Upload
devyani-vaidya
View
158
Download
0
Embed Size (px)
Citation preview
1
Dr. Panjabrao Deshmukh Polytechnic Amravati
Presented by :-Miss .Devyani B. Vaidya.Mr. Kartik N. Kalpande.
1. Introduction.2. Need of cloud computing Backup.3. Deployment models.4. Security issues.5. Risk of cloud .6. Importance of Cloud.7. How to Secure Data on the Cloud ?8. Techniques Used To Encrypt Data.9. Example of Encryption.10. Conclusion .11. References .
CONTENTS.
Secure Cloud’s simple
approach to data protection safely delivers encryption keys to valid devices without the need to deploy an entire file system and management infrastructure.
Introduction
Backup services are also provided by cloud
computing and cover such functions like availability of remote data, resiliency of data center, compliance and security, server performance, and data protection which are especially practical and handy for business to business backup.
Why Is There A Need For Cloud Computing Backup?
Public Private Hybrid
Deployment Models
1. Data Integrity 2. Data Theft 3. Privacy issues 4. Infected Application 5. Data loss 6. Data Location 7. Security on Vendor level 8. Security on user level
Security Issues faced by Cloud computing
Privacy agreement and service level
agreement. Security and data protection. Location of data. Loss Of Private/Important Data.
Risks of cloud computing
Increasing Usage of Cloud Services in
Non-traditional Sectors Growing Adoption of Cloud Services in
Government Departments Rise in Cloud Service-specific Attacks Growing Usage of Cloud Services for
Critical Data Storage Rise in Employee Mobility .
Why is Cloud Security Important
Avoid storing sensitive information in
the cloud. Be serious about passwords. Encryption.
How to Secure Data on the Cloud ?
The Caesar Cipher. Vigenere cipher. Rail Fence cipher. Steganography.
Techniques Used To Encrypt Data
1. Choose the File that you want
to Encrypt.
How To Encrypt file
2. choose any one algorithm .
Conti….
3. choose format of Encryption. Conti…
4. Click on Encrypt.
Conti..
5. After Encryption , Output.
Conti..
Thus We are Understand the concept
of cloud security and its encryption technique . We also see that how to encrypt our data before sending it on to cloud.
Conclusion..
www.google.com www.askmi.com www.wikipedia.com http://cgl.soic.indiana.edu/publications/ReportNariman
MirzaeiJan09.pdf
https://en.wikipedia.org/wiki/Cloud_computing http://www.ibm.com/cloud-computing/what-is-cloud-co
mputing.html
References