Using Encryption Algorithms in Cloud Computing for Data Security and Privacy

Authors

  • Saurabh wararkar Department of Computer Science & Engineering Shri Sai College of Engineering & Technology, Chandrapur, India
  • NeehalB. Jiwane Department of Computer Science and Engineering, Technology, Shri Sai, College Chandrapur, India
  • Vijay M. Rakhade Department of Computer Science and Engineering, Technology, Shri Sai, College Chandrapur, India

DOI:

https://doi.org/10.59367/esdyrg12

Keywords:

online storage, cypher text retrieval, Privacy and encryption techniques

Abstract

The As cloud computing emerges as a revolutionary paradigm in information technology, concerns surrounding usability, respectability, and, most prominently, security persist as major challenges. Despite the convenience and efficiency offered by cloud services, issues such as data protection, privacy, and overall security continue to impede the seamless adoption of this transformative technology.

This research delves into the pivotal aspect of cloud computing—data security and privacy, with a particular focus on cloud storage. With privacy standing at the forefront of user concerns, the study explores the efficacy of encryption algorithms in safeguarding sensitive information. Encryption, a well-established technology, serves as a crucial tool for securing data against unauthorized access and ensuring confidentiality.

The investigation centers around the implementation of a hybrid encryption approach, employing both public and private key encryption techniques. This combination aims not only to conceal sensitive user data but also to provide a robust mechanism for cipher text retrieval. The paper critically assesses the viability and effectiveness of utilizing encryption algorithms as a cornerstone for enhancing data security and privacy within the realm of cloud storage.

By addressing the persistent challenges of usability, respectability, and security in cloud computing, this research contributes to the ongoing discourse on fortifying the foundations of the next big frontier in information technology. Through an in-depth examination of encryption algorithms, this study aims to pave the way for more secure, trustworthy, and privacy-respecting cloud storage solutions.

References

Yadav, L.N., "Predictive Acknowledgement using TRE system: Reducing Costs and Bandwidth," International Journal of Research in Electronics and Computer Engineering (IJRECE), Vol. 7, Issue 1, January-March 2019, ISSN: 2348-2281.

Rakhade, V.M., "Reducing Routing Distraction in IP Networks using Cross-Layer Methodology," Proceedings of the International Conference on Research Trends in Engineering, Science, and Technology (ICRTEST 2017), Volume 5, Issue 1, Special Issue, 21-22 January 2017, ISSN: 2321-8169.

Maggiani, Rich, "Cloud Computing is Changing How We Communicate," Solari Communication.

Barr, Randolph, "How to Gain Comfort in Losing Control to the Cloud," Qualys Inc.

Boss, Greg; Malladi, Padma; Quan, Dennis; Legregni, Linda; Hall, Harold, "HiPODS," www.ibm.com/developerworks/websphere/zones/hipods.

Dillon, Tharam; Wu, Chen; Chang, Elizabeth, "Cloud Computing: Issues and Challenges," Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010.

Unknown Author, "Cloud Computing Security Forecast: Clear Skies," June 13, 2009, http://server.zol.com.cn/183/1830464.html.

Mills, Elinor, "Information Security Issues in Cloud Computing Environment," Netinfo Security, doi:10.3969/j.issn.1671-1122.2010.02.026.

Downloads

Published

2024-03-11

Issue

Section

Articles

How to Cite

Using Encryption Algorithms in Cloud Computing for Data Security and Privacy. (2024). International Journal of Futuristic Innovation in Arts, Humanities and Management (IJFIAHM), 3(1), 416-422. https://doi.org/10.59367/esdyrg12

Similar Articles

1-10 of 37

You may also start an advanced similarity search for this article.