Artificial Intelligence

Download as pdf or txt
Download as pdf or txt
You are on page 1of 14

ROLE OF CRYPTOGRAPHY IN CLOUD COMPUTING

Presented By :
Ardra Anilkumar ,
Diya Roy
INDEX
1. Abstract
2. Introduction
3. Cryptography
4. Types of Cryptography
5. Cryptographic Features
6. Cloud Computing
7. Features of Cloud Computing
8. Cryptography In Cloud
9. Conclusion
10. Reference
ABSTRACT

Cloud cryptography is the encryption used to protect data stored in the cloud. Different processes
are being used in cloud cryptography to increase security and prevent data from being infiltrated,
hacked or impacted by malware. Cloud providers encrypt any data they hold, allowing customers
to utilize shared cloud functions safely and efficiently. Cloud cryptography protects private data
without slowing information transmission.Cryptography in the cloud employs encryption
techniques to secure data that will be used or stored in the cloud. It allows users to conveniently
and securely access shared cloud services, as any data that is hosted by cloud providers is
protected with encryption. Cryptography in the cloud protects sensitive data without delaying
information exchange.
INTRODUCTION

Cloud computing enables companies to access IT services online instead of relying on physical
servers. However, cloud computing services make the company vulnerable to various cyber threats
and data breaches. Cloud cryptography is one of the ways a company can safeguard its data and
protect itself against cyber attacks. Cloud encryption is prudent as it safeguards data after leaving
the company's business IT system. This ensures the data is safe no matter where it travels through
the cloud computing services. Encryption helps safeguard the data rather than the locations it's
housed. Cloud Cryptography is encryption that safeguards data stored within the cloud. Several
measures are being placed within cloud cryptography which adds a strong layer of protection to
secure data to avoid being breached, hacked or affected by malware. Any data hosted by cloud
providers are secured with encryption, permitting users to access shared cloud services securely
and conveniently. Cloud Cryptography secures sensitive data without delaying the delivery of
information.
CRYPTOGRAPHY

● Cryptography is technique of securing information and communications through use of codes so that only
those person for whom the information is intended can understand it and process it.
● Cryptography refers to secure information and communication techniques derived from mathematical
concepts and a set of rule-based calculations called algorithms, to transform messages in ways that are
hard to decipher.
● In Cryptography the techniques which are use to protect information are obtained from mathematical
concepts and a set of rule based calculations known as algorithms to convert messages in ways that make
it hard to decode it.
TYPES OF CRYPTOGRAPHY

Cryptography can be divided into three:

● Secret Key Cryptography


● Public Key Cryptography
● Hashing Function
TYPES OF CRYPTOGRAPHY

1. Secret Key Cryptography


● Secret Key Cryptography, or symmetric cryptography, uses a single key to encrypt
data.
● Both encryption and decryption in symmetric cryptography use the same key.
● Eg , AES ,DES, Caesar cipher.
TYPES OF CRYPTOGRAPHY

Fig, Symmetric Cryptography


TYPES OF CRYPTOGRAPHY

2.Public Key Cryptography


● Public Key Cryptography, or asymmetric cryptography, uses two keys to encrypt
data.
● One is used for encryption, while the other key can decrypts the message.
● One key is kept private, and is called the “private key”, while the other is shared
publicly and can be used by anyone, hence it is known as the “public key”.
● Eg, ECC ,Diffie-Hellman ,DSS
TYPES OF CRYPTOGRAPHY

Fig ,Asymmetric Cryptography


TYPES OF CRYPTOGRAPHY

3.Hashing Function

● Hash functions are irreversible, one-way functions which protect the data, at the
cost of not being able to recover the original message.
● Hashing is a way to transform a given string into a fixed length string.
● Produce unique outputs for each input given.
● Eg , MD5 ,SHA-1 ,SHA-2
CRYPTOGRAPHIC FEATURES
Features Of Cryptography are as follows:
1. Confidentiality: Information can only be accessed by the person for whom it is intended
and no other person except him can access it.
2. Integrity: Information cannot be modified in storage or transition between sender and
intended receiver without any addition to information being detected.
3. Non-repudiation: The creator/sender of information cannot deny his intention to send
information at later stage.
4. Authentication: The identities of sender and receiver are confirmed. As well as
destination/origin of information is confirmed.
CLOUD COMPUTING

● Cloud computing is the delivery of different services through the Internet.


● These resources include tools and applications like data storage, servers,
databases, networking, and software.
● Cloud computing is named as such because the information being accessed is
found remotely in the cloud or a virtual space.
● Cloud-based storage makes it possible to save files to a remote database and
retrieve them on demand.

You might also like