SlideShare a Scribd company logo
1 of 13
CLOUD CRYPTOGRAPHY
Presented by
Gauri Shinde
Guided by
Prof. A. A. Patil
Department of Computer Engineering
LGNSCOE, Nashik
Seminar Name LGNSCOE, Nashik 1
OUTLINE…
• Introduction
• Literature Survey
• Need of Cloud Cryptography
• System Architecture
• Algorithm
• Advantages Conclusion
• References.
2
Seminar Name LGNSCOE, Nashik 2
INTRODUCTION
Cloud Cryptography is an encryption that protects data stored
within the cloud. In return, it allows those who have the
cryptographic keys to access the server with ease and safety
The whole idea behind this measure, is authentication
Cloud Cryptography is encryption that safeguards data stored
within the cloud. Several measures are being placed within cloud
cryptography which adds a strong layer of protection to secure
data to avoid being breached, hacked or affected by malware.
Any data hosted by cloud providers are secured with encryption,
permitting users to access shared cloud services securely and
conveniently.
 Cloud cryptography adds a high layer of security and
prevents a data breach by encrypting data stored in the
cloud.
 Data used or stored in the cloud is protected using
encryption mechanisms. Since all data stored by cloud
providers is encrypted, users can access shared cloud
services securely.
 Cloud cryptography protects private information without
hindering information sharing. Protecting sensitive data
outside your company’s IT infrastructure when it is no
longer under your control is achievable thanks to cloud
cryptography.
NEED OF CLOUD CRYPTOGRAPHY
4
Seminar Name LGNSCOE, Nashik 4
LITERATURE SURVEY
Seria
l No.
Researcher ’s
Name
Year Reserch Paper Title
1 K.Rauber 2013 “Cloud Cryptography,
2 Sugata Sanyal &
Parthasarathy
P.iyer
2014 “Cloud Computing – An
Approach , With modern
cryptography”
Seminar Name LGNSCOE, Nashik 5
3 T.K.
Chakraborty,A
Dhami,P.Bansal
2014 “Enhanced Public Audiability
Secure Data Storage In Cloud
Computing ”
4 Kawser Wazed
Nafi, Tonny
Shekha Kar
2015 “A Newer User Authentication , File
Encryption And Distributed Server
Based Cloud Computing Security
Architecture”
5 Bindu
Bala,Lovejeet
Kamboj , Pawan
Luthra
2018 “Secure File Storage In Cloud
Computing Using Cloud
Cryptography “
SUMMERY LITERATURE SURVEY
7
Seminar Name LGNSCOE, Nashik 7
• Bleikertz et al. proposed the secret key principles, which are applied tovirtual machines on the
basis of unique client-controlled CaaS architecture forcloud computing. However, these researchers
emphasized the use of physicalhardware security modules, and found that architecture segregates
themanagement and storage of the keys of cloud clients as well as all cryptographicoperations into
a secure crypto-domain called DomC, which is tightly coupledto the workloads of clients.
• While, Sanyal and Iyer investigated cloud security based on public keyvalues. They discussed a
secure, and efficient algorithm based on the multi-keyencryption AES technique, a 128/192/256 bit
cipher key used to encrypt anddecrypt data. Results confirmed, that AES increases security for the
cloudcomputing compared with RSA. But, AES can be used in virtual machines andin public or
private clouds.
• Mao noted an important problem for secure network virtualization: thenegligent usage of
intelligence and distributed power by hypervisors. Theresearch discussed how hypervisors use
information boxes to gain control.Therefore, he proposed network virtualization using modern
technology withseveral useful applications, including secure multitenancy for
cloud computing.Cryptography significantly affects the management of the intelligence
anddistributed power of hypervisors.
• Rauber studied cloud computing security, which the entire system requiresor else it collapses.
Rauber in fact, argued that the main components of a cloudshould be secure and discussed
whether cloud computing will revolutionize thecomputing experience. The researcher also examined
the functions of SaaS,homomorphic encryption, and functional encryption and their strategies
forkeeping information secure. These topics were discussed in depth together withuseful results.
SYSTEM ARCHITECTURE
A data processor :- Process the data before sending it to cloud
A data verifier :- Verifies the data on cloud
Token generator :- Generates the token
Credential generator :- Generates credentials
• Let's say we have user A and B. A uploads data on cloud generated by a
data processor. A can verify the data using data verifier. Whenever A
needs some segment of encrypted data, A can generate token and use
his/her decryption key to get the data. Whenever another user B wants to
access the data A can generate the token and credential for B and using
that B can access the data.
ALGORITHM
 Symmetric Key Cryptographic Algorithm-
This algorithm gives authentication and authorization to the data because data
encrypted with a single unique key cannot be decrypted with any other key. Data
Encryption Standard (DES), Triple Data Encryption Standard (3DES), Advanced
Encryption Standard (AES) are the most popular Symmetric-key Algorithms which
are used cryptography. in cloud computing for
 Asymmetric Key Cryptographic Algorithm- This algorithm is using two separate
different keys for the encryption and decryption process in order to protect the data
on the cloud. The algorithms used for cloud computing are Digital Signature
Algorithm (DSA), RSA and Diffie-He man Algorithm.
 Hashing-
It is mainly used for indexing and recovering items in a database. It also utilizes two
separate keys for encrypting and decrypting
ADVANTAGES
10
Seminar Name LGNSCOE, Nashik 10
Full disk encryption :-
This is the main way to safeguard hard drives on computers
and when any files are saved on an external drive, it will be
automatically encrypted.
End-to-end encryption :-
Senders and receivers send messages, whereby they are the
only ones who can read it. For example, Facebook makes use of this
in its messenger application.
File encryption :-
This is when at rest data is encrypted, so that if an
unauthorized person tries to intercept a file, they will not be able to
access the information it holds
Pre-encrypting data that's synced with the cloud
Before information gets to the cloud, there is
software available to pre-encrypt it, making it impossible to read for
anyone who tries to hack it
CONCLUSION
Seminar Name LGNSCOE, Nashik 11
11
 To conclude, cloud cryptography is encryption to safeguard any
data stored on the cloud.
 It protects clients or businesses from unauthenticated users.
 An encryption is a code known as ciphertext and there are
numerous ways data can be encrypted.
REFERENCES
12
Seminar Name LGNSCOE, Nashik 12
• Cyber Chief Magazine, Cybersecurity 2020 Top Trends ShapingManagement Priorities, Ed 8.
• Mell, P., Grance, T. (September 2011). The NIST Definition of CloudComputing. Retrieved
fromhttp://csrc.nist.gov/publications/detail/sp/800-145/final#pubsabstract-header.
• Stallings, William. Cryptography and Network Security (6th Edition).Pearson, 2014
• Velte, T. A, Velte, T. J., Elsenpeter, R. Cloud Computing: A PracticalApproach. Rong, C., Nguyen,
Son T., and Jaatun, Martin Gilje. (2013). Pastlightning: A review on security challenges in cloud
computing. PCs andElectrical Engineering, 47-54.
• Yang, H., Tate, M.: A Descriptive Literature Review and Classificationof Cloud Computing
Research. Commun. Assoc. Inf. Syst. 31 (2012).
• J.N., Aws and Z.F. Mohamad. Use of Cryptography in CloudComputing. Conference Paper
published in IEEE November 2013.
• Narang, Ashima and Deepali Gupta. Different Encryption Algorithmsin Cloud. April, 2018.
ResearchGate.
• Prasad,P, A. Parul. Cryptography Based Security for Cloud ComputingSystem.
• P. Kumar and V. K. Sharma, "Data security dependent onsteganography and cryptography
strategies: An audit," InternationalJournal, vol. 4, no. 10, 2014.
13
Seminar Name LGNSCOE, Nashik 13

More Related Content

Similar to Cryptography Final Presentation.pptx

IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET Journal
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET Journal
 
Secure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA AlgorithmSecure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA AlgorithmIRJET Journal
 
A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...IJARIIT
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET Journal
 
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...IRJET Journal
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storageKey aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storageMugesh Mukkandan
 
Paper id 27201448
Paper id 27201448Paper id 27201448
Paper id 27201448IJRAT
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...Editor IJCATR
 
Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudIJTET Journal
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmHybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmIJECEIAES
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET Journal
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET Journal
 
IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...
IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...
IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...IRJET Journal
 
Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Editor IJARCET
 
Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Editor IJARCET
 

Similar to Cryptography Final Presentation.pptx (20)

IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
 
C017421624
C017421624C017421624
C017421624
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
 
Cloud Encryption
Cloud EncryptionCloud Encryption
Cloud Encryption
 
Secure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA AlgorithmSecure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA Algorithm
 
V5 i7 0169
V5 i7 0169V5 i7 0169
V5 i7 0169
 
A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
 
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storageKey aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage
 
Paper id 27201448
Paper id 27201448Paper id 27201448
Paper id 27201448
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
 
Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-Cloud
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmHybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based Encryption
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
 
IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...
IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...
IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...
 
Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235
 
Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235
 

Recently uploaded

Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012
Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012
Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012rehmti665
 
Vip Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...
Vip  Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...Vip  Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...
Vip Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...shivangimorya083
 
办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样
办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样
办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样umasea
 
VIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service Cuttack
VIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service CuttackVIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service Cuttack
VIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service CuttackSuhani Kapoor
 
Preventing and ending sexual harassment in the workplace.pptx
Preventing and ending sexual harassment in the workplace.pptxPreventing and ending sexual harassment in the workplace.pptx
Preventing and ending sexual harassment in the workplace.pptxGry Tina Tinde
 
Low Rate Call Girls Gorakhpur Anika 8250192130 Independent Escort Service Gor...
Low Rate Call Girls Gorakhpur Anika 8250192130 Independent Escort Service Gor...Low Rate Call Girls Gorakhpur Anika 8250192130 Independent Escort Service Gor...
Low Rate Call Girls Gorakhpur Anika 8250192130 Independent Escort Service Gor...Suhani Kapoor
 
CFO_SB_Career History_Multi Sector Experience
CFO_SB_Career History_Multi Sector ExperienceCFO_SB_Career History_Multi Sector Experience
CFO_SB_Career History_Multi Sector ExperienceSanjay Bokadia
 
VIP Russian Call Girls in Amravati Deepika 8250192130 Independent Escort Serv...
VIP Russian Call Girls in Amravati Deepika 8250192130 Independent Escort Serv...VIP Russian Call Girls in Amravati Deepika 8250192130 Independent Escort Serv...
VIP Russian Call Girls in Amravati Deepika 8250192130 Independent Escort Serv...Suhani Kapoor
 
定制(NYIT毕业证书)美国纽约理工学院毕业证成绩单原版一比一
定制(NYIT毕业证书)美国纽约理工学院毕业证成绩单原版一比一定制(NYIT毕业证书)美国纽约理工学院毕业证成绩单原版一比一
定制(NYIT毕业证书)美国纽约理工学院毕业证成绩单原版一比一2s3dgmej
 
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...Suhani Kapoor
 
VIP High Profile Call Girls Jamshedpur Aarushi 8250192130 Independent Escort ...
VIP High Profile Call Girls Jamshedpur Aarushi 8250192130 Independent Escort ...VIP High Profile Call Girls Jamshedpur Aarushi 8250192130 Independent Escort ...
VIP High Profile Call Girls Jamshedpur Aarushi 8250192130 Independent Escort ...Suhani Kapoor
 
VIP Call Girls in Cuttack Aarohi 8250192130 Independent Escort Service Cuttack
VIP Call Girls in Cuttack Aarohi 8250192130 Independent Escort Service CuttackVIP Call Girls in Cuttack Aarohi 8250192130 Independent Escort Service Cuttack
VIP Call Girls in Cuttack Aarohi 8250192130 Independent Escort Service CuttackSuhani Kapoor
 
Notes of bca Question paper for exams and tests
Notes of bca Question paper for exams and testsNotes of bca Question paper for exams and tests
Notes of bca Question paper for exams and testspriyanshukumar97908
 
PM Job Search Council Info Session - PMI Silver Spring Chapter
PM Job Search Council Info Session - PMI Silver Spring ChapterPM Job Search Council Info Session - PMI Silver Spring Chapter
PM Job Search Council Info Session - PMI Silver Spring ChapterHector Del Castillo, CPM, CPMM
 
CALL ON ➥8923113531 🔝Call Girls Husainganj Lucknow best Female service 🧳
CALL ON ➥8923113531 🔝Call Girls Husainganj Lucknow best Female service  🧳CALL ON ➥8923113531 🔝Call Girls Husainganj Lucknow best Female service  🧳
CALL ON ➥8923113531 🔝Call Girls Husainganj Lucknow best Female service 🧳anilsa9823
 
Sonam +91-9537192988-Mind-blowing skills and techniques of Ahmedabad Call Girls
Sonam +91-9537192988-Mind-blowing skills and techniques of Ahmedabad Call GirlsSonam +91-9537192988-Mind-blowing skills and techniques of Ahmedabad Call Girls
Sonam +91-9537192988-Mind-blowing skills and techniques of Ahmedabad Call GirlsNiya Khan
 
The Impact of Socioeconomic Status on Education.pdf
The Impact of Socioeconomic Status on Education.pdfThe Impact of Socioeconomic Status on Education.pdf
The Impact of Socioeconomic Status on Education.pdftheknowledgereview1
 
VIP Call Girl Bhilai Aashi 8250192130 Independent Escort Service Bhilai
VIP Call Girl Bhilai Aashi 8250192130 Independent Escort Service BhilaiVIP Call Girl Bhilai Aashi 8250192130 Independent Escort Service Bhilai
VIP Call Girl Bhilai Aashi 8250192130 Independent Escort Service BhilaiSuhani Kapoor
 
VIP Russian Call Girls Amravati Chhaya 8250192130 Independent Escort Service ...
VIP Russian Call Girls Amravati Chhaya 8250192130 Independent Escort Service ...VIP Russian Call Girls Amravati Chhaya 8250192130 Independent Escort Service ...
VIP Russian Call Girls Amravati Chhaya 8250192130 Independent Escort Service ...Suhani Kapoor
 

Recently uploaded (20)

Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012
Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012
Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012
 
Vip Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...
Vip  Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...Vip  Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...
Vip Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...
 
办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样
办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样
办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样
 
VIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service Cuttack
VIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service CuttackVIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service Cuttack
VIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service Cuttack
 
Preventing and ending sexual harassment in the workplace.pptx
Preventing and ending sexual harassment in the workplace.pptxPreventing and ending sexual harassment in the workplace.pptx
Preventing and ending sexual harassment in the workplace.pptx
 
Low Rate Call Girls Gorakhpur Anika 8250192130 Independent Escort Service Gor...
Low Rate Call Girls Gorakhpur Anika 8250192130 Independent Escort Service Gor...Low Rate Call Girls Gorakhpur Anika 8250192130 Independent Escort Service Gor...
Low Rate Call Girls Gorakhpur Anika 8250192130 Independent Escort Service Gor...
 
CFO_SB_Career History_Multi Sector Experience
CFO_SB_Career History_Multi Sector ExperienceCFO_SB_Career History_Multi Sector Experience
CFO_SB_Career History_Multi Sector Experience
 
VIP Russian Call Girls in Amravati Deepika 8250192130 Independent Escort Serv...
VIP Russian Call Girls in Amravati Deepika 8250192130 Independent Escort Serv...VIP Russian Call Girls in Amravati Deepika 8250192130 Independent Escort Serv...
VIP Russian Call Girls in Amravati Deepika 8250192130 Independent Escort Serv...
 
定制(NYIT毕业证书)美国纽约理工学院毕业证成绩单原版一比一
定制(NYIT毕业证书)美国纽约理工学院毕业证成绩单原版一比一定制(NYIT毕业证书)美国纽约理工学院毕业证成绩单原版一比一
定制(NYIT毕业证书)美国纽约理工学院毕业证成绩单原版一比一
 
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...
 
VIP High Profile Call Girls Jamshedpur Aarushi 8250192130 Independent Escort ...
VIP High Profile Call Girls Jamshedpur Aarushi 8250192130 Independent Escort ...VIP High Profile Call Girls Jamshedpur Aarushi 8250192130 Independent Escort ...
VIP High Profile Call Girls Jamshedpur Aarushi 8250192130 Independent Escort ...
 
VIP Call Girls in Cuttack Aarohi 8250192130 Independent Escort Service Cuttack
VIP Call Girls in Cuttack Aarohi 8250192130 Independent Escort Service CuttackVIP Call Girls in Cuttack Aarohi 8250192130 Independent Escort Service Cuttack
VIP Call Girls in Cuttack Aarohi 8250192130 Independent Escort Service Cuttack
 
Notes of bca Question paper for exams and tests
Notes of bca Question paper for exams and testsNotes of bca Question paper for exams and tests
Notes of bca Question paper for exams and tests
 
PM Job Search Council Info Session - PMI Silver Spring Chapter
PM Job Search Council Info Session - PMI Silver Spring ChapterPM Job Search Council Info Session - PMI Silver Spring Chapter
PM Job Search Council Info Session - PMI Silver Spring Chapter
 
CALL ON ➥8923113531 🔝Call Girls Husainganj Lucknow best Female service 🧳
CALL ON ➥8923113531 🔝Call Girls Husainganj Lucknow best Female service  🧳CALL ON ➥8923113531 🔝Call Girls Husainganj Lucknow best Female service  🧳
CALL ON ➥8923113531 🔝Call Girls Husainganj Lucknow best Female service 🧳
 
Sonam +91-9537192988-Mind-blowing skills and techniques of Ahmedabad Call Girls
Sonam +91-9537192988-Mind-blowing skills and techniques of Ahmedabad Call GirlsSonam +91-9537192988-Mind-blowing skills and techniques of Ahmedabad Call Girls
Sonam +91-9537192988-Mind-blowing skills and techniques of Ahmedabad Call Girls
 
The Impact of Socioeconomic Status on Education.pdf
The Impact of Socioeconomic Status on Education.pdfThe Impact of Socioeconomic Status on Education.pdf
The Impact of Socioeconomic Status on Education.pdf
 
VIP Call Girl Bhilai Aashi 8250192130 Independent Escort Service Bhilai
VIP Call Girl Bhilai Aashi 8250192130 Independent Escort Service BhilaiVIP Call Girl Bhilai Aashi 8250192130 Independent Escort Service Bhilai
VIP Call Girl Bhilai Aashi 8250192130 Independent Escort Service Bhilai
 
FULL ENJOY Call Girls In Gautam Nagar (Delhi) Call Us 9953056974
FULL ENJOY Call Girls In Gautam Nagar (Delhi) Call Us 9953056974FULL ENJOY Call Girls In Gautam Nagar (Delhi) Call Us 9953056974
FULL ENJOY Call Girls In Gautam Nagar (Delhi) Call Us 9953056974
 
VIP Russian Call Girls Amravati Chhaya 8250192130 Independent Escort Service ...
VIP Russian Call Girls Amravati Chhaya 8250192130 Independent Escort Service ...VIP Russian Call Girls Amravati Chhaya 8250192130 Independent Escort Service ...
VIP Russian Call Girls Amravati Chhaya 8250192130 Independent Escort Service ...
 

Cryptography Final Presentation.pptx

  • 1. CLOUD CRYPTOGRAPHY Presented by Gauri Shinde Guided by Prof. A. A. Patil Department of Computer Engineering LGNSCOE, Nashik Seminar Name LGNSCOE, Nashik 1
  • 2. OUTLINE… • Introduction • Literature Survey • Need of Cloud Cryptography • System Architecture • Algorithm • Advantages Conclusion • References. 2 Seminar Name LGNSCOE, Nashik 2
  • 3. INTRODUCTION Cloud Cryptography is an encryption that protects data stored within the cloud. In return, it allows those who have the cryptographic keys to access the server with ease and safety The whole idea behind this measure, is authentication Cloud Cryptography is encryption that safeguards data stored within the cloud. Several measures are being placed within cloud cryptography which adds a strong layer of protection to secure data to avoid being breached, hacked or affected by malware. Any data hosted by cloud providers are secured with encryption, permitting users to access shared cloud services securely and conveniently.
  • 4.  Cloud cryptography adds a high layer of security and prevents a data breach by encrypting data stored in the cloud.  Data used or stored in the cloud is protected using encryption mechanisms. Since all data stored by cloud providers is encrypted, users can access shared cloud services securely.  Cloud cryptography protects private information without hindering information sharing. Protecting sensitive data outside your company’s IT infrastructure when it is no longer under your control is achievable thanks to cloud cryptography. NEED OF CLOUD CRYPTOGRAPHY 4 Seminar Name LGNSCOE, Nashik 4
  • 5. LITERATURE SURVEY Seria l No. Researcher ’s Name Year Reserch Paper Title 1 K.Rauber 2013 “Cloud Cryptography, 2 Sugata Sanyal & Parthasarathy P.iyer 2014 “Cloud Computing – An Approach , With modern cryptography” Seminar Name LGNSCOE, Nashik 5
  • 6. 3 T.K. Chakraborty,A Dhami,P.Bansal 2014 “Enhanced Public Audiability Secure Data Storage In Cloud Computing ” 4 Kawser Wazed Nafi, Tonny Shekha Kar 2015 “A Newer User Authentication , File Encryption And Distributed Server Based Cloud Computing Security Architecture” 5 Bindu Bala,Lovejeet Kamboj , Pawan Luthra 2018 “Secure File Storage In Cloud Computing Using Cloud Cryptography “
  • 7. SUMMERY LITERATURE SURVEY 7 Seminar Name LGNSCOE, Nashik 7 • Bleikertz et al. proposed the secret key principles, which are applied tovirtual machines on the basis of unique client-controlled CaaS architecture forcloud computing. However, these researchers emphasized the use of physicalhardware security modules, and found that architecture segregates themanagement and storage of the keys of cloud clients as well as all cryptographicoperations into a secure crypto-domain called DomC, which is tightly coupledto the workloads of clients. • While, Sanyal and Iyer investigated cloud security based on public keyvalues. They discussed a secure, and efficient algorithm based on the multi-keyencryption AES technique, a 128/192/256 bit cipher key used to encrypt anddecrypt data. Results confirmed, that AES increases security for the cloudcomputing compared with RSA. But, AES can be used in virtual machines andin public or private clouds. • Mao noted an important problem for secure network virtualization: thenegligent usage of intelligence and distributed power by hypervisors. Theresearch discussed how hypervisors use information boxes to gain control.Therefore, he proposed network virtualization using modern technology withseveral useful applications, including secure multitenancy for cloud computing.Cryptography significantly affects the management of the intelligence anddistributed power of hypervisors. • Rauber studied cloud computing security, which the entire system requiresor else it collapses. Rauber in fact, argued that the main components of a cloudshould be secure and discussed whether cloud computing will revolutionize thecomputing experience. The researcher also examined the functions of SaaS,homomorphic encryption, and functional encryption and their strategies forkeeping information secure. These topics were discussed in depth together withuseful results.
  • 8. SYSTEM ARCHITECTURE A data processor :- Process the data before sending it to cloud A data verifier :- Verifies the data on cloud Token generator :- Generates the token Credential generator :- Generates credentials • Let's say we have user A and B. A uploads data on cloud generated by a data processor. A can verify the data using data verifier. Whenever A needs some segment of encrypted data, A can generate token and use his/her decryption key to get the data. Whenever another user B wants to access the data A can generate the token and credential for B and using that B can access the data.
  • 9. ALGORITHM  Symmetric Key Cryptographic Algorithm- This algorithm gives authentication and authorization to the data because data encrypted with a single unique key cannot be decrypted with any other key. Data Encryption Standard (DES), Triple Data Encryption Standard (3DES), Advanced Encryption Standard (AES) are the most popular Symmetric-key Algorithms which are used cryptography. in cloud computing for  Asymmetric Key Cryptographic Algorithm- This algorithm is using two separate different keys for the encryption and decryption process in order to protect the data on the cloud. The algorithms used for cloud computing are Digital Signature Algorithm (DSA), RSA and Diffie-He man Algorithm.  Hashing- It is mainly used for indexing and recovering items in a database. It also utilizes two separate keys for encrypting and decrypting
  • 10. ADVANTAGES 10 Seminar Name LGNSCOE, Nashik 10 Full disk encryption :- This is the main way to safeguard hard drives on computers and when any files are saved on an external drive, it will be automatically encrypted. End-to-end encryption :- Senders and receivers send messages, whereby they are the only ones who can read it. For example, Facebook makes use of this in its messenger application. File encryption :- This is when at rest data is encrypted, so that if an unauthorized person tries to intercept a file, they will not be able to access the information it holds Pre-encrypting data that's synced with the cloud Before information gets to the cloud, there is software available to pre-encrypt it, making it impossible to read for anyone who tries to hack it
  • 11. CONCLUSION Seminar Name LGNSCOE, Nashik 11 11  To conclude, cloud cryptography is encryption to safeguard any data stored on the cloud.  It protects clients or businesses from unauthenticated users.  An encryption is a code known as ciphertext and there are numerous ways data can be encrypted.
  • 12. REFERENCES 12 Seminar Name LGNSCOE, Nashik 12 • Cyber Chief Magazine, Cybersecurity 2020 Top Trends ShapingManagement Priorities, Ed 8. • Mell, P., Grance, T. (September 2011). The NIST Definition of CloudComputing. Retrieved fromhttp://csrc.nist.gov/publications/detail/sp/800-145/final#pubsabstract-header. • Stallings, William. Cryptography and Network Security (6th Edition).Pearson, 2014 • Velte, T. A, Velte, T. J., Elsenpeter, R. Cloud Computing: A PracticalApproach. Rong, C., Nguyen, Son T., and Jaatun, Martin Gilje. (2013). Pastlightning: A review on security challenges in cloud computing. PCs andElectrical Engineering, 47-54. • Yang, H., Tate, M.: A Descriptive Literature Review and Classificationof Cloud Computing Research. Commun. Assoc. Inf. Syst. 31 (2012). • J.N., Aws and Z.F. Mohamad. Use of Cryptography in CloudComputing. Conference Paper published in IEEE November 2013. • Narang, Ashima and Deepali Gupta. Different Encryption Algorithmsin Cloud. April, 2018. ResearchGate. • Prasad,P, A. Parul. Cryptography Based Security for Cloud ComputingSystem. • P. Kumar and V. K. Sharma, "Data security dependent onsteganography and cryptography strategies: An audit," InternationalJournal, vol. 4, no. 10, 2014.