secued cloud ppt

Preview:

Citation preview

1

Dr. Panjabrao Deshmukh Polytechnic Amravati

Presented by :-Miss .Devyani B. Vaidya.Mr. Kartik N. Kalpande.

1. Introduction.2. Need of cloud computing Backup.3. Deployment models.4. Security issues.5. Risk of cloud .6. Importance of Cloud.7. How to Secure Data on the Cloud ?8. Techniques Used To Encrypt Data.9. Example of Encryption.10. Conclusion .11. References .

CONTENTS.

Secure Cloud’s simple

approach to data protection safely delivers encryption keys to valid devices without the need to deploy an entire file system and management infrastructure.

Introduction

Backup services are also provided by cloud

computing and cover such functions like availability of remote data, resiliency of data center, compliance and security, server performance, and data protection which are especially practical and handy for business to business backup.

Why Is There A Need For Cloud Computing Backup?

Public Private Hybrid

Deployment Models

1. Data Integrity 2. Data Theft 3. Privacy issues 4. Infected Application 5. Data loss 6. Data Location 7. Security on Vendor level 8. Security on user level

Security Issues faced by Cloud computing

Privacy agreement and service level

agreement. Security and data protection. Location of data. Loss Of Private/Important Data.

Risks of cloud computing

Increasing Usage of Cloud Services in

Non-traditional Sectors Growing Adoption of Cloud Services in

Government Departments Rise in Cloud Service-specific Attacks Growing Usage of Cloud Services for

Critical Data Storage Rise in Employee Mobility .

Why is Cloud Security Important

Avoid storing sensitive information in

the cloud. Be serious about passwords. Encryption.

How to Secure Data on the Cloud ?

The Caesar Cipher. Vigenere cipher. Rail Fence cipher. Steganography.

Techniques Used To Encrypt Data

1. Choose the File that you want

to Encrypt.

How To Encrypt file

2. choose any one algorithm .

Conti….

3. choose format of Encryption. Conti…

4. Click on Encrypt.

Conti..

5. After Encryption , Output.

Conti..

Thus We are Understand the concept

of cloud security and its encryption technique . We also see that how to encrypt our data before sending it on to cloud.

Conclusion..

www.google.com www.askmi.com www.wikipedia.com http://cgl.soic.indiana.edu/publications/ReportNariman

MirzaeiJan09.pdf

https://en.wikipedia.org/wiki/Cloud_computing http://www.ibm.com/cloud-computing/what-is-cloud-co

mputing.html

References