Information Management and Computer Science (IMCS) 5(2) (2022) 31-33 Quick Response Code Access this article online Website: www.theimcs.org DOI: 10.26480/imcs.02.2022.31.33 Cite the Article: Rajesh De, Ipseeta Nanda (2022). Review of Cloud Computing Cryptography. Information Management and Computer Science, 5(2): 31-33. ISSN: 2616-5961 (Online) CODEN: IMCSBZ REVIEW ARTICLE Information Management and Computer Science (IMCS) DOI: http://doi.org/10.26480/imcs.02.2022.31.33 REVIEW OF CLOUD COMPUTING CRYPTOGRAPHY Rajesh De, Ipseeta Nanda* Faculty of Information Technology, Gopal Narayan Singh University, Jamuhar, Sasaram, Bihar-821305, India *Corresponding Author Email: ipseeta.nanda@gmail.com This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. ARTICLE DETAILS ABSTRACT Article History: Received 10 September 2022 Revised 13 October 2022 Accepted 19 November 2022 Available online 22 November 2022 The delivery of computing services over the internet, as opposed to storing data on a local memory device or a proprietary disc drive, is known as cloud computing. Servers, storage, databases, networking, and software are some examples of computing services. The primary justification and major benefit of using the cloud are the user's ability to store data there and access it from any location at any time, as well as the low cost of all its services. Despite this, because the data stored in the cloud is not directly maintained by the customer, security has always been a major concern with cloud computing. The data owners are unlikely to be aware of the route their data is taking when they upload or store data using a cloud computing service. The user is unaware of whether or not a third party is gathering, processing, and accessing their information. Numerous cryptography algorithms have been proposed to address security concerns. This paper discussed different cryptography algorithms that are present in the previous work with a focus on the fundamentals of cloud computing. KEYWORDS Data, Cloud Computing, Security, and Cryptography. 1. INTRODUCTION By rearranging various resources and providing them to clients in accordance with their needs, cloud computing offers a new way of providing services (Vouk, 2008). The cloud functions as a virtualized software programme. Additionally, it plays a crucial role in the upcoming generation of cellular networks and services. One of the most important cloud services is the ability to store data on the cloud, which significantly decreases the customers' storage load and gives them access to convenience. Utilizing the cloud permits the use of the utility by a character or business person online without the need to install any software (Wooley, 2011). The main advantages of cloud computing are its low cost, increased storage capacity, and flexibility. On the other hand, security and privacy issues are a major concern that are influencing the success of cloud computing (i.e. by using storing sensitive data on a third party's server in an unidentified location). Cloud safety includes the procedures and technology required to safeguard cloud computing services in favour of cloud computing. However, the solutions offered so far are ineffective and flawed, making them unworkable (Advin, 2020). Even though the risk of privacy leakage is much decreased, it is difficult to do auditing on information control when encrypted data is stored in the cloud. This particular challenge aims to bring together academics and industry professionals to discuss various facets of information security and cryptography in cloud computing (Subashini and Kavitha, 2011). 2. INTERNET OF THINGS One of two methods is typically used to define cloud computing (Modi et al., 2013). depending on the deployment methodology or the service the cloud is providing (Winkler, 2011). We can categorise cloud based on a deployment model as follows: public private hybrid community cloud There are various cloud kinds accessible depending on the user or business need. There are four different kinds of clouds. 2.1 Private Cloud A private cloud is controlled by a third party or organisation and can only be accessed by one group or one organization (Mather et al., 2009). Larger enterprises or the government sectors frequently employ the private cloud because of its high levels of security and flexibility (Khan et al., 2012).