Encryption and Decryption Techniques in Cloud Computing

Authors

  • Pankaj Saraswat SOEIT, Sanskriti University, Mathura, Uttar Pradesh, India Author
  • Swapnil Raj SOEIT, Sanskriti University, Mathura, Uttar Pradesh, India Author

Keywords:

Cloud Computing, Data, Encryption, Privacy, Security

Abstract

While big data applications in cloud  computing are rapidly growing in popularity, privacy  issues have increased dramatically. Encrypting data in real  time is one of the most important issues during data  processing and transfer. In order to reach an acceptable  performance level, many modern applications forego data  encryptions, which is incompatible with privacy concerns.  This article covers several virtualized processes and  analyses the cloud technology safety challenge and way to  solve in brightness of cloud technology ideas and  characteristics. Information confidentiality and  dependability of services are major cybersecurity problems  in internet applications. A singular monitoring platform  will not address the cloud hosting privacy challenge; to  defend the whole clouds infrastructure, a mix of old and  new methods and technology must be employed in  harmony. The author demonstrates the use of encoding and  decoding techniques in aspects of the data confidentiality,  computation time, and virtualized systems effectiveness.  On top of this infrastructure, they may enable dynamically  data storage functions on encoded information sections for  inclusion, deleting, and updating, which we think will be  future work for improvement. 

Downloads

Download data is not yet available.

References

. Dash SK, Sahoo JP, Mohapatra S, Pati SP. Sensor-Cloud: Assimilation of wireless sensor network and the cloud. Lect Notes Inst Comput Sci Soc Telecommun Eng LNICST. 2012;84(PART 1):455–64.

. Parhi M, Pattanayak BK, Patra MR. A Multi-agent-Based Framework for Cloud Service Description and Discovery Using Ontology. Adv Intell Syst Comput. 2015;308 AISC(VOLUME 1):337–48.

. Software MR-J of S and, 2013 undefined. Cloud computing security: The scientific challenge, and a survey of solutions. Elsevier. 2013;86:2263–8.

. Bastia A, Parhi M, Pattanayak BK, Patra MR. Service Composition Using Efficient Multi-agents in Cloud Computing Environment. In: Advances in Intelligent Systems and Computing. 2015.

. Lai J, Deng R, Guan C, on JW-IT, 2013 undefined. Attribute-based encryption with verifiable outsourced decryption. ieeexplore.ieee.org. 2013;8(8):1343.

. Ahamed F, … SS-C of the, 2013 undefined. Cloud computing: Security and reliability issues. ibimapublishing.com. 2013;2013:12.

. Chen Y, Paxson V, California RK-U of, No BR, 2010 undefined. What’s new about cloud computing security. Citeseer. 2010;

. Aggarwal N, Tyagi P, Dubey BP, Pilli ES. Cloud Computing: Data Storage Security Analysis and its Challenges. Int J Comput Appl. 2013;70(24):975–8887.

. Moghaddam F, … OK-2013 I 2nd, 2013 undefined. A comparative study of applying real-time encryption in cloud computing environments. ieeexplore.ieee.org. 2013;

. Zhao Y, Ou K, Zeng W, Song W. Research on cloud storage architecture and key technologies. ACM Int Conf Proceeding Ser. 2009;403:1044–8.

. Furht B. Cloud Computing Fundamentals. Handb Cloud Comput. 2010;3–19.

Downloads

Published

2021-11-30

How to Cite

Encryption and Decryption Techniques in Cloud Computing . (2021). International Journal of Innovative Research in Computer Science & Technology, 9(6), 225–228. Retrieved from https://acspublisher.com/journals/index.php/ijircst/article/view/11131