19
1 Dr. Panjabrao Deshmukh Polytechnic Amravati Presented by :- Devyani B. Vaidya. Guided By: - G . R. Gosavi.

Secued Cloud

Embed Size (px)

Citation preview

Page 1: Secued  Cloud

1

Dr. Panjabrao Deshmukh Polytechnic Amravati

Presented by :-Devyani B. Vaidya.

Guided By: -G . R. Gosavi.

Page 2: Secued  Cloud

1. Introduction.2. Need of cloud computing Backup.3. Deployment models.4. Security issues.5. Risk of cloud .6. Importance of Cloud.7. How to Secure Data on the Cloud ?8. Techniques Used To Encrypt Data.9. Example of Encryption.10. Conclusion .11. References .

CONTENTS.

Page 3: Secued  Cloud

Secure Cloud’s simple

approach to data protection safely delivers encryption keys to valid devices without the need to deploy an entire file system and management infrastructure.

Introduction

Page 4: Secued  Cloud

Backup services are also provided by cloud

computing and cover such functions like availability of remote data, resiliency of data center, compliance and security, server performance, and data protection which are especially practical and handy for business to business backup.

Why Is There A Need For Cloud Computing Backup?

Page 5: Secued  Cloud

Public Private Hybrid

Deployment Models

Page 6: Secued  Cloud

1. Data Integrity 2. Data Theft 3. Privacy issues 4. Infected Application 5. Data loss 6. Data Location 7. Security on Vendor level 8. Security on user level

Security Issues faced by Cloud computing

Page 7: Secued  Cloud

Privacy agreement and service level

agreement. Security and data protection. Location of data. Loss Of Private/Important Data.

Risks of cloud computing

Page 8: Secued  Cloud

Increasing Usage of Cloud Services in

Non-traditional Sectors Growing Adoption of Cloud Services in

Government Departments Rise in Cloud Service-specific Attacks Growing Usage of Cloud Services for

Critical Data Storage Rise in Employee Mobility .

Why is Cloud Security Important

Page 9: Secued  Cloud

Avoid storing sensitive information in

the cloud. Be serious about passwords. Encryption.

How to Secure Data on the Cloud ?

Page 10: Secued  Cloud

The Caesar Cipher. Vigenere cipher. Rail Fence cipher. Steganography.

Techniques Used To Encrypt Data

Page 11: Secued  Cloud

1. Choose the File that you want

to Encrypt.

How To Encrypt file

Page 12: Secued  Cloud

2. choose any one algorithm .

Conti….

Page 13: Secued  Cloud

3. choose format of Encryption. Conti…

Page 14: Secued  Cloud

4. Click on Encrypt.

Conti..

Page 15: Secued  Cloud

5. After Encryption , Output.

Conti..

Page 16: Secued  Cloud

Thus We are Understand the concept

of cloud security and its encryption technique . We also see that how to encrypt our data before sending it on to cloud.

Conclusion..

Page 17: Secued  Cloud

www.google.com www.askmi.com www.wikipedia.com http://cgl.soic.indiana.edu/publications/ReportNariman

MirzaeiJan09.pdf

https://en.wikipedia.org/wiki/Cloud_computing http://www.ibm.com/cloud-computing/what-is-cloud-co

mputing.html

References

Page 18: Secued  Cloud
Page 19: Secued  Cloud