Cloud Cryptography Conclusion