Data Encryption Strategies in Cloud Protecting Data at Rest and in Transita

Main Article Content

Rajashekar Reddy Yasani, Karthik Venkatesh Ratnam

Abstract

In today's digital world, data encryption is an essential tool for protecting private information. The process entails applying encryption algorithms to convert readable data from its original format, known as plaintext, into an unreadable format, called ciphertext. In this way, the data is securely encrypted and cannot be accessed or understood by anybody without the correct decryption key. Symmetric and asymmetric encryption are the two most used forms. Symmetric encryption is an efficient method for protecting big volumes of data, but it demands careful key management because it uses the same key for both encryption and decryption. The use of two keys, public and private, in asymmetric encryption, also known as public-key encryption, increases security but also increases computing complexity. The security of data while it is in transit, such as information sent over networks, and data at rest, like information kept on physical drives, are both greatly enhanced by data encryption. Strong encryption methods, solid key management systems, strict access limits, and frequent protocol updates are all part of good security practice. The importance of encryption in safeguarding data from cyber risks and illegal access is highlighted by its broad use in different settings, such as cloud computing, mobile devices, and workplace networks.

Article Details

How to Cite
Rajashekar Reddy Yasani. (2023). Data Encryption Strategies in Cloud Protecting Data at Rest and in Transita. International Journal on Recent and Innovation Trends in Computing and Communication, 11(9), 3258–3266. Retrieved from https://ijritcc.org/index.php/ijritcc/article/view/9526
Section
Articles