Cryptography Techniques in Cloud Computing and their Role and Applications

Authors

  • Rakhi Tiwari, Ajay Jain

DOI:

https://doi.org/10.17762/msea.v71i3.2603

Abstract

Introduction: Stream cyphers and block cyphers, as well as hash functions, are the most common types of cyphers used in cryptography. In order to safeguard and preserve the integrity and confidentiality of a piece of information, a method known as encryption is used. There are primarily two types of encryption algorithms: public-key and private-key. Two types of public key encryption exist: (1) algorithms that use just a single key, such Diffie-Hellman and RSA; and (2) methods that use both a single key and several public keys. Among the primary differences between the two is the usage of keys in each.

Aim of the study: the main aim of the study is to Cryptography Techniques In Cloud Computing And Their Role And Applications

Material and method: The use of cloud cryptography protects sensitive data even when it is stored outside of the corporate IT environment. To safeguard data in the cloud, we must rely on a variety of cryptographic approaches and algorithms since we lack a mechanism that allows us to exert physical or logical control over the storage of data in this manner.

Conclusion: Users may access cloud computing resources and services over the internet, provided by cloud service providers, at any time and from any location. The fact that every enterprise is moving its data to the cloud implies they are relying on the storage services offered by the cloud provider. As a result, several assaults on that data must be guarded against.

Downloads

Published

2022-05-27

How to Cite

Ajay Jain, R. T. . (2022). Cryptography Techniques in Cloud Computing and their Role and Applications. Mathematical Statistician and Engineering Applications, 71(3), 2021–2029. https://doi.org/10.17762/msea.v71i3.2603

Issue

Section

Articles