<?xml version="1.0" encoding="utf-8"?><!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2d1 20170631//EN" "JATS-journalpublishing1.dtd">
<ArticleSet>
  <Article>
    <Journal>
      <PublisherName>IJIRCSTJournal</PublisherName>
      <JournalTitle>International Journal of Innovative Research in Computer Science and Technology</JournalTitle>
      <PISSN>I</PISSN>
      <EISSN>S</EISSN>
      <Volume-Issue>Volume 9 Issue 6</Volume-Issue>
      <PartNumber/>
      <IssueTopic>Computer Science</IssueTopic>
      <IssueLanguage>English</IssueLanguage>
      <Season>November - December 2021</Season>
      <SpecialIssue>N</SpecialIssue>
      <SupplementaryIssue>N</SupplementaryIssue>
      <IssueOA>Y</IssueOA>
      <PubDate>
        <Year>2022</Year>
        <Month>01</Month>
        <Day>26</Day>
      </PubDate>
      <ArticleType>Computer Sciences</ArticleType>
      <ArticleTitle>An Overview on the Study of Data Encryption and Decryption in Cloud Computing</ArticleTitle>
      <SubTitle/>
      <ArticleLanguage>English</ArticleLanguage>
      <ArticleOA>Y</ArticleOA>
      <FirstPage>139</FirstPage>
      <LastPage>143</LastPage>
      <AuthorList>
        <Author>
          <FirstName>Swapnil Raj</FirstName>          
          <AuthorLanguage>English</AuthorLanguage>
          <Affiliation/>
          <CorrespondingAuthor>Y</CorrespondingAuthor>
          <ORCID/>
                      <FirstName>Mrinal Paliwal</FirstName>          
          <AuthorLanguage>English</AuthorLanguage>
          <Affiliation/>
          <CorrespondingAuthor>N</CorrespondingAuthor>
          <ORCID/>
           
        </Author>
      </AuthorList>
      <DOI>https://doi.org/10.55524/ijircst.2021.9.6.32</DOI>
      <Abstract>While big data technologies in cloud computing are rapidly growing in popularity, privacy issues have increased dramatically. Encrypting data in real-time is one of the greatest important issues throughout data acquisition and transfer. In order to reach an acceptable performance level, many modern applications forego data encryptions, which is unsuitable with privacy issues. In light of cloud computing concepts and features, this article examines various cloud computing systems and analyzes the cloud computing security problem and solution. Data privacy but instead service availability are major security problems in cloud computing. A single security solution will not address the cloud computing security challenge; to defend the whole cloud computing system, a mix of old and new technologies and procedures must be employed in harmony. The author demonstrates the use of encryption and decryption algorithms in terms of data confidentiality, great computational efficiency, and cloud-based system effectiveness. On top of this architecture, they may enable dynamic block-level&amp;nbsp;actions on data encryption blocks for insertion, removal, including update, which we believe will be future work for enhancement.</Abstract>
      <AbstractLanguage>English</AbstractLanguage>
      <Keywords>Cloud Computing, Decryption, Encryption, Privacy, Security.</Keywords>
      <URLs>
        <Abstract>https://ijircst.org/abstract.php?article_id=652</Abstract>
      </URLs>      
    </Journal>
  </Article>
</ArticleSet>