Secure Cloud Computing Using Cryptographic Algorithms

Authors

  • N. S. Patil
  • Sheetal S. Patil
  • Avinash M. Pawar
  • Akarsh Kumar Mishra
  • Kunal Jain
  • Ankit Pandey

Keywords:

Cloud computing process, types of deployment models, file-hosting, Decryption-encryption, Denial of Service, Counter measures, cryptography, cloud security, AES and DES, Triple-DES.

Abstract

Cloud computing has been a game changer altogether in the field of IT communications and has enabled to widen the scope and horizon of the Software Engineering and IT revolution. So, more and more studies are being conducted on cloud computing. The study conducted by us focuses on cloud computing. From a promising commercial concept, cloud computing has developed into one of the IT industry’s fastest-growing segments. IT Organizations have voiced worry over important problems (like security) that are present given the broad putting cloud computing into practise. These kinds of issues arise from the fact that data is kept in remote locations, away from. It can actually be kept anywhere, including the customer’s location. Security, in particular, is one of the most contentious issues in this field. To address and solve this issue, we would use cryptographic algorithms to present a secure cloud simulation. In this study, we outline a method for protecting data using various compression and encryption algorithms while also keeping its location a secret from the users who store and access it.

Published

2022-08-24