Dhruv Khera
Volume 6, Issue 2 2022
Page: 6-11
The number of people who use the internet is always growing. Every day, a lot of digital data is exchanged. Unauthorized access to some information is essential and must be prevented. Inorder to prevent unauthorized access to the original data, encryption techniques are essential. There are many different algorithms that can be used to encrypt data. TheAdvanced EncryptionThe standard encryption algorithm (AES), which is widely supported and utilized, is one of themost effective options. The purpose of this work is to show how to use cloud-based AES encryption and decryption to create secure file transfers. Files can be intercepted as they movefrom one location to another by hackers. Files can be easily hacked if they are not wrapped. Asa result, file transfer networks are safeguarded by the AES algorithm. It is said that if AES is used in file-sharing systems, thieves won't try to steal data when sending files. As per the review's discoveries, AES offers more insurance during information encryption and decoding during document moves without break from programmers endeavouring to deliberately take information.
Come to us.