1. CLOUD CRYPTOGRAPHY
Presented by
Gauri Shinde
Guided by
Prof. A. A. Patil
Department of Computer Engineering
LGNSCOE, Nashik
Seminar Name LGNSCOE, Nashik 1
2. OUTLINE…
• Introduction
• Literature Survey
• Need of Cloud Cryptography
• System Architecture
• Algorithm
• Advantages Conclusion
• References.
2
Seminar Name LGNSCOE, Nashik 2
3. INTRODUCTION
Cloud Cryptography is an encryption that protects data stored
within the cloud. In return, it allows those who have the
cryptographic keys to access the server with ease and safety
The whole idea behind this measure, is authentication
Cloud Cryptography is encryption that safeguards data stored
within the cloud. Several measures are being placed within cloud
cryptography which adds a strong layer of protection to secure
data to avoid being breached, hacked or affected by malware.
Any data hosted by cloud providers are secured with encryption,
permitting users to access shared cloud services securely and
conveniently.
4. Cloud cryptography adds a high layer of security and
prevents a data breach by encrypting data stored in the
cloud.
Data used or stored in the cloud is protected using
encryption mechanisms. Since all data stored by cloud
providers is encrypted, users can access shared cloud
services securely.
Cloud cryptography protects private information without
hindering information sharing. Protecting sensitive data
outside your company’s IT infrastructure when it is no
longer under your control is achievable thanks to cloud
cryptography.
NEED OF CLOUD CRYPTOGRAPHY
4
Seminar Name LGNSCOE, Nashik 4
5. LITERATURE SURVEY
Seria
l No.
Researcher ’s
Name
Year Reserch Paper Title
1 K.Rauber 2013 “Cloud Cryptography,
2 Sugata Sanyal &
Parthasarathy
P.iyer
2014 “Cloud Computing – An
Approach , With modern
cryptography”
Seminar Name LGNSCOE, Nashik 5
6. 3 T.K.
Chakraborty,A
Dhami,P.Bansal
2014 “Enhanced Public Audiability
Secure Data Storage In Cloud
Computing ”
4 Kawser Wazed
Nafi, Tonny
Shekha Kar
2015 “A Newer User Authentication , File
Encryption And Distributed Server
Based Cloud Computing Security
Architecture”
5 Bindu
Bala,Lovejeet
Kamboj , Pawan
Luthra
2018 “Secure File Storage In Cloud
Computing Using Cloud
Cryptography “
7. SUMMERY LITERATURE SURVEY
7
Seminar Name LGNSCOE, Nashik 7
• Bleikertz et al. proposed the secret key principles, which are applied tovirtual machines on the
basis of unique client-controlled CaaS architecture forcloud computing. However, these researchers
emphasized the use of physicalhardware security modules, and found that architecture segregates
themanagement and storage of the keys of cloud clients as well as all cryptographicoperations into
a secure crypto-domain called DomC, which is tightly coupledto the workloads of clients.
• While, Sanyal and Iyer investigated cloud security based on public keyvalues. They discussed a
secure, and efficient algorithm based on the multi-keyencryption AES technique, a 128/192/256 bit
cipher key used to encrypt anddecrypt data. Results confirmed, that AES increases security for the
cloudcomputing compared with RSA. But, AES can be used in virtual machines andin public or
private clouds.
• Mao noted an important problem for secure network virtualization: thenegligent usage of
intelligence and distributed power by hypervisors. Theresearch discussed how hypervisors use
information boxes to gain control.Therefore, he proposed network virtualization using modern
technology withseveral useful applications, including secure multitenancy for
cloud computing.Cryptography significantly affects the management of the intelligence
anddistributed power of hypervisors.
• Rauber studied cloud computing security, which the entire system requiresor else it collapses.
Rauber in fact, argued that the main components of a cloudshould be secure and discussed
whether cloud computing will revolutionize thecomputing experience. The researcher also examined
the functions of SaaS,homomorphic encryption, and functional encryption and their strategies
forkeeping information secure. These topics were discussed in depth together withuseful results.
8. SYSTEM ARCHITECTURE
A data processor :- Process the data before sending it to cloud
A data verifier :- Verifies the data on cloud
Token generator :- Generates the token
Credential generator :- Generates credentials
• Let's say we have user A and B. A uploads data on cloud generated by a
data processor. A can verify the data using data verifier. Whenever A
needs some segment of encrypted data, A can generate token and use
his/her decryption key to get the data. Whenever another user B wants to
access the data A can generate the token and credential for B and using
that B can access the data.
9. ALGORITHM
Symmetric Key Cryptographic Algorithm-
This algorithm gives authentication and authorization to the data because data
encrypted with a single unique key cannot be decrypted with any other key. Data
Encryption Standard (DES), Triple Data Encryption Standard (3DES), Advanced
Encryption Standard (AES) are the most popular Symmetric-key Algorithms which
are used cryptography. in cloud computing for
Asymmetric Key Cryptographic Algorithm- This algorithm is using two separate
different keys for the encryption and decryption process in order to protect the data
on the cloud. The algorithms used for cloud computing are Digital Signature
Algorithm (DSA), RSA and Diffie-He man Algorithm.
Hashing-
It is mainly used for indexing and recovering items in a database. It also utilizes two
separate keys for encrypting and decrypting
10. ADVANTAGES
10
Seminar Name LGNSCOE, Nashik 10
Full disk encryption :-
This is the main way to safeguard hard drives on computers
and when any files are saved on an external drive, it will be
automatically encrypted.
End-to-end encryption :-
Senders and receivers send messages, whereby they are the
only ones who can read it. For example, Facebook makes use of this
in its messenger application.
File encryption :-
This is when at rest data is encrypted, so that if an
unauthorized person tries to intercept a file, they will not be able to
access the information it holds
Pre-encrypting data that's synced with the cloud
Before information gets to the cloud, there is
software available to pre-encrypt it, making it impossible to read for
anyone who tries to hack it
11. CONCLUSION
Seminar Name LGNSCOE, Nashik 11
11
To conclude, cloud cryptography is encryption to safeguard any
data stored on the cloud.
It protects clients or businesses from unauthenticated users.
An encryption is a code known as ciphertext and there are
numerous ways data can be encrypted.
12. REFERENCES
12
Seminar Name LGNSCOE, Nashik 12
• Cyber Chief Magazine, Cybersecurity 2020 Top Trends ShapingManagement Priorities, Ed 8.
• Mell, P., Grance, T. (September 2011). The NIST Definition of CloudComputing. Retrieved
fromhttp://csrc.nist.gov/publications/detail/sp/800-145/final#pubsabstract-header.
• Stallings, William. Cryptography and Network Security (6th Edition).Pearson, 2014
• Velte, T. A, Velte, T. J., Elsenpeter, R. Cloud Computing: A PracticalApproach. Rong, C., Nguyen,
Son T., and Jaatun, Martin Gilje. (2013). Pastlightning: A review on security challenges in cloud
computing. PCs andElectrical Engineering, 47-54.
• Yang, H., Tate, M.: A Descriptive Literature Review and Classificationof Cloud Computing
Research. Commun. Assoc. Inf. Syst. 31 (2012).
• J.N., Aws and Z.F. Mohamad. Use of Cryptography in CloudComputing. Conference Paper
published in IEEE November 2013.
• Narang, Ashima and Deepali Gupta. Different Encryption Algorithmsin Cloud. April, 2018.
ResearchGate.
• Prasad,P, A. Parul. Cryptography Based Security for Cloud ComputingSystem.
• P. Kumar and V. K. Sharma, "Data security dependent onsteganography and cryptography
strategies: An audit," InternationalJournal, vol. 4, no. 10, 2014.