Abstract

Cloud computing technology is the most important development in engineering. The technology is service-oriented, prioritizing cost reduction, equipment reduction, and payment only for used services. This article reviews current research on security risks and possible solutions for cloud computing. Cloud computing refers to Information systems, network, and device storage are examples of customer-provided services. Because the cloud is operated remotely, it can be accessed from anywhere. Computer service is used by the cloud provider. Unauthorized individuals may access critical information on the cloud, making it insecure. As a consequence, to ensure comprehensive data security, specialist data protection encryption technology is deployed. The topic of data security in cloud computing is discussed in this article. This is a study of cloud data and the security challenges that come with it. To achieve a better result than previous research endeavors with unique constraints, this study used two data encryption and decryption algorithms. The suggested approach is both quicker and easier to use than the RSA-Blowfish method.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call