Massachusetts Institute of Technology**We aren't endorsed by this school
Course
COMPUTERSC 238
Subject
Information Systems
Date
Dec 17, 2024
Pages
3
Uploaded by CommodoreRainRaccoon37
Name of UniversityEssay(Data Encryption)Student Name:Date
Data EncryptionEncryption is an essential element for data security. However, assume that customers think that their data is encrypted prior to making a transaction. In such scenario, their security and that of their company are compromised, which is why it is suggested that clients encrypt their data before moving it to the cloud. It's difficult since the majority of customers believe they're encrypting data before sending it to the cloud, even though they've never done it before. One of the really unexpected aspects is that the majority of cloud service providers enable encrypted information to be transmitted to the cloud for a maximum of 10 days. Thus, it is obvious that there are many instances in which encryption is unnecessary. It defers to cloud services for the preservation of encrypted data.When customers examine cloud storage options, they should evaluate whether providers offer safe offline storage, such as Google, Amazon, Dropbox, Cloud flare, and Google Drive. These platforms support consumers to safely and discreetly store data. A cloud computing service provider may provide offline storage or encryption. This method, however, does not ensure the security of consumers' data. For instance, encryption does not always ensure that data is secure against unauthorized access and misappropriation. (Agarwal, 2017).There are two methods. The first is to encrypt data stored in the user's data center or cloud to protect it from unauthorized third parties who may get access to the user's personal information or private cloud membership. Encryption, which occurs safely, facilitates the transfer of encrypted data before to the transmission of any data. To safeguard against data theft by unauthorized parties, users may encrypt data before it is sent to or stored in the cloud. Numerous companies provide the Cloud Encryption service. It initiates the encryption process necessary to protect sensitive data stored on a device or piece of software. The device may subsequently be connected to one of the security service providers and to the cloud. (Aurora, 2013)2
ReferencesAgarwal, P. (2017). Cryptography Based Security for Cloud Computing System. International Journal of Advanced Research in Computer Science, 8(5).Arora, R., Parashar, A., & Transforming, C. C. I. (2013). Secure user data in cloud computing using encryption algorithms. International journal of engineering research and applications, 3(4), 1922-1926.3