This report delves into cryptographic techniques essential for securing data within cloud computing environments. It begins by highlighting the importance of cryptography in protecting data integrity and addressing threats within computer networks, particularly with the rise of outsourced storage. The report focuses on three primary cryptographic methods: symmetric key cryptography, where a single key is shared between sender and receiver; public key cryptography, which utilizes a public key for encryption and a private key for decryption; and hash functions, which do not involve keys. The report emphasizes the role of these techniques in ensuring data confidentiality and explores the practical applications of these techniques, especially within the context of cloud computing. The paper also mentions the need for effective security mechanisms for the protection of data stored into the network storage system, and discusses the security challenges of cloud computing.