Loading…

Secure Cloud Storage using End-to-End Encryption

Cloud Storage is revolutionizing how the world man- ages data by providing an incredible level of flexibility, increased capacity, and easy accessibility. Nevertheless, the technology development is associated with a number of fears related to data protection and privacy. E2EE is an end-to-end encry...

Full description

Saved in:
Bibliographic Details
Published in:International journal for research in applied science and engineering technology 2023-12, Vol.11 (12), p.567-574
Main Authors: Sinha, Sujal, Shankar, Mohit, Pande, Yash, Kumar, Kislay, Sharma, Shivank, Virdi, Khushwant
Format: Article
Language:English
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Cloud Storage is revolutionizing how the world man- ages data by providing an incredible level of flexibility, increased capacity, and easy accessibility. Nevertheless, the technology development is associated with a number of fears related to data protection and privacy. E2EE is an end-to-end encryption concept for ensuring secure storage, transmission as well as integration of data in a cloud environment. With E2EE in place, data is encrypted right at the source and decrypted only when it reaches its intended end-points, ensuring that it remains securely hidden from eavesdroppers or other unauthorized party. As the world becomes more connected, with data housed on distant servers and traversed by broad networks, it becomes essential that one comprehends the significance of E2EE in securing cloud storage. This encryption technique does not only act as a safeguard; it is an emerging and ever-changing field that has broad implication on data protection, users’ privacy and the future of Cloudbased information management. The primary goal of this paper is to provide a thorough understanding of the evolving trends and implications of End- to-End Encryption (E2EE) in the realm of secure cloud storage. By synthesizing and analysing the latest research findings and practical implementations, we aim to shed light on how E2EE fundamentally reshapes the landscape of cloud data security.
ISSN:2321-9653
2321-9653
DOI:10.22214/ijraset.2023.57414