<?xml version="1.0" encoding="utf-8"?><!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2d1 20170631//EN" "JATS-journalpublishing1.dtd">
<ArticleSet>
  <Article>
    <Journal>
      <PublisherName>IJIRCSTJournal</PublisherName>
      <JournalTitle>International Journal of Innovative Research in Computer Science and Technology</JournalTitle>
      <PISSN>I</PISSN>
      <EISSN>S</EISSN>
      <Volume-Issue>Volume 9 Issue 6</Volume-Issue>
      <PartNumber/>
      <IssueTopic>Computer Science</IssueTopic>
      <IssueLanguage>English</IssueLanguage>
      <Season>November - December 2021</Season>
      <SpecialIssue>N</SpecialIssue>
      <SupplementaryIssue>N</SupplementaryIssue>
      <IssueOA>Y</IssueOA>
      <PubDate>
        <Year>2022</Year>
        <Month>01</Month>
        <Day>27</Day>
      </PubDate>
      <ArticleType>Computer Sciences</ArticleType>
      <ArticleTitle>Encryption and Decryption Techniques in Cloud Computing</ArticleTitle>
      <SubTitle/>
      <ArticleLanguage>English</ArticleLanguage>
      <ArticleOA>Y</ArticleOA>
      <FirstPage>225</FirstPage>
      <LastPage>228</LastPage>
      <AuthorList>
        <Author>
          <FirstName>Pankaj Saraswat</FirstName>          
          <AuthorLanguage>English</AuthorLanguage>
          <Affiliation/>
          <CorrespondingAuthor>Y</CorrespondingAuthor>
          <ORCID/>
                      <FirstName>Swapnil Raj</FirstName>          
          <AuthorLanguage>English</AuthorLanguage>
          <Affiliation/>
          <CorrespondingAuthor>N</CorrespondingAuthor>
          <ORCID/>
           
        </Author>
      </AuthorList>
      <DOI>https://doi.org/10.55524/ijircst.2021.9.6.50</DOI>
      <Abstract>While big data applications in cloud computing are rapidly growing in popularity, privacy issues have increased dramatically. Encrypting data in real time is one of the most important issues during data processing and transfer. In order to reach an acceptable performance level, many modern applications forego data encryptions, which is incompatible with privacy concerns. This article covers several virtualized processes and analyses the cloud technology safety challenge and way to solve in brightness of cloud technology ideas and characteristics. Information confidentiality and dependability of services are major cybersecurity problems in internet applications. A singular monitoring platform will not address the cloud hosting privacy challenge; to defend the whole clouds infrastructure, a mix of old and new methods and technology must be employed in harmony. The author demonstrates the use of encoding and decoding techniques in aspects of the data confidentiality, computation time, and virtualized systems effectiveness. On top of this infrastructure, they may enable dynamically data storage functions on encoded information sections for inclusion, deleting, and updating, which we think will be future work for improvement.</Abstract>
      <AbstractLanguage>English</AbstractLanguage>
      <Keywords>Cloud Computing, Data, Encryption, Privacy, Security.</Keywords>
      <URLs>
        <Abstract>https://ijircst.org/abstract.php?article_id=670</Abstract>
      </URLs>      
    </Journal>
  </Article>
</ArticleSet>