Topic - : Encryption Options, Authentication and Authorization
Topic - : Encryption Options, Authentication and Authorization
Encryption
options,
Authentication
and
authorization
Presented by:-
Surbhi Kumari
Nishtha Roy
Q. Id. –
22030518, 22030502
B.Tech CSE 3rd year
Sec- ‘1’
CONTENTS
• What is cloud encryption ?
• Encryption options
• Benefits and Challenges
• What is Authentication ?
• Types Of Authentication
• What is Authorization ?
What is Cloud Encryption?
Cloud encryption is the process of transforming data from its original plain text
format to an unreadable format, such as ciphertext, before it is transferred to and
stored in the cloud.
It is the most effective ways to uphold data privacy as well as protect Cloud data in
transit or at rest against cyber attacks.
As with any form of data encryption, cloud encryption renders the information
indecipherable and therefore useless without the encryption keys. This applies
even if the data is lost, stolen or shared with an unauthorized user.
Types of Encryption
Cloud encryption services and protocols fall into two
main categories:-
Symmetric encryption: In this, a single key is used to encrypt
plain text and decrypt ciphertext.
Asymmetric encryption: In this, encoding and decoding are done
with linked public and private key pairs.This is like: We can lock it
(public key) without knowing the code, but only the person who
knows the code( public key) can open it again.
Encryption options
• Encrypting data in transit- Information that is
actively moving from one point to another, such as
via the internet or over a private network, is
referred to as data in transit.
Data is deemed less safe when in transit due to
the weakness
of transfer techniques.
Encryption options
• Encrypting data at rest- Data encryption for
information stored on the cloud network ensures
that even if the data is lost, stolen or mistakenly
shared, the contents are virtually useless without
the encryption key. Again, keys are only made
available to authorized users. Similar to data in
transit, encryption/decryption for data at rest is
managed by the software application.
Benefits of cloud
encryption
Security: End-to-end encryption protects sensitive information, including
client data, in transit, in use, or at rest, across any device or between
users.