An Overview on the Study of Data Encryption and Decryption in Cloud Computing
DOI:
https://doi.org/10.55524/Keywords:
Cloud Computing, Decryption, Encryption, Privacy, SecurityAbstract
While big data technologies in cloud computing are rapidly growing in popularity, privacy issues have increased dramatically. Encrypting data in real-time is one of the greatest important issues throughout data acquisition and transfer. In order to reach an acceptable performance level, many modern applications forego data encryptions, which is unsuitable with privacy issues. In light of cloud computing concepts and features, this article examines various cloud computing systems and analyzes the cloud computing security problem and solution. Data privacy but instead service availability are major security problems in cloud computing. A single security solution will not address the cloud computing security challenge; to defend the whole cloud computing system, a mix of old and new technologies and procedures must be employed in harmony. The author demonstrates the use of encryption and decryption algorithms in terms of data confidentiality, great computational efficiency, and cloud-based system effectiveness. On top of this architecture, they may enable dynamic block-level actions on data encryption blocks for insertion, removal, including update, which we believe will be future work for enhancement.
Downloads
References
S. K. Dash, J. P. Sahoo, S. Mohapatra, and S. P. Pati, “Sensor-Cloud: Assimilation of wireless sensor network and the cloud,” Lect. Notes Inst. Comput. Sci. Soc. Telecommun. Eng. LNICST, vol. 84, no. PART 1, pp. 455–464, 2012, doi: 10.1007/978-3-642-27299- 8_48.
M. Parhi, B. K. Pattanayak, and M. R. Patra, “A Multi agent-Based Framework for Cloud Service Description and Discovery Using Ontology,” Adv. Intell. Syst. Comput., vol. 308 AISC, no. VOLUME 1, pp. 337–348, 2015, doi: 10.1007/978-81-322-2012- 1_35.
M. R.-J. of S. and Software and undefined 2013, “Cloud computing security: The scientific challenge, and a survey of solutions,” Elsevier, vol. 86, pp. 2263– 2268, 2013, doi: 10.1016/j.jss.2012.12.025.
A. Bastia, M. Parhi, B. K. Pattanayak, and M. R. Patra, “Service Composition Using Efficient Multi-agents in Cloud Computing Environment,” Adv. Intell. Syst. Comput., vol. 308 AISC, no. VOLUME 1, pp. 357– 370, 2015, doi: 10.1007/978-81-322-2012-1_37.
F. Ahamed, … S. S.-C. of the, and undefined 2013, “Cloud computing: Security and reliability issues,” ibimapublishing.com, vol. 2013, p. 12, 2013, doi: 10.5171/2013.655710.
D. L.-I. C. Computing and undefined 2017, “Cloud computing changes data integration forever: What’s needed right now,” ieeexplore.ieee.org.
Y. Zhao, K. Ou, W. Zeng, and W. Song, “Research on cloud storage architecture and key technologies,” ACM Int. Conf. Proceeding Ser., vol. 403, pp. 1044– 1048, 2009, doi: 10.1145/1655925.1656114.
B. Furht, “Cloud Computing Fundamentals,” Handb. Cloud Comput., pp. 3–19, 2010, doi: 10.1007/978-1- 4419-6524-0_1.
G. N. Srikanth, “A Study on Cloud Computing Security with Encryption and Decryption Technique,” vol. 4, no. 34, pp. 1–5, 2016.
P. Kanasagara, “A Review on Data Encryption Algorithm in Clould Computing,” Int. J. Adv. Res.
Innov. Ideas Educ., no. 5, pp. 569–576, 2017. [11]S. Singla and J. Singh, “Cloud data security using authentication and encryption technique,” Int. J. Adv. Res. Comput. Eng. Technol., vol. 2, no. 7, pp. 2232– 2235, 2013, [Online]. Available: http://ijarcet.org/wp content/uploads/IJARCET-VOL-2-ISSUE-7-2232- 2235.pdf.