A Review on Encryption and Decryption Techniques with Multiple Key in Clouds Data
Authors: Teena chouhan, Asst. Prof. Ms. Priya Sen
Certificate: View Certificate
Abstract
Cloud computing is considered as an ondemand delivery of services in which applications and infrastructure are allocated to users as metered services over networks. Cloud computing services are much cheaper as the user does not have to setup any computing hardware support. It is an emerging technology that delivers computing services such as online business applications and data storage over the Internet. Implementing cloud enables a distributed working environment, where it reduces expenditure of the organization, provides data, information security and so on. Cloud computing has created a paradigm shift in the way information technology resources are provided and consumed by increasing agility and lowering costs. However, cloud-security concerns appear at the top of almost all surveys. Traditional security solutions are having a hard time trying to keep up with the growing security needs of the ever-changing threat landscape in today’s cloud environment. This research paper aims to explore the concept of cloud security and its impact on the present day IT environment. We try to classify the security risks in the cloud environment, assess the cost of cloud security, delve into the types of attacks, look for currently available security solutions and arrive at a roadmap for cloud security.. Cloud Server provides storage and search services. To perform efficient searches, the cloud uses verification keys to maintain privacy protection or meet authentication requirements and provide equivalent proof of encrypted documents based on tokens. Most security issues are caused by people deliberately creating malicious or malicious purposes. This Paper reviews and examines some Encryption and Decryption technologies. As a result, the better solution to the symmetric key encryption and the asymmetric key encryption is provided.
Introduction
Computer took much space like a big room with exorbitant electronic parts like network devices and processors. These days, small storage devices and costly electronic parts have replaced those large spaces by reasonable network devices. As a result of this improvement, a large distributed system is originated to integrate a vast number of resources in a single unit that can perform highly exhausting tasks. The distributed system has two prominent components, which are clusters and grids. Grid is the design for large heterogeneous and distributed networks, whereas cluster strengthens the amalgamation of homogeneous networks. The grid is most frequently used architecture by operators for creation of servant computational nodes. The cluster is comparatively costlier due to the expensive processing units [1]. As mentioned above, after cluster and grid now cloud computing has evolved as a novel distributed computing model. It provides a professional model for on demand computing services that is focused on cost-as-you-go method that customers can choose any resources, which are needed. In a virtualized manner, they provide a massive amount of computing power with the integration of all the computing resources in a single physical system [2]. Some security loopholes in cloud computing are still remaining as a demanding issue in cloud environment. As several businesses accept cloud technology, cloud computing is rising day by day and it poses many security challenges at the same time. Many enterprises hesitate to handover their sensitive information to cloud environment as many risks are associated with it. Several distinct threats are introduced to the privacy and security of cloud services due to the usage of virtual machine. Another issue is data migration over the Internet. The concept of multi-tenancy is used for sharing cloud resources among multiple users. This idea remains as an obstacle to the development of a fully safe architecture. The cloud provider is hesitant to incorporate security monitoring or intrusion detection and prevention systems due to transparency problems
Conclusion
Cloud computing offers the benefit of rapid deployment, cost savings, massive storage space, and easy-to-access anywhere and anytime to the system. It aims to empower the user by providing a seamless and rich functionality, regardless of the resources. So, it is evident that cloud computing is a swiftly evolved technology and broadly accepted computing environment around the globe. Cloud computing have many advantages over conventional environment and have the ability to handle most sudden peaks in application or service that demand on the cloud infrastructures. However, there are several privacy and security concerns that act as a barrier to the acceptance of cloud computingCloud Computing is still a rapidly evolving landscape; and one that requires us to stay current or fall behind. Still, we must not be complacent. Just as security professionals have done for ages, we must continue to evolve our processes, methods, and techniques in light of the opportunities that Cloud Computing brings to our industries. This evolution is critical to our long-term success as we find new ways to improve the efficacy and efficiency of our security enforcement and monitoring capabilities. Cloud Computing isn’t necessarily more or less secure than a traditional environment. As with any new technology, it creates new risks and new opportunities. In some cases moving to the cloud provides an opportunity to rearchitect older applications and infrastructure to meet or exceed modern security requirements. At other times the risk of moving sensitive data and applications to an emerging infrastructure might exceed our tolerance
Copyright
Copyright © 2025 Teena chouhan, Asst. Prof. Ms. Priya Sen . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.