secued cloud
TRANSCRIPT
Dr. Panjabrao deshmukh poly.Amt.
Seminar on
Secure Cloud
Presented by :-1.Devyani B. Vaidya.
Guided By:-Prof. G. R.
Gosavi.
Contents1. Introduction
Introduction Secure Cloud’s simple approach to data
protection safely delivers encryption keys to valid devices without the need to deploy an entire file system and management infrastructure
Why Is There A Need For Cloud Computing Backup?
Backup services are also provided by cloud computing and cover such functions like availability of remote data, resiliency of data center, compliance and security, server performance, and data protection which are especially practical and handy for business to business backup.
Deployment Models PublicPrivateHybrid
Security Issues faced by Cloud computing
1. Data Integrity 2. Data Theft 3. Privacy issues 4. Infected Application 5. Data loss 6. Data Location 7. Security on Vendor level 8. Security on user level
Risks of cloud computing
Privacy agreement and service level agreement.
Security and data protection. Location of data.Loss Of Private/Important Data.
Why is Cloud Security Important
Increasing Usage of Cloud Services in Non-traditional Sectors
Growing Adoption of Cloud Services in Government Departments
Rise in Cloud Service-specific Attacks Growing Usage of Cloud Services for
Critical Data Storage Rise in Employee Mobility
How to Secure Data on the Cloud ?Avoid storing sensitive information in
the cloud. Read the user agreement to find out
how your cloud service storage works.Be serious about passwords. Encryption.
Techniques Used To Encrypt Data
The Caesar Cipher.
Vigenere cipher.
Rail Fence cipher.
Steganography.
How To Encrypt file1. Choose the File that you want
to Encrypt .
Conti….2. choose any one algorithm .
Conti…3. choose format of Encryption.
Conti..4. Click on Encrypt.
Conti..5. After Encryption , Output.
Limitation..
Secure Cloud Agent.
Operating System.
Volume Encryption.
Boot Volume Encryption.
Conclusion..Thus We are Understand the concept of
cloud security and its encryption technique . We also see that how to encrypt our data before sending it on to cloud.
References www.google.comwww.askmi.comwww.wikipedia.comhttp://
cgl.soic.indiana.edu/publications/ReportNarimanMirzaeiJan09.pdf
https://en.wikipedia.org/wiki/Cloud_computing
http://www.ibm.com/cloud-computing/what-is-cloud-computing.html