SlideShare a Scribd company logo
1 of 2
Download to read offline
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume: 3 | Issue: 2 | Jan-Feb 2019 Available Online: www.ijtsrd.com e-ISSN: 2456 - 6470
@ IJTSRD | Unique Reference Paper ID – IJTSRD21547 | Volume – 3 | Issue – 2 | Jan-Feb 2019 Page: 972
Cloud Cryptography
Padmapriya I, Ragini H
MOP Vaishnav College for Women, Nungambakkam, Chennai, Tamil Nadu, India
ABSTRACT
Cloud computing is the emerging trend in today’s world. Cloud computing is not a separate technology, it is platform which
provides platform as a service, Infrastructure as a service and Software as a service. The most important thing with cloud is
that we hire everything from a third party or store our important data’s in a third parties place .Here comes the major issue of
how our data’s are secured. In this paper, we discuss about how to protect our data’s in the cloud with various cryptographic
techniques.
Keywords: Public key, private key, encryption, decryption, cipher text
1. INTRODUCTION
Cloud computing –an upcoming trend in computing world,
when compared with traditional computing process has
many advantages. In traditional computing, we need tohave
all our computing resources in the premises where we are
going to work. But it is not the case with cloud computing.
Similarly, setup an environment with all the needed
resources will amount to a large pay and not all companies
can offered for all the needed resources,notalltheresources
will be used all the time. But in cloud , we hire and use what
we need and pay only for what we have used .Thus ,cloud
has many advantages when compared to traditional
computing techniques. Every good thing will have some
defects associated with it. Likewise, the major issue cloud
has is “Security issue”. So, one way to secure the data on the
clod environment is using cryptographic techniques. This
includes the use of private and public keys, which plays an
important role in encrypting the data from a plain text to
cipher text. Public keys are given to those who are going to
decrypt the data and use it ,where the private keys are used
only by the own user of the data to encrypt it.
Literature review:
Survey paper on cloud storage security by
SUNITA SHARMA, AMIT CHUGH, helped usinunderstanding
how to secure data on the cloud using Kerberos
authentication service and cloud proof technique.
Strengthen Cloud Computing Security with Federal
Identity Management Using Hierarchical Identity-Based
Cryptography by
Liang Yan, Chunming Rong, and Gansen Zhao made us
understand about securing the data’s on the cloud through
various identity based cryptographic techniques.
Secure User Data in Cloud Computing Using Encryption
Algorithms by
Rachna Arora, Anshu Parashar gave us knowledge aboutthe
various algorithms used for cryptographic techniques.
Data Security in Cloud Computing with Elliptic Curve
Cryptography by
Veerraju Gampala, Srilakshmi Inuganti, Satish Muppidi
greatly helped us to know about a new technique for
encrypting data on the cloud.
Enhancing Security in Cloud computing using Public Key
Cryptography with Matrices by Birendra Goswami, Dr. S. N.
Singh helped us know about a mathematical technique-
matrices, for encrypting and decrypting cloud data’s.
Issues with Data’s stored on cloud: [1]
Issue 1: (Data Breaches)
In cloud all data’s get stored in online rather than getting
stored in a secured premises which makes it more
unsecured.
Issue 2: (Hijacking of accounts)
Once attackers get one’s username and password ,they get
access to the data’s on the cloud like a legal user.
Issue 3: (Insider Threats)
This attack is from the insider who has an authorized access,
but uses it to perform unauthorized activities.
Issue 4: (Malware injection)
This attack is like injecting malware into our cloud service
that becomes a serious threats to the cloud users.
Issue 5: (DOS Attacks)
DOS attacks could be putting more request than the cloud
server could handle to crash the server.
In addition to this there are many issues like, Insecure API’s,
Insufficient due diligence, Shared Vulnerabilities, Data loss
etc. There are several algorithms Proposed to handle these
issues.
Algorithms:
To handle these above threats,many algorithms were
proposed,
RSA Algorithm:
Here, public and private keys are used. Private keysareused
to encrypt the data by the own user of the dataand stored on
the cloud and the public keys are used to decrypt the data’s
when it is needed by other’s to access it. The disadvantage
that data is secured until Private key is unknown to others.
once the private key is known by intrude, full privacy is lost.
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Reference Paper ID – IJTSRD21547 | Volume – 3 | Issue – 2 | Jan-Feb 2019 Page: 973
DES Algorithm:
In DES, a block of 64 bits of plain text is sent as an input to
the DES algorithm which produces 64 bits of cipher text and
the cipher is converted into plain text using the same key.
The key length here is 56 bits, which is consideredtobevery
small and this is considered to be its serious disadvantage.
AES Algorithm:
AES is alternative to DES, as DES key length used for
encryption is very small. Thisalgorithmusesa128-bitlength
key to encrypt the data. The data to be stored on the cloud is
encrypted using AES algorithm and is sent to the cloud
service provider. Any request to access the data is satisfied
by decrypting the data with the encrypted key and given to
user for access as a plain text. No plain text is stored on the
cloud environment.
Blowfish:
Blowfish takes 64 bits block of plain text and encrypts it into
cipher text and stores the cipher text into the service
providers place with a key having variable lengths from 32
bits to 448 bits.
Homomorphic:
Homomorphic is a encryption technique where encrypted
cipher data is stored in the cloud Serviceprovidersplaceand
When one needs access to the data can work on the cipher
text as though it a real plain text.
Drawbacks with these algorithms:
All the above algorithms uses the concept of keys for
encrypting the data .The major drawbacks of all the
algorithms are ,once if the key used to encrypt the data is
known ,an intruder can easily modify the data ,for Securing
what these several actions are done.
Solution to these Drawbacks:
The drawbacks of the algorithms could be solved by using
these proposed techniques like,
Federal Identity Management:
Here, each user is given a unique digital identityusingwhich
one can have access to the different cloud services and its
data’s. The digital identity are given in such a way that they
cannot be guessed as easily as possible. [2]
Identity based cryptography:
In this method, public identifier of a user is his/her public
key, that can be used for securing data on the cloud[2]
Federal Identity Management:
This method is a development from identity based
cryptography, but it adds solutions to avoid the scalability
problems. [2]
Elliptic curve cryptography:
This is a cryptographic technique based on elliptic curve
theory to generate cryptographic keys rather using the
traditional key generation techniques. It provides greater
level security with 164 bit keys.[3]
Securing data on the cloud by cryptography with
matrices:
This method mainly has two parts: One is Preprocessing,
which includes data shuffling and traversing of the data.The
second part deals with Key generation, Key agreement and
encryption and decryption processes.[6]
Diffie Hellmann Key Exchange:
It has two keys-Private and public keys. The sender of the
data encrypts the data with his Private key and receivers
public key and send its to the receiver. Thereceiver decrypts
the data using his Private key and senders public key, thus
providing two ways of authentications.[4]
Securing data on the cloud with cloud proof:
With these techniques, one candetectthethreatsoccurrence
to the data and also report it to the CSP’s with valid proof.
Kerberos authentication services:
Here Kerberos techniques were used to authenticate the
valid user for securing data. This uses the complex Ticket
granting algorithms for creating tickets and granting tickets
for each users. [6]
Conclusion:
Cloud environment has benefitted people of different
communities. At the same time it has its own drawbacks.
Every great things have to face its own drawbacks. Taking
the good part of it and providing safety measures for the
flaws, one can use cloud technology and benefit at its fullest.
References:
[1] Secure User Data in Cloud Computing Using
Encryption Algorithms by Rachna Arora(Research
Scholar, HCTM, Kaithal, Haryana), Anshu Parashar
(Associate Professor, HCTM, Kaithal, Haryana)
[2] Strengthen Cloud Computing Securitywith Federal
Identity Management Using Hierarchical Identity-
Based Cryptography by Liang Yan(University of
Stavanger, Norway), Chunming Rong(University of
Stavanger, Norway), and Gansen Zhao(South China
Normal University, China)
[3] Data Security in Cloud Computing with Elliptic
Curve CryptographybyVeerraju Gampala, Srilakshmi
Inuganti, Satish Muppidi
[4] Data Security in Cloud Architecture Basedon Diffie
Hellman and Elliptical CurveCryptographybyNeha
Tirthani, Ganesan R
[5] Survey paper on cloud storage Security by Sunita
Sharma (M.Tech. Student, Dept. of CSE, Lingayas
University Faridabad, Faridabad, India), Amit chugh2
(Assistant Professor, Dept. of CSE, Lingayas University
Faridabad, Faridabad, India)
[6] Enhancing Security in Cloud computing using
Public Key Cryptography with Matricesby Birendra
Goswami (Faculty Member, UMA, Ranchi), Dr. S. N.
Singh (HOD, Deptt. Of IT, XISS, Ranchi)

More Related Content

What's hot

Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptographyRahulprasad Yadav
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud ComputingImane SBAI
 
Cloud computing & energy efficiency using cloud to decrease the energy use in...
Cloud computing & energy efficiency using cloud to decrease the energy use in...Cloud computing & energy efficiency using cloud to decrease the energy use in...
Cloud computing & energy efficiency using cloud to decrease the energy use in...Puru Agrawal
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to CryptographyMd. Afif Al Mamun
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacyPawan Arya
 
Azure key vault
Azure key vaultAzure key vault
Azure key vaultRahul Nath
 
Cloud deployment models
Cloud deployment modelsCloud deployment models
Cloud deployment modelsAshok Kumar
 
Cryptography - An Overview
Cryptography - An OverviewCryptography - An Overview
Cryptography - An Overviewppd1961
 
Quantum threat: How to protect your optical network
Quantum threat: How to protect your optical networkQuantum threat: How to protect your optical network
Quantum threat: How to protect your optical networkADVA
 
Cloud Security, Standards and Applications
Cloud Security, Standards and ApplicationsCloud Security, Standards and Applications
Cloud Security, Standards and ApplicationsDr. Sunil Kr. Pandey
 

What's hot (20)

Cryptography
CryptographyCryptography
Cryptography
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
FOG COMPUTING
FOG COMPUTINGFOG COMPUTING
FOG COMPUTING
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptography
 
Web Security
Web SecurityWeb Security
Web Security
 
Electronic mail security
Electronic mail securityElectronic mail security
Electronic mail security
 
Cloud computing Report
Cloud computing ReportCloud computing Report
Cloud computing Report
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud computing & energy efficiency using cloud to decrease the energy use in...
Cloud computing & energy efficiency using cloud to decrease the energy use in...Cloud computing & energy efficiency using cloud to decrease the energy use in...
Cloud computing & energy efficiency using cloud to decrease the energy use in...
 
cryptography
cryptographycryptography
cryptography
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacy
 
Azure key vault
Azure key vaultAzure key vault
Azure key vault
 
Cloud deployment models
Cloud deployment modelsCloud deployment models
Cloud deployment models
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud security
Cloud security Cloud security
Cloud security
 
Cryptography - An Overview
Cryptography - An OverviewCryptography - An Overview
Cryptography - An Overview
 
Quantum threat: How to protect your optical network
Quantum threat: How to protect your optical networkQuantum threat: How to protect your optical network
Quantum threat: How to protect your optical network
 
Cloud Security, Standards and Applications
Cloud Security, Standards and ApplicationsCloud Security, Standards and Applications
Cloud Security, Standards and Applications
 
Symmetric and asymmetric key
Symmetric and asymmetric keySymmetric and asymmetric key
Symmetric and asymmetric key
 

Similar to Cloud Cryptography

Cloud computing and a new approach in data encryption technique
Cloud computing and a new approach in data encryption techniqueCloud computing and a new approach in data encryption technique
Cloud computing and a new approach in data encryption techniqueMahmuda Rahman
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudIJERA Editor
 
Paper id 27201448
Paper id 27201448Paper id 27201448
Paper id 27201448IJRAT
 
Execution Analysis of Different Cryptographic Encryption Algorithms on Differ...
Execution Analysis of Different Cryptographic Encryption Algorithms on Differ...Execution Analysis of Different Cryptographic Encryption Algorithms on Differ...
Execution Analysis of Different Cryptographic Encryption Algorithms on Differ...IRJET Journal
 
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEMSECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEMJournal For Research
 
Enhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic AlgorithmEnhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic AlgorithmIOSR Journals
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
Cloud security: literature survey
Cloud security: literature surveyCloud security: literature survey
Cloud security: literature surveyIJECEIAES
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET Journal
 
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET- Data Security in Cloud Computing using Cryptographic AlgorithmsIRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET- Data Security in Cloud Computing using Cryptographic AlgorithmsIRJET Journal
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computingAlexander Decker
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computingAlexander Decker
 
Secure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA AlgorithmSecure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA AlgorithmIRJET Journal
 
Secure File Sharing In Cloud Using Encryption with Digital Signature
Secure File Sharing In Cloud Using Encryption with Digital  Signature Secure File Sharing In Cloud Using Encryption with Digital  Signature
Secure File Sharing In Cloud Using Encryption with Digital Signature IJMER
 
Security and privacy approach of cloud computing
Security and privacy approach of cloud computingSecurity and privacy approach of cloud computing
Security and privacy approach of cloud computingJahangeer Qadiree
 

Similar to Cloud Cryptography (20)

Cloud computing and a new approach in data encryption technique
Cloud computing and a new approach in data encryption techniqueCloud computing and a new approach in data encryption technique
Cloud computing and a new approach in data encryption technique
 
Kp3419221926
Kp3419221926Kp3419221926
Kp3419221926
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
 
Paper id 27201448
Paper id 27201448Paper id 27201448
Paper id 27201448
 
Execution Analysis of Different Cryptographic Encryption Algorithms on Differ...
Execution Analysis of Different Cryptographic Encryption Algorithms on Differ...Execution Analysis of Different Cryptographic Encryption Algorithms on Differ...
Execution Analysis of Different Cryptographic Encryption Algorithms on Differ...
 
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEMSECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
 
Enhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic AlgorithmEnhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
H017155360
H017155360H017155360
H017155360
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
Cloud security: literature survey
Cloud security: literature surveyCloud security: literature survey
Cloud security: literature survey
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
 
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET- Data Security in Cloud Computing using Cryptographic AlgorithmsIRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
 
C017421624
C017421624C017421624
C017421624
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing
 
Secure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA AlgorithmSecure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA Algorithm
 
Secure File Sharing In Cloud Using Encryption with Digital Signature
Secure File Sharing In Cloud Using Encryption with Digital  Signature Secure File Sharing In Cloud Using Encryption with Digital  Signature
Secure File Sharing In Cloud Using Encryption with Digital Signature
 
Security and privacy approach of cloud computing
Security and privacy approach of cloud computingSecurity and privacy approach of cloud computing
Security and privacy approach of cloud computing
 

More from ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementationijtsrd
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospectsijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...ijtsrd
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Studyijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...ijtsrd
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadikuijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Mapijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Societyijtsrd
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...ijtsrd
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learningijtsrd
 

More from ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Recently uploaded

BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 

Recently uploaded (20)

BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 

Cloud Cryptography

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume: 3 | Issue: 2 | Jan-Feb 2019 Available Online: www.ijtsrd.com e-ISSN: 2456 - 6470 @ IJTSRD | Unique Reference Paper ID – IJTSRD21547 | Volume – 3 | Issue – 2 | Jan-Feb 2019 Page: 972 Cloud Cryptography Padmapriya I, Ragini H MOP Vaishnav College for Women, Nungambakkam, Chennai, Tamil Nadu, India ABSTRACT Cloud computing is the emerging trend in today’s world. Cloud computing is not a separate technology, it is platform which provides platform as a service, Infrastructure as a service and Software as a service. The most important thing with cloud is that we hire everything from a third party or store our important data’s in a third parties place .Here comes the major issue of how our data’s are secured. In this paper, we discuss about how to protect our data’s in the cloud with various cryptographic techniques. Keywords: Public key, private key, encryption, decryption, cipher text 1. INTRODUCTION Cloud computing –an upcoming trend in computing world, when compared with traditional computing process has many advantages. In traditional computing, we need tohave all our computing resources in the premises where we are going to work. But it is not the case with cloud computing. Similarly, setup an environment with all the needed resources will amount to a large pay and not all companies can offered for all the needed resources,notalltheresources will be used all the time. But in cloud , we hire and use what we need and pay only for what we have used .Thus ,cloud has many advantages when compared to traditional computing techniques. Every good thing will have some defects associated with it. Likewise, the major issue cloud has is “Security issue”. So, one way to secure the data on the clod environment is using cryptographic techniques. This includes the use of private and public keys, which plays an important role in encrypting the data from a plain text to cipher text. Public keys are given to those who are going to decrypt the data and use it ,where the private keys are used only by the own user of the data to encrypt it. Literature review: Survey paper on cloud storage security by SUNITA SHARMA, AMIT CHUGH, helped usinunderstanding how to secure data on the cloud using Kerberos authentication service and cloud proof technique. Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography by Liang Yan, Chunming Rong, and Gansen Zhao made us understand about securing the data’s on the cloud through various identity based cryptographic techniques. Secure User Data in Cloud Computing Using Encryption Algorithms by Rachna Arora, Anshu Parashar gave us knowledge aboutthe various algorithms used for cryptographic techniques. Data Security in Cloud Computing with Elliptic Curve Cryptography by Veerraju Gampala, Srilakshmi Inuganti, Satish Muppidi greatly helped us to know about a new technique for encrypting data on the cloud. Enhancing Security in Cloud computing using Public Key Cryptography with Matrices by Birendra Goswami, Dr. S. N. Singh helped us know about a mathematical technique- matrices, for encrypting and decrypting cloud data’s. Issues with Data’s stored on cloud: [1] Issue 1: (Data Breaches) In cloud all data’s get stored in online rather than getting stored in a secured premises which makes it more unsecured. Issue 2: (Hijacking of accounts) Once attackers get one’s username and password ,they get access to the data’s on the cloud like a legal user. Issue 3: (Insider Threats) This attack is from the insider who has an authorized access, but uses it to perform unauthorized activities. Issue 4: (Malware injection) This attack is like injecting malware into our cloud service that becomes a serious threats to the cloud users. Issue 5: (DOS Attacks) DOS attacks could be putting more request than the cloud server could handle to crash the server. In addition to this there are many issues like, Insecure API’s, Insufficient due diligence, Shared Vulnerabilities, Data loss etc. There are several algorithms Proposed to handle these issues. Algorithms: To handle these above threats,many algorithms were proposed, RSA Algorithm: Here, public and private keys are used. Private keysareused to encrypt the data by the own user of the dataand stored on the cloud and the public keys are used to decrypt the data’s when it is needed by other’s to access it. The disadvantage that data is secured until Private key is unknown to others. once the private key is known by intrude, full privacy is lost.
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Reference Paper ID – IJTSRD21547 | Volume – 3 | Issue – 2 | Jan-Feb 2019 Page: 973 DES Algorithm: In DES, a block of 64 bits of plain text is sent as an input to the DES algorithm which produces 64 bits of cipher text and the cipher is converted into plain text using the same key. The key length here is 56 bits, which is consideredtobevery small and this is considered to be its serious disadvantage. AES Algorithm: AES is alternative to DES, as DES key length used for encryption is very small. Thisalgorithmusesa128-bitlength key to encrypt the data. The data to be stored on the cloud is encrypted using AES algorithm and is sent to the cloud service provider. Any request to access the data is satisfied by decrypting the data with the encrypted key and given to user for access as a plain text. No plain text is stored on the cloud environment. Blowfish: Blowfish takes 64 bits block of plain text and encrypts it into cipher text and stores the cipher text into the service providers place with a key having variable lengths from 32 bits to 448 bits. Homomorphic: Homomorphic is a encryption technique where encrypted cipher data is stored in the cloud Serviceprovidersplaceand When one needs access to the data can work on the cipher text as though it a real plain text. Drawbacks with these algorithms: All the above algorithms uses the concept of keys for encrypting the data .The major drawbacks of all the algorithms are ,once if the key used to encrypt the data is known ,an intruder can easily modify the data ,for Securing what these several actions are done. Solution to these Drawbacks: The drawbacks of the algorithms could be solved by using these proposed techniques like, Federal Identity Management: Here, each user is given a unique digital identityusingwhich one can have access to the different cloud services and its data’s. The digital identity are given in such a way that they cannot be guessed as easily as possible. [2] Identity based cryptography: In this method, public identifier of a user is his/her public key, that can be used for securing data on the cloud[2] Federal Identity Management: This method is a development from identity based cryptography, but it adds solutions to avoid the scalability problems. [2] Elliptic curve cryptography: This is a cryptographic technique based on elliptic curve theory to generate cryptographic keys rather using the traditional key generation techniques. It provides greater level security with 164 bit keys.[3] Securing data on the cloud by cryptography with matrices: This method mainly has two parts: One is Preprocessing, which includes data shuffling and traversing of the data.The second part deals with Key generation, Key agreement and encryption and decryption processes.[6] Diffie Hellmann Key Exchange: It has two keys-Private and public keys. The sender of the data encrypts the data with his Private key and receivers public key and send its to the receiver. Thereceiver decrypts the data using his Private key and senders public key, thus providing two ways of authentications.[4] Securing data on the cloud with cloud proof: With these techniques, one candetectthethreatsoccurrence to the data and also report it to the CSP’s with valid proof. Kerberos authentication services: Here Kerberos techniques were used to authenticate the valid user for securing data. This uses the complex Ticket granting algorithms for creating tickets and granting tickets for each users. [6] Conclusion: Cloud environment has benefitted people of different communities. At the same time it has its own drawbacks. Every great things have to face its own drawbacks. Taking the good part of it and providing safety measures for the flaws, one can use cloud technology and benefit at its fullest. References: [1] Secure User Data in Cloud Computing Using Encryption Algorithms by Rachna Arora(Research Scholar, HCTM, Kaithal, Haryana), Anshu Parashar (Associate Professor, HCTM, Kaithal, Haryana) [2] Strengthen Cloud Computing Securitywith Federal Identity Management Using Hierarchical Identity- Based Cryptography by Liang Yan(University of Stavanger, Norway), Chunming Rong(University of Stavanger, Norway), and Gansen Zhao(South China Normal University, China) [3] Data Security in Cloud Computing with Elliptic Curve CryptographybyVeerraju Gampala, Srilakshmi Inuganti, Satish Muppidi [4] Data Security in Cloud Architecture Basedon Diffie Hellman and Elliptical CurveCryptographybyNeha Tirthani, Ganesan R [5] Survey paper on cloud storage Security by Sunita Sharma (M.Tech. Student, Dept. of CSE, Lingayas University Faridabad, Faridabad, India), Amit chugh2 (Assistant Professor, Dept. of CSE, Lingayas University Faridabad, Faridabad, India) [6] Enhancing Security in Cloud computing using Public Key Cryptography with Matricesby Birendra Goswami (Faculty Member, UMA, Ranchi), Dr. S. N. Singh (HOD, Deptt. Of IT, XISS, Ranchi)