Encryption and Decryption Techniques in Cloud Computing
Keywords:
Cloud Computing, Data, Encryption, Privacy, SecurityAbstract
While big data applications in cloud computing are rapidly growing in popularity, privacy issues have increased dramatically. Encrypting data in real time is one of the most important issues during data processing and transfer. In order to reach an acceptable performance level, many modern applications forego data encryptions, which is incompatible with privacy concerns. This article covers several virtualized processes and analyses the cloud technology safety challenge and way to solve in brightness of cloud technology ideas and characteristics. Information confidentiality and dependability of services are major cybersecurity problems in internet applications. A singular monitoring platform will not address the cloud hosting privacy challenge; to defend the whole clouds infrastructure, a mix of old and new methods and technology must be employed in harmony. The author demonstrates the use of encoding and decoding techniques in aspects of the data confidentiality, computation time, and virtualized systems effectiveness. On top of this infrastructure, they may enable dynamically data storage functions on encoded information sections for inclusion, deleting, and updating, which we think will be future work for improvement.
Downloads
References
. Dash SK, Sahoo JP, Mohapatra S, Pati SP. Sensor-Cloud: Assimilation of wireless sensor network and the cloud. Lect Notes Inst Comput Sci Soc Telecommun Eng LNICST. 2012;84(PART 1):455–64.
. Parhi M, Pattanayak BK, Patra MR. A Multi-agent-Based Framework for Cloud Service Description and Discovery Using Ontology. Adv Intell Syst Comput. 2015;308 AISC(VOLUME 1):337–48.
. Software MR-J of S and, 2013 undefined. Cloud computing security: The scientific challenge, and a survey of solutions. Elsevier. 2013;86:2263–8.
. Bastia A, Parhi M, Pattanayak BK, Patra MR. Service Composition Using Efficient Multi-agents in Cloud Computing Environment. In: Advances in Intelligent Systems and Computing. 2015.
. Lai J, Deng R, Guan C, on JW-IT, 2013 undefined. Attribute-based encryption with verifiable outsourced decryption. ieeexplore.ieee.org. 2013;8(8):1343.
. Ahamed F, … SS-C of the, 2013 undefined. Cloud computing: Security and reliability issues. ibimapublishing.com. 2013;2013:12.
. Chen Y, Paxson V, California RK-U of, No BR, 2010 undefined. What’s new about cloud computing security. Citeseer. 2010;
. Aggarwal N, Tyagi P, Dubey BP, Pilli ES. Cloud Computing: Data Storage Security Analysis and its Challenges. Int J Comput Appl. 2013;70(24):975–8887.
. Moghaddam F, … OK-2013 I 2nd, 2013 undefined. A comparative study of applying real-time encryption in cloud computing environments. ieeexplore.ieee.org. 2013;
. Zhao Y, Ou K, Zeng W, Song W. Research on cloud storage architecture and key technologies. ACM Int Conf Proceeding Ser. 2009;403:1044–8.
. Furht B. Cloud Computing Fundamentals. Handb Cloud Comput. 2010;3–19.