0% found this document useful (0 votes)
119 views8 pages

Secure File Storage On Cloud Using Hybrid Cryptography

Uploaded by

tejasvadar2003
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
119 views8 pages

Secure File Storage On Cloud Using Hybrid Cryptography

Uploaded by

tejasvadar2003
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 8

Se c u re File

Stora g e on Clou d
u s in g
Hyb rid
Storing s e ns itive file s s e c ure ly on the c loud is a c ritic a l c ha lle ng e
Hyb rid c ryp tog ra p hy c om b ining s ym m e tric a nd a s ym m e tric e nc ryp tion
,
.

Cryp tog ra p hy
offe rs a p owe rful s olution to p rote c t d a ta a nd e ns ure p riva c y

b y Tejas Vadar
.
Ove rvie w of Clou d
Stora g e Challenges

1 Da ta Priva c y 2 Ac c e s s Con trol


Ensuring the confidentiality of Controlling w h o c a n a c c e s s
file s s tore d on third p a rty
- sensitive data is crucial to
cloud servers is a major preventing unauthorized
c onc e rn . access .

3 Compliance
Meeting regulatory requirements for data protection is a
key c ha lle ng e for c loud s tora g e .
In trod u c tion to
Cryp tog ra p hy
Sym m e tric En c ryp tion As ym m e tric En c ryp tion
U s e s a single s h a r e d key for Utilizes a public - private key pair ,
both encryption a n d offering s e c u r e data e x c h a n g e
decryption , providing fast data a n d digital signatures .
protection .

Hashing
Transforms data into a fixed - length output , enabling data integrity
verification .
Symmetric a n d Asymmetric
Encryption
Sym m e tric En c ryp tion As ym m e tric En c ryp tion

Efficient , fast data protection using a s h a r e d secr et key . S e c u r e data e x c h a n g e a n d digital signatures using public -
private key pairs .
Examples : AES , DES , Blowfish
Examples : RSA , ECC , DSA
Hybrid Cryptography : Combining t h e
Strengths
Da ta En c ryp tion 1
U s e symmetric encryption to s e c u r e the data itself ,
providing fast a n d efficient encryption .

2 Ke y Exc h a n g e
Leverage asymmetric encryption to securely
e x c h a n g e the symmetric encryption keys .
Dig ita l Sig n a tu re s 3
Employ asymmetric encryption for digital signatures ,
ensuring data integrity a n d non - repudiation .
Ke y Ma n a g e m e n t
a n d Distribution

Se c u re Ke y Stora g e
Store encryption keys in a tamper - resistant hardware security module
( HSM ).

Se c u re Ke y Exc h a n g e
Utilize key e x c h a n g e protocols like Diffie - Hellman or RSA to securely
transmit keys .

Dig ita l Ce rtific a te s


U s e X .509 digital certificates to authenticate a n d authorize key u s a g e .
Ad va n ta g e s a n d Dis a d va n ta g e s
Adva ntages Disadvantages
Enhanced data security a n d privacy Increased complexity in implementation a n d maintenance

Improved compliance with regulatory requirements Potential performance impact d u e to additional

Flexibility in key m a n a g e m e n t a n d distribution encryption a n d decryption s t e p s

Depende ncy o n s e c u r e key m a n a g e m e n t infrastructure


Conclusion and
Future
Considerations
Em e rg in g Tre n d s
1 Qua ntum re s is ta nt e nc ryp tion a lg orithm s a nd p os t q ua ntum
- -

cryptography

Bloc kc h a in In te g ra tion
2 Leveraging blockchain for decentralized key
m a n a g e m e n t a n d distribution

Hom om orp h ic En c ryp tion


3 Enabling computation o n encrypted data without decryption

You might also like