Cryptography Techniques - Analysis of Security in Cloud Computing

Verified

Added on  2022/12/05

|3
|398
|59
Report
AI Summary
This report delves into cryptographic techniques essential for securing data within cloud computing environments. It begins by highlighting the importance of cryptography in protecting data integrity and addressing threats within computer networks, particularly with the rise of outsourced storage. The report focuses on three primary cryptographic methods: symmetric key cryptography, where a single key is shared between sender and receiver; public key cryptography, which utilizes a public key for encryption and a private key for decryption; and hash functions, which do not involve keys. The report emphasizes the role of these techniques in ensuring data confidentiality and explores the practical applications of these techniques, especially within the context of cloud computing. The paper also mentions the need for effective security mechanisms for the protection of data stored into the network storage system, and discusses the security challenges of cloud computing.
chevron_up_icon
1 out of 3
circle_padding
hide_on_mobile
zoom_out_icon
Loading PDF…
[object Object]