Artificial Intelligence
Artificial Intelligence
Artificial Intelligence
Presented By :
Ardra Anilkumar ,
Diya Roy
INDEX
1. Abstract
2. Introduction
3. Cryptography
4. Types of Cryptography
5. Cryptographic Features
6. Cloud Computing
7. Features of Cloud Computing
8. Cryptography In Cloud
9. Conclusion
10. Reference
ABSTRACT
Cloud cryptography is the encryption used to protect data stored in the cloud. Different processes
are being used in cloud cryptography to increase security and prevent data from being infiltrated,
hacked or impacted by malware. Cloud providers encrypt any data they hold, allowing customers
to utilize shared cloud functions safely and efficiently. Cloud cryptography protects private data
without slowing information transmission.Cryptography in the cloud employs encryption
techniques to secure data that will be used or stored in the cloud. It allows users to conveniently
and securely access shared cloud services, as any data that is hosted by cloud providers is
protected with encryption. Cryptography in the cloud protects sensitive data without delaying
information exchange.
INTRODUCTION
Cloud computing enables companies to access IT services online instead of relying on physical
servers. However, cloud computing services make the company vulnerable to various cyber threats
and data breaches. Cloud cryptography is one of the ways a company can safeguard its data and
protect itself against cyber attacks. Cloud encryption is prudent as it safeguards data after leaving
the company's business IT system. This ensures the data is safe no matter where it travels through
the cloud computing services. Encryption helps safeguard the data rather than the locations it's
housed. Cloud Cryptography is encryption that safeguards data stored within the cloud. Several
measures are being placed within cloud cryptography which adds a strong layer of protection to
secure data to avoid being breached, hacked or affected by malware. Any data hosted by cloud
providers are secured with encryption, permitting users to access shared cloud services securely
and conveniently. Cloud Cryptography secures sensitive data without delaying the delivery of
information.
CRYPTOGRAPHY
● Cryptography is technique of securing information and communications through use of codes so that only
those person for whom the information is intended can understand it and process it.
● Cryptography refers to secure information and communication techniques derived from mathematical
concepts and a set of rule-based calculations called algorithms, to transform messages in ways that are
hard to decipher.
● In Cryptography the techniques which are use to protect information are obtained from mathematical
concepts and a set of rule based calculations known as algorithms to convert messages in ways that make
it hard to decode it.
TYPES OF CRYPTOGRAPHY
3.Hashing Function
● Hash functions are irreversible, one-way functions which protect the data, at the
cost of not being able to recover the original message.
● Hashing is a way to transform a given string into a fixed length string.
● Produce unique outputs for each input given.
● Eg , MD5 ,SHA-1 ,SHA-2
CRYPTOGRAPHIC FEATURES
Features Of Cryptography are as follows:
1. Confidentiality: Information can only be accessed by the person for whom it is intended
and no other person except him can access it.
2. Integrity: Information cannot be modified in storage or transition between sender and
intended receiver without any addition to information being detected.
3. Non-repudiation: The creator/sender of information cannot deny his intention to send
information at later stage.
4. Authentication: The identities of sender and receiver are confirmed. As well as
destination/origin of information is confirmed.
CLOUD COMPUTING