ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

A Survey on Data Encryption and Decryption Models

Journal: International Journal of Trend in Scientific Research and Development (Vol.5, No. 4)

Publication Date:

Authors : ;

Page : 593-597

Keywords : Cloud Computing; Authentication; Encryption Algorithm; Security; Privacy; Cloud storage system; issues in cloud storage; data protection strategies;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Data storage paradigm in cloud computing brings many hard problems on the security. The critical nature of the cloud computing is to incorporate big number of statistics through networks, the need is even more critical. They fear about their documents being visible or maybe compromised through malicious and dubious people because that's what happened within the past. User debts had been hacked, cloud garage structures failed, files and private statistics have been uncovered. So how are you going to efficiently save you that from happening even if your account gets hacked or something occurs in your cloud garage issuer. Data encryption techniques are required to shield the integrity of the stored facts. In the beyond, many corporations felt comfy allowing the cloud providers to control all their facts, believing that protection risks may be managed thru contracts, controls and audits. Over time it has come to be apparent, but, that cloud companies cannot honor such commitments whilst responding to government requests for records. In this paper, I will attention on cloud storage vendors, cloud protection demanding situations, encryption methodologies. Saif Ulla Shariff | M Ganeshan | Mariam Fatima "A Survey on Data Encryption and Decryption Models" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd42364.pdf Paper URL: https://www.ijtsrd.comcomputer-science/computer-security/42364/a-survey-on-data-encryption-and-decryption-models/saif-ulla-shariff

Last modified: 2021-07-12 20:22:08