staff must realize their role in protecting the safety of encrypted data, together with how to deal with encryption keys, use safe authentication, and adhere to good data dealing with treatments. Encryption in cloud computing Cloud computing has become popular for storing and processing data. With regards to encryption in cloud computing, there ar