proceeding Ser., vol. 403, pp. 1044– 1048, 2009, doi: 10.1145/1655925.1656114.

B. Furht, “Cloud Computing Fundamentals,” Handb. Cloud Comput., pp. 3–19, 2010, doi: 10.1007/978-1- 4419-6524-0_1.

G. N. Srikanth, “A Study on Cloud Computing Security with Encryption and Decryption Technique,” vol. 4, no. 34, pp. 1–5, 2016.

P. Kanasagara, “A Review on Data Encryption Algorithm in Clould Computing,” Int. J. Adv. Res.

Innov. Ideas Educ., no. 5, pp. 569–576, 2017. [11]S. Singla and J. Singh, “Cloud data security using authentication and encryption technique,” Int. J. Adv. Res. Comput. Eng. Technol., vol. 2, no. 7, pp. 2232– 2235, 2013, [Online]. Available: http://ijarcet.org/wp content/uploads/IJARCET-VOL-2-ISSUE-7-2232- 2235.pdf.

Downloads

Published

2021-11-30

How to Cite

An Overview on the Study of Data Encryption and Decryption in Cloud Computing . (2021). International Journal of Innovative Research in Computer Science & Technology, 9(6), 139–143. https://doi.org/10.55524/