An Overview on the Study of Data Encryption and Decryption in Cloud Computing
Journal Title: International Journal of Innovative Research in Computer Science and Technology - Year 2021, Vol 9, Issue 6
Abstract
While big data technologies in cloud computing are rapidly growing in popularity, privacy issues have increased dramatically. Encrypting data in real-time is one of the greatest important issues throughout data acquisition and transfer. In order to reach an acceptable performance level, many modern applications forego data encryptions, which is unsuitable with privacy issues. In light of cloud computing concepts and features, this article examines various cloud computing systems and analyzes the cloud computing security problem and solution. Data privacy but instead service availability are major security problems in cloud computing. A single security solution will not address the cloud computing security challenge; to defend the whole cloud computing system, a mix of old and new technologies and procedures must be employed in harmony. The author demonstrates the use of encryption and decryption algorithms in terms of data confidentiality, great computational efficiency, and cloud-based system effectiveness. On top of this architecture, they may enable dynamic block-level actions on data encryption blocks for insertion, removal, including update, which we believe will be future work for enhancement.
Authors and Affiliations
Swapnil Raj, Mrinal Paliwal
Concurrent Data Processing in Microsoft Dynamics CRM Using Python
The realm of Customer Relationship Management (CRM) has seen significant improvements with the integration of automation and data analytics. Python, known for its robust data manipulation libraries, offers a seamless exp...
Intelligent Plant Disease Diagnosis Using Machine Learning Techniques- A Review
No matter how we look at it, there are no chances to live without the flora surrounding us. One can be troubled by a broad range of diseases that attack the integrity of his or her health. Basically, all the plant parts...
Wind Turbine Performance with Permanent Magnet Generator and Active Control
Electricity's discovery and subsequent expansion over the previous few hundred years have firmly cemented its use and enhanced our dependency on it. This is since it is the most basic and cost-effective technique of carr...
A Review on Drinking Water Treatment with Disinfectant
The majority of the world's natural water sources are not always safe to consume untreated. Raw water from rivers, lakes, ponds, and groundwater can include microorganisms. Waterborne diseases can be contracted by consum...
An Identified Kidney Cancer Using Decision Tree and Naïve Bayes Algorithm in Data Mining
Several clients with kidney cancer are able to receive curative treatment because there is nowadays no way to detect the cancer in its initial stages. To decrease the likelihood of kidney tumor cells and the need for tra...