In this presentation, Amali introduces the topic of SMAC and moves on to the problem area of storage in cloud. Her interest area lies in developing algorithms that make cloud storage safer.
2. Introduction
o Social media has provided businesses with new ways to
reach and interact with customers, while mobile
technologies have changed the way people
communicate, shop and work. Analytics allow
businesses to understand how, when and where people
consume certain goods and services and cloud
computing provides a new way to access technology
and the data a business needs to quickly respond to
changing markets and solve business problems .One of
the most emerging technology is cloud computing.
Many Multinational Companies started to move on to
the cloud. Unfortunately the big threat that scares all is
DATA INSECURITY in cloud. Data breach and data loss is
the popular problems faced by cloud technology.
3. To resolve this problem our project is trying to give a solution
by using a technology called DYNAMIC ENCRYPTION. With
this we can prevent the hackers in decrypting the data
present in the cloud. In this document we tried to
overcome the security issue faced by cloud during file
transfer. Despite of vast researches made to overcome
these issues, there is no perfect solution till determined. We
took this as a problem and proposed a simple solution to
overcome the issues through DYNAMIC ENCRYPTION
algorithms. Here we use two algorithms namely:
1. AES(Advanced Encryption
Standard)
2. RSA(Rivest Shamir Adleman)
4. Problem definition
The topic SCUDE briefly explains Storing and transferring
data in Cloud securely Using Dynamic Encryption. The
encrypted data in cloud server is again dynamically
encrypted with respect to time.
Symmetric key algorithms are used to encrypt the data
which rest on cloud, while transferring the data
asymmetric key algorithms are used.
5. Trends
Cloud computing has experienced exponential growth
over the last few years . The latest trends are listed
below .
Hybrid clouds
BYOD
Platform-as-a-Service (PaaS)
Big data analytics
Graphics as a service
Identity management and protection
Web-powered apps
6. The two trends that has an impact in next five years are
identity management and protection and web-
powered apps . Security has always been a major
concern with cloud computing. As more businesses
move more information and data into cloud servers, this
concern is more important than ever. It is anticipated
that over the next year, there will be identity
management solutions based on new cloud based
security paradigms. As efficiency and scalability are
among the primary benefits of cloud computing, then it
only makes sense to start developing cloud-based
applications that are compatible with multiple
platforms.
7. Solution
With help of RSA algorithm the data is encrypted first in
client side and sent to the cloud server.
Here the private key is held by user and public key is
held by cloud vendor.
The encrypted data present in the cloud server is again
dynamically encrypted with respect to time.
The user again decrypts the primary encrypted data
and gets the actual data.
8. Interest Areas
My interest area in cloud computing technology is
cloud security .
Cloud security is an evolving sub-domain of computer
security, network security, and, more broadly,
information security.
It refers to a broad set of policies, technologies, and
controls deployed to protect data, applications, and
the associated infrastructure of cloud computing.
Cloud computing security is the set of control-based
technologies and policies designed to adhere to
regulatory compliance rules and protect information,
data applications and infrastructure associated with
cloud computing use .
9. Impacts
The main advantage is preventing hacking and
cracking of data from unauthorized source.
Reliability and scalability can be improved.
This algorithm provides high security with firewalls.
Data breach and data loss is the major drawback in
the existing system which has been overcome in
SCUDE.