Cloud Cryptography Conclusion Paragraph