SlideShare a Scribd company logo
1 of 2
Download to read offline
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume: 3 | Issue: 2 | Jan-Feb 2019 Available Online: www.ijtsrd.com e-ISSN: 2456 - 6470
@ IJTSRD | Unique Reference Paper ID – IJTSRD21547 | Volume – 3 | Issue – 2 | Jan-Feb 2019 Page: 972
Cloud Cryptography
Padmapriya I, Ragini H
MOP Vaishnav College for Women, Nungambakkam, Chennai, Tamil Nadu, India
ABSTRACT
Cloud computing is the emerging trend in today’s world. Cloud computing is not a separate technology, it is platform which
provides platform as a service, Infrastructure as a service and Software as a service. The most important thing with cloud is
that we hire everything from a third party or store our important data’s in a third parties place .Here comes the major issue of
how our data’s are secured. In this paper, we discuss about how to protect our data’s in the cloud with various cryptographic
techniques.
Keywords: Public key, private key, encryption, decryption, cipher text
1. INTRODUCTION
Cloud computing –an upcoming trend in computing world,
when compared with traditional computing process has
many advantages. In traditional computing, we need tohave
all our computing resources in the premises where we are
going to work. But it is not the case with cloud computing.
Similarly, setup an environment with all the needed
resources will amount to a large pay and not all companies
can offered for all the needed resources,notalltheresources
will be used all the time. But in cloud , we hire and use what
we need and pay only for what we have used .Thus ,cloud
has many advantages when compared to traditional
computing techniques. Every good thing will have some
defects associated with it. Likewise, the major issue cloud
has is “Security issue”. So, one way to secure the data on the
clod environment is using cryptographic techniques. This
includes the use of private and public keys, which plays an
important role in encrypting the data from a plain text to
cipher text. Public keys are given to those who are going to
decrypt the data and use it ,where the private keys are used
only by the own user of the data to encrypt it.
Literature review:
Survey paper on cloud storage security by
SUNITA SHARMA, AMIT CHUGH, helped usinunderstanding
how to secure data on the cloud using Kerberos
authentication service and cloud proof technique.
Strengthen Cloud Computing Security with Federal
Identity Management Using Hierarchical Identity-Based
Cryptography by
Liang Yan, Chunming Rong, and Gansen Zhao made us
understand about securing the data’s on the cloud through
various identity based cryptographic techniques.
Secure User Data in Cloud Computing Using Encryption
Algorithms by
Rachna Arora, Anshu Parashar gave us knowledge aboutthe
various algorithms used for cryptographic techniques.
Data Security in Cloud Computing with Elliptic Curve
Cryptography by
Veerraju Gampala, Srilakshmi Inuganti, Satish Muppidi
greatly helped us to know about a new technique for
encrypting data on the cloud.
Enhancing Security in Cloud computing using Public Key
Cryptography with Matrices by Birendra Goswami, Dr. S. N.
Singh helped us know about a mathematical technique-
matrices, for encrypting and decrypting cloud data’s.
Issues with Data’s stored on cloud: [1]
Issue 1: (Data Breaches)
In cloud all data’s get stored in online rather than getting
stored in a secured premises which makes it more
unsecured.
Issue 2: (Hijacking of accounts)
Once attackers get one’s username and password ,they get
access to the data’s on the cloud like a legal user.
Issue 3: (Insider Threats)
This attack is from the insider who has an authorized access,
but uses it to perform unauthorized activities.
Issue 4: (Malware injection)
This attack is like injecting malware into our cloud service
that becomes a serious threats to the cloud users.
Issue 5: (DOS Attacks)
DOS attacks could be putting more request than the cloud
server could handle to crash the server.
In addition to this there are many issues like, Insecure API’s,
Insufficient due diligence, Shared Vulnerabilities, Data loss
etc. There are several algorithms Proposed to handle these
issues.
Algorithms:
To handle these above threats,many algorithms were
proposed,
RSA Algorithm:
Here, public and private keys are used. Private keysareused
to encrypt the data by the own user of the dataand stored on
the cloud and the public keys are used to decrypt the data’s
when it is needed by other’s to access it. The disadvantage
that data is secured until Private key is unknown to others.
once the private key is known by intrude, full privacy is lost.
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Reference Paper ID – IJTSRD21547 | Volume – 3 | Issue – 2 | Jan-Feb 2019 Page: 973
DES Algorithm:
In DES, a block of 64 bits of plain text is sent as an input to
the DES algorithm which produces 64 bits of cipher text and
the cipher is converted into plain text using the same key.
The key length here is 56 bits, which is consideredtobevery
small and this is considered to be its serious disadvantage.
AES Algorithm:
AES is alternative to DES, as DES key length used for
encryption is very small. Thisalgorithmusesa128-bitlength
key to encrypt the data. The data to be stored on the cloud is
encrypted using AES algorithm and is sent to the cloud
service provider. Any request to access the data is satisfied
by decrypting the data with the encrypted key and given to
user for access as a plain text. No plain text is stored on the
cloud environment.
Blowfish:
Blowfish takes 64 bits block of plain text and encrypts it into
cipher text and stores the cipher text into the service
providers place with a key having variable lengths from 32
bits to 448 bits.
Homomorphic:
Homomorphic is a encryption technique where encrypted
cipher data is stored in the cloud Serviceprovidersplaceand
When one needs access to the data can work on the cipher
text as though it a real plain text.
Drawbacks with these algorithms:
All the above algorithms uses the concept of keys for
encrypting the data .The major drawbacks of all the
algorithms are ,once if the key used to encrypt the data is
known ,an intruder can easily modify the data ,for Securing
what these several actions are done.
Solution to these Drawbacks:
The drawbacks of the algorithms could be solved by using
these proposed techniques like,
Federal Identity Management:
Here, each user is given a unique digital identityusingwhich
one can have access to the different cloud services and its
data’s. The digital identity are given in such a way that they
cannot be guessed as easily as possible. [2]
Identity based cryptography:
In this method, public identifier of a user is his/her public
key, that can be used for securing data on the cloud[2]
Federal Identity Management:
This method is a development from identity based
cryptography, but it adds solutions to avoid the scalability
problems. [2]
Elliptic curve cryptography:
This is a cryptographic technique based on elliptic curve
theory to generate cryptographic keys rather using the
traditional key generation techniques. It provides greater
level security with 164 bit keys.[3]
Securing data on the cloud by cryptography with
matrices:
This method mainly has two parts: One is Preprocessing,
which includes data shuffling and traversing of the data.The
second part deals with Key generation, Key agreement and
encryption and decryption processes.[6]
Diffie Hellmann Key Exchange:
It has two keys-Private and public keys. The sender of the
data encrypts the data with his Private key and receivers
public key and send its to the receiver. Thereceiver decrypts
the data using his Private key and senders public key, thus
providing two ways of authentications.[4]
Securing data on the cloud with cloud proof:
With these techniques, one candetectthethreatsoccurrence
to the data and also report it to the CSP’s with valid proof.
Kerberos authentication services:
Here Kerberos techniques were used to authenticate the
valid user for securing data. This uses the complex Ticket
granting algorithms for creating tickets and granting tickets
for each users. [6]
Conclusion:
Cloud environment has benefitted people of different
communities. At the same time it has its own drawbacks.
Every great things have to face its own drawbacks. Taking
the good part of it and providing safety measures for the
flaws, one can use cloud technology and benefit at its fullest.
References:
[1] Secure User Data in Cloud Computing Using
Encryption Algorithms by Rachna Arora(Research
Scholar, HCTM, Kaithal, Haryana), Anshu Parashar
(Associate Professor, HCTM, Kaithal, Haryana)
[2] Strengthen Cloud Computing Securitywith Federal
Identity Management Using Hierarchical Identity-
Based Cryptography by Liang Yan(University of
Stavanger, Norway), Chunming Rong(University of
Stavanger, Norway), and Gansen Zhao(South China
Normal University, China)
[3] Data Security in Cloud Computing with Elliptic
Curve CryptographybyVeerraju Gampala, Srilakshmi
Inuganti, Satish Muppidi
[4] Data Security in Cloud Architecture Basedon Diffie
Hellman and Elliptical CurveCryptographybyNeha
Tirthani, Ganesan R
[5] Survey paper on cloud storage Security by Sunita
Sharma (M.Tech. Student, Dept. of CSE, Lingayas
University Faridabad, Faridabad, India), Amit chugh2
(Assistant Professor, Dept. of CSE, Lingayas University
Faridabad, Faridabad, India)
[6] Enhancing Security in Cloud computing using
Public Key Cryptography with Matricesby Birendra
Goswami (Faculty Member, UMA, Ranchi), Dr. S. N.
Singh (HOD, Deptt. Of IT, XISS, Ranchi)

More Related Content

What's hot

Cryptography and Information Security
Cryptography and Information SecurityCryptography and Information Security
Cryptography and Information SecurityDr Naim R Kidwai
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.pptUday Meena
 
Cryptography
CryptographyCryptography
CryptographyEmaSushan
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securitypatisa
 
Transport Layer Security (TLS)
Transport Layer Security (TLS)Transport Layer Security (TLS)
Transport Layer Security (TLS)Arun Shukla
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud ComputingFalgun Rathod
 
Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES) Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES) Hardik Manocha
 
Advanced cryptography and implementation
Advanced cryptography and implementationAdvanced cryptography and implementation
Advanced cryptography and implementationAkash Jadhav
 
What is fog computing
What is fog computingWhat is fog computing
What is fog computingAhmed Banafa
 
Types of Threat Actors and Attack Vectors
Types of Threat Actors and Attack VectorsTypes of Threat Actors and Attack Vectors
Types of Threat Actors and Attack VectorsLearningwithRayYT
 
Overview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyOverview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyLiwei Ren任力偉
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computingPrince Chandu
 

What's hot (20)

Cryptography and Information Security
Cryptography and Information SecurityCryptography and Information Security
Cryptography and Information Security
 
SSL intro
SSL introSSL intro
SSL intro
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Transport Layer Security (TLS)
Transport Layer Security (TLS)Transport Layer Security (TLS)
Transport Layer Security (TLS)
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 
Fog computing
Fog computing Fog computing
Fog computing
 
Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES) Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES)
 
Advanced cryptography and implementation
Advanced cryptography and implementationAdvanced cryptography and implementation
Advanced cryptography and implementation
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
What is fog computing
What is fog computingWhat is fog computing
What is fog computing
 
Cloud Security Mechanisms
Cloud Security MechanismsCloud Security Mechanisms
Cloud Security Mechanisms
 
Cryptography
CryptographyCryptography
Cryptography
 
Types of Threat Actors and Attack Vectors
Types of Threat Actors and Attack VectorsTypes of Threat Actors and Attack Vectors
Types of Threat Actors and Attack Vectors
 
Overview of cryptography
Overview of cryptographyOverview of cryptography
Overview of cryptography
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Overview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyOverview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) Technology
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
 

Similar to Cloud Cryptography

Cloud computing and a new approach in data encryption technique
Cloud computing and a new approach in data encryption techniqueCloud computing and a new approach in data encryption technique
Cloud computing and a new approach in data encryption techniqueMahmuda Rahman
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudIJERA Editor
 
Paper id 27201448
Paper id 27201448Paper id 27201448
Paper id 27201448IJRAT
 
Execution Analysis of Different Cryptographic Encryption Algorithms on Differ...
Execution Analysis of Different Cryptographic Encryption Algorithms on Differ...Execution Analysis of Different Cryptographic Encryption Algorithms on Differ...
Execution Analysis of Different Cryptographic Encryption Algorithms on Differ...IRJET Journal
 
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEMSECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEMJournal For Research
 
Enhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic AlgorithmEnhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic AlgorithmIOSR Journals
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
Cloud security: literature survey
Cloud security: literature surveyCloud security: literature survey
Cloud security: literature surveyIJECEIAES
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET Journal
 
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET- Data Security in Cloud Computing using Cryptographic AlgorithmsIRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET- Data Security in Cloud Computing using Cryptographic AlgorithmsIRJET Journal
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computingAlexander Decker
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computingAlexander Decker
 
Secure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA AlgorithmSecure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA AlgorithmIRJET Journal
 
Secure File Sharing In Cloud Using Encryption with Digital Signature
Secure File Sharing In Cloud Using Encryption with Digital  Signature Secure File Sharing In Cloud Using Encryption with Digital  Signature
Secure File Sharing In Cloud Using Encryption with Digital Signature IJMER
 

Similar to Cloud Cryptography (20)

Cloud computing and a new approach in data encryption technique
Cloud computing and a new approach in data encryption techniqueCloud computing and a new approach in data encryption technique
Cloud computing and a new approach in data encryption technique
 
Kp3419221926
Kp3419221926Kp3419221926
Kp3419221926
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
 
Paper id 27201448
Paper id 27201448Paper id 27201448
Paper id 27201448
 
Execution Analysis of Different Cryptographic Encryption Algorithms on Differ...
Execution Analysis of Different Cryptographic Encryption Algorithms on Differ...Execution Analysis of Different Cryptographic Encryption Algorithms on Differ...
Execution Analysis of Different Cryptographic Encryption Algorithms on Differ...
 
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEMSECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
 
Enhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic AlgorithmEnhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
H017155360
H017155360H017155360
H017155360
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
Cloud security: literature survey
Cloud security: literature surveyCloud security: literature survey
Cloud security: literature survey
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
 
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET- Data Security in Cloud Computing using Cryptographic AlgorithmsIRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
 
C017421624
C017421624C017421624
C017421624
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing
 
Secure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA AlgorithmSecure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA Algorithm
 
Cloud Encryption
Cloud EncryptionCloud Encryption
Cloud Encryption
 
Secure File Sharing In Cloud Using Encryption with Digital Signature
Secure File Sharing In Cloud Using Encryption with Digital  Signature Secure File Sharing In Cloud Using Encryption with Digital  Signature
Secure File Sharing In Cloud Using Encryption with Digital Signature
 

More from ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementationijtsrd
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospectsijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...ijtsrd
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Studyijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...ijtsrd
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadikuijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Mapijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Societyijtsrd
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...ijtsrd
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learningijtsrd
 

More from ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Recently uploaded

Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 

Recently uploaded (20)

Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 

Cloud Cryptography

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume: 3 | Issue: 2 | Jan-Feb 2019 Available Online: www.ijtsrd.com e-ISSN: 2456 - 6470 @ IJTSRD | Unique Reference Paper ID – IJTSRD21547 | Volume – 3 | Issue – 2 | Jan-Feb 2019 Page: 972 Cloud Cryptography Padmapriya I, Ragini H MOP Vaishnav College for Women, Nungambakkam, Chennai, Tamil Nadu, India ABSTRACT Cloud computing is the emerging trend in today’s world. Cloud computing is not a separate technology, it is platform which provides platform as a service, Infrastructure as a service and Software as a service. The most important thing with cloud is that we hire everything from a third party or store our important data’s in a third parties place .Here comes the major issue of how our data’s are secured. In this paper, we discuss about how to protect our data’s in the cloud with various cryptographic techniques. Keywords: Public key, private key, encryption, decryption, cipher text 1. INTRODUCTION Cloud computing –an upcoming trend in computing world, when compared with traditional computing process has many advantages. In traditional computing, we need tohave all our computing resources in the premises where we are going to work. But it is not the case with cloud computing. Similarly, setup an environment with all the needed resources will amount to a large pay and not all companies can offered for all the needed resources,notalltheresources will be used all the time. But in cloud , we hire and use what we need and pay only for what we have used .Thus ,cloud has many advantages when compared to traditional computing techniques. Every good thing will have some defects associated with it. Likewise, the major issue cloud has is “Security issue”. So, one way to secure the data on the clod environment is using cryptographic techniques. This includes the use of private and public keys, which plays an important role in encrypting the data from a plain text to cipher text. Public keys are given to those who are going to decrypt the data and use it ,where the private keys are used only by the own user of the data to encrypt it. Literature review: Survey paper on cloud storage security by SUNITA SHARMA, AMIT CHUGH, helped usinunderstanding how to secure data on the cloud using Kerberos authentication service and cloud proof technique. Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography by Liang Yan, Chunming Rong, and Gansen Zhao made us understand about securing the data’s on the cloud through various identity based cryptographic techniques. Secure User Data in Cloud Computing Using Encryption Algorithms by Rachna Arora, Anshu Parashar gave us knowledge aboutthe various algorithms used for cryptographic techniques. Data Security in Cloud Computing with Elliptic Curve Cryptography by Veerraju Gampala, Srilakshmi Inuganti, Satish Muppidi greatly helped us to know about a new technique for encrypting data on the cloud. Enhancing Security in Cloud computing using Public Key Cryptography with Matrices by Birendra Goswami, Dr. S. N. Singh helped us know about a mathematical technique- matrices, for encrypting and decrypting cloud data’s. Issues with Data’s stored on cloud: [1] Issue 1: (Data Breaches) In cloud all data’s get stored in online rather than getting stored in a secured premises which makes it more unsecured. Issue 2: (Hijacking of accounts) Once attackers get one’s username and password ,they get access to the data’s on the cloud like a legal user. Issue 3: (Insider Threats) This attack is from the insider who has an authorized access, but uses it to perform unauthorized activities. Issue 4: (Malware injection) This attack is like injecting malware into our cloud service that becomes a serious threats to the cloud users. Issue 5: (DOS Attacks) DOS attacks could be putting more request than the cloud server could handle to crash the server. In addition to this there are many issues like, Insecure API’s, Insufficient due diligence, Shared Vulnerabilities, Data loss etc. There are several algorithms Proposed to handle these issues. Algorithms: To handle these above threats,many algorithms were proposed, RSA Algorithm: Here, public and private keys are used. Private keysareused to encrypt the data by the own user of the dataand stored on the cloud and the public keys are used to decrypt the data’s when it is needed by other’s to access it. The disadvantage that data is secured until Private key is unknown to others. once the private key is known by intrude, full privacy is lost.
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Reference Paper ID – IJTSRD21547 | Volume – 3 | Issue – 2 | Jan-Feb 2019 Page: 973 DES Algorithm: In DES, a block of 64 bits of plain text is sent as an input to the DES algorithm which produces 64 bits of cipher text and the cipher is converted into plain text using the same key. The key length here is 56 bits, which is consideredtobevery small and this is considered to be its serious disadvantage. AES Algorithm: AES is alternative to DES, as DES key length used for encryption is very small. Thisalgorithmusesa128-bitlength key to encrypt the data. The data to be stored on the cloud is encrypted using AES algorithm and is sent to the cloud service provider. Any request to access the data is satisfied by decrypting the data with the encrypted key and given to user for access as a plain text. No plain text is stored on the cloud environment. Blowfish: Blowfish takes 64 bits block of plain text and encrypts it into cipher text and stores the cipher text into the service providers place with a key having variable lengths from 32 bits to 448 bits. Homomorphic: Homomorphic is a encryption technique where encrypted cipher data is stored in the cloud Serviceprovidersplaceand When one needs access to the data can work on the cipher text as though it a real plain text. Drawbacks with these algorithms: All the above algorithms uses the concept of keys for encrypting the data .The major drawbacks of all the algorithms are ,once if the key used to encrypt the data is known ,an intruder can easily modify the data ,for Securing what these several actions are done. Solution to these Drawbacks: The drawbacks of the algorithms could be solved by using these proposed techniques like, Federal Identity Management: Here, each user is given a unique digital identityusingwhich one can have access to the different cloud services and its data’s. The digital identity are given in such a way that they cannot be guessed as easily as possible. [2] Identity based cryptography: In this method, public identifier of a user is his/her public key, that can be used for securing data on the cloud[2] Federal Identity Management: This method is a development from identity based cryptography, but it adds solutions to avoid the scalability problems. [2] Elliptic curve cryptography: This is a cryptographic technique based on elliptic curve theory to generate cryptographic keys rather using the traditional key generation techniques. It provides greater level security with 164 bit keys.[3] Securing data on the cloud by cryptography with matrices: This method mainly has two parts: One is Preprocessing, which includes data shuffling and traversing of the data.The second part deals with Key generation, Key agreement and encryption and decryption processes.[6] Diffie Hellmann Key Exchange: It has two keys-Private and public keys. The sender of the data encrypts the data with his Private key and receivers public key and send its to the receiver. Thereceiver decrypts the data using his Private key and senders public key, thus providing two ways of authentications.[4] Securing data on the cloud with cloud proof: With these techniques, one candetectthethreatsoccurrence to the data and also report it to the CSP’s with valid proof. Kerberos authentication services: Here Kerberos techniques were used to authenticate the valid user for securing data. This uses the complex Ticket granting algorithms for creating tickets and granting tickets for each users. [6] Conclusion: Cloud environment has benefitted people of different communities. At the same time it has its own drawbacks. Every great things have to face its own drawbacks. Taking the good part of it and providing safety measures for the flaws, one can use cloud technology and benefit at its fullest. References: [1] Secure User Data in Cloud Computing Using Encryption Algorithms by Rachna Arora(Research Scholar, HCTM, Kaithal, Haryana), Anshu Parashar (Associate Professor, HCTM, Kaithal, Haryana) [2] Strengthen Cloud Computing Securitywith Federal Identity Management Using Hierarchical Identity- Based Cryptography by Liang Yan(University of Stavanger, Norway), Chunming Rong(University of Stavanger, Norway), and Gansen Zhao(South China Normal University, China) [3] Data Security in Cloud Computing with Elliptic Curve CryptographybyVeerraju Gampala, Srilakshmi Inuganti, Satish Muppidi [4] Data Security in Cloud Architecture Basedon Diffie Hellman and Elliptical CurveCryptographybyNeha Tirthani, Ganesan R [5] Survey paper on cloud storage Security by Sunita Sharma (M.Tech. Student, Dept. of CSE, Lingayas University Faridabad, Faridabad, India), Amit chugh2 (Assistant Professor, Dept. of CSE, Lingayas University Faridabad, Faridabad, India) [6] Enhancing Security in Cloud computing using Public Key Cryptography with Matricesby Birendra Goswami (Faculty Member, UMA, Ranchi), Dr. S. N. Singh (HOD, Deptt. Of IT, XISS, Ranchi)