Abstract
Cloud computing technology is the most important development in engineering. The technology is service-oriented, prioritizing cost reduction, equipment reduction, and payment only for used services. This article reviews current research on security risks and possible solutions for cloud computing. Cloud computing refers to Information systems, network, and device storage are examples of customer-provided services. Because the cloud is operated remotely, it can be accessed from anywhere. Computer service is used by the cloud provider. Unauthorized individuals may access critical information on the cloud, making it insecure. As a consequence, to ensure comprehensive data security, specialist data protection encryption technology is deployed. The topic of data security in cloud computing is discussed in this article. This is a study of cloud data and the security challenges that come with it. To achieve a better result than previous research endeavors with unique constraints, this study used two data encryption and decryption algorithms. The suggested approach is both quicker and easier to use than the RSA-Blowfish method.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.