SlideShare a Scribd company logo
1 of 10
SCUDE
Name: AmaliGlorya
E-mail: zianacorps18@gmail.com
University: Pondicherry
Year/Semester: III year/ VI
Branch: Information Technology
Introduction
o Social media has provided businesses with new ways to
reach and interact with customers, while mobile
technologies have changed the way people
communicate, shop and work. Analytics allow
businesses to understand how, when and where people
consume certain goods and services and cloud
computing provides a new way to access technology
and the data a business needs to quickly respond to
changing markets and solve business problems .One of
the most emerging technology is cloud computing.
Many Multinational Companies started to move on to
the cloud. Unfortunately the big threat that scares all is
DATA INSECURITY in cloud. Data breach and data loss is
the popular problems faced by cloud technology.
 To resolve this problem our project is trying to give a solution
by using a technology called DYNAMIC ENCRYPTION. With
this we can prevent the hackers in decrypting the data
present in the cloud. In this document we tried to
overcome the security issue faced by cloud during file
transfer. Despite of vast researches made to overcome
these issues, there is no perfect solution till determined. We
took this as a problem and proposed a simple solution to
overcome the issues through DYNAMIC ENCRYPTION
algorithms. Here we use two algorithms namely:
1. AES(Advanced Encryption
Standard)
2. RSA(Rivest Shamir Adleman)
Problem definition
 The topic SCUDE briefly explains Storing and transferring
data in Cloud securely Using Dynamic Encryption. The
encrypted data in cloud server is again dynamically
encrypted with respect to time.
 Symmetric key algorithms are used to encrypt the data
which rest on cloud, while transferring the data
asymmetric key algorithms are used.
Trends
 Cloud computing has experienced exponential growth
over the last few years . The latest trends are listed
below .
 Hybrid clouds
 BYOD
 Platform-as-a-Service (PaaS)
 Big data analytics
 Graphics as a service
 Identity management and protection
 Web-powered apps
 The two trends that has an impact in next five years are
identity management and protection and web-
powered apps . Security has always been a major
concern with cloud computing. As more businesses
move more information and data into cloud servers, this
concern is more important than ever. It is anticipated
that over the next year, there will be identity
management solutions based on new cloud based
security paradigms. As efficiency and scalability are
among the primary benefits of cloud computing, then it
only makes sense to start developing cloud-based
applications that are compatible with multiple
platforms.
Solution
 With help of RSA algorithm the data is encrypted first in
client side and sent to the cloud server.
 Here the private key is held by user and public key is
held by cloud vendor.
 The encrypted data present in the cloud server is again
dynamically encrypted with respect to time.
 The user again decrypts the primary encrypted data
and gets the actual data.
Interest Areas
 My interest area in cloud computing technology is
cloud security .
 Cloud security is an evolving sub-domain of computer
security, network security, and, more broadly,
information security.
 It refers to a broad set of policies, technologies, and
controls deployed to protect data, applications, and
the associated infrastructure of cloud computing.
 Cloud computing security is the set of control-based
technologies and policies designed to adhere to
regulatory compliance rules and protect information,
data applications and infrastructure associated with
cloud computing use .
Impacts
 The main advantage is preventing hacking and
cracking of data from unauthorized source.
 Reliability and scalability can be improved.
 This algorithm provides high security with firewalls.
 Data breach and data loss is the major drawback in
the existing system which has been overcome in
SCUDE.
Thank you

More Related Content

What's hot

2014-11-19 fog computing expo
2014-11-19 fog computing expo2014-11-19 fog computing expo
2014-11-19 fog computing exposzhosain
 
Fog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptFog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptpriyanka reddy
 
Fog computing : The new age Technology
Fog computing : The new age TechnologyFog computing : The new age Technology
Fog computing : The new age TechnologyPrankit Mishra
 
Analysis of classical encryption techniques in cloud computing
Analysis of classical encryption techniques in cloud computingAnalysis of classical encryption techniques in cloud computing
Analysis of classical encryption techniques in cloud computingredpel dot com
 
Security and Privacy in Cloud Computing - a High-level view
Security and Privacy in Cloud Computing - a High-level viewSecurity and Privacy in Cloud Computing - a High-level view
Security and Privacy in Cloud Computing - a High-level viewragibhasan
 
Fog computing document
Fog computing documentFog computing document
Fog computing documentsravya raju
 
Review of implementing fog computing
Review of implementing fog computingReview of implementing fog computing
Review of implementing fog computingeSAT Journals
 
Fog computing ( foggy cloud)
Fog computing  ( foggy cloud)Fog computing  ( foggy cloud)
Fog computing ( foggy cloud)Iffat Anjum
 
Privacy and security in the cloud Challenges and solutions for our future inf...
Privacy and security in the cloud Challenges and solutions for our future inf...Privacy and security in the cloud Challenges and solutions for our future inf...
Privacy and security in the cloud Challenges and solutions for our future inf...PRISMACLOUD Project
 
Research proposal on Computing Security and Reliability - Phdassistance.com
Research proposal on Computing Security and Reliability - Phdassistance.comResearch proposal on Computing Security and Reliability - Phdassistance.com
Research proposal on Computing Security and Reliability - Phdassistance.comPhD Assistance
 
Fog Computing and Cloud Computing
Fog Computing and Cloud ComputingFog Computing and Cloud Computing
Fog Computing and Cloud ComputingAhmed Banafa
 
FOG COMPUTING- Presentation
FOG COMPUTING- Presentation FOG COMPUTING- Presentation
FOG COMPUTING- Presentation Anjana Shivangi
 
Michael Enescu - Cloud + IoT at IEEE
Michael Enescu - Cloud + IoT at IEEEMichael Enescu - Cloud + IoT at IEEE
Michael Enescu - Cloud + IoT at IEEEMichael Enescu
 
Data security in cloud compu
Data security in cloud compuData security in cloud compu
Data security in cloud compuANIL247048
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing securityGahya Pandian
 

What's hot (19)

2014-11-19 fog computing expo
2014-11-19 fog computing expo2014-11-19 fog computing expo
2014-11-19 fog computing expo
 
Fog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptFog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud ppt
 
Fog computing : The new age Technology
Fog computing : The new age TechnologyFog computing : The new age Technology
Fog computing : The new age Technology
 
Analysis of classical encryption techniques in cloud computing
Analysis of classical encryption techniques in cloud computingAnalysis of classical encryption techniques in cloud computing
Analysis of classical encryption techniques in cloud computing
 
FOG COMPUTING
FOG COMPUTINGFOG COMPUTING
FOG COMPUTING
 
Seminar ppt fog comp
Seminar ppt fog compSeminar ppt fog comp
Seminar ppt fog comp
 
Security and Privacy in Cloud Computing - a High-level view
Security and Privacy in Cloud Computing - a High-level viewSecurity and Privacy in Cloud Computing - a High-level view
Security and Privacy in Cloud Computing - a High-level view
 
Fog computing document
Fog computing documentFog computing document
Fog computing document
 
Review of implementing fog computing
Review of implementing fog computingReview of implementing fog computing
Review of implementing fog computing
 
Fog computing ( foggy cloud)
Fog computing  ( foggy cloud)Fog computing  ( foggy cloud)
Fog computing ( foggy cloud)
 
Privacy and security in the cloud Challenges and solutions for our future inf...
Privacy and security in the cloud Challenges and solutions for our future inf...Privacy and security in the cloud Challenges and solutions for our future inf...
Privacy and security in the cloud Challenges and solutions for our future inf...
 
Fog computing
Fog computingFog computing
Fog computing
 
Research proposal on Computing Security and Reliability - Phdassistance.com
Research proposal on Computing Security and Reliability - Phdassistance.comResearch proposal on Computing Security and Reliability - Phdassistance.com
Research proposal on Computing Security and Reliability - Phdassistance.com
 
Fog Computing and Cloud Computing
Fog Computing and Cloud ComputingFog Computing and Cloud Computing
Fog Computing and Cloud Computing
 
FOG COMPUTING- Presentation
FOG COMPUTING- Presentation FOG COMPUTING- Presentation
FOG COMPUTING- Presentation
 
Michael Enescu - Cloud + IoT at IEEE
Michael Enescu - Cloud + IoT at IEEEMichael Enescu - Cloud + IoT at IEEE
Michael Enescu - Cloud + IoT at IEEE
 
Cloud.ppt
Cloud.pptCloud.ppt
Cloud.ppt
 
Data security in cloud compu
Data security in cloud compuData security in cloud compu
Data security in cloud compu
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 

Viewers also liked

Howard C. Williams good resume
Howard C. Williams good resumeHoward C. Williams good resume
Howard C. Williams good resumeHoward Williams
 
Manos a la obra: Cómo dar grandes pasos en el marketing digital
Manos a la obra: Cómo dar grandes pasos en el marketing digitalManos a la obra: Cómo dar grandes pasos en el marketing digital
Manos a la obra: Cómo dar grandes pasos en el marketing digitalIgni
 
Mobile messaging solutions for online gaming companies
Mobile messaging solutions for online gaming companiesMobile messaging solutions for online gaming companies
Mobile messaging solutions for online gaming companiesMDK Labs GmbH
 
Educación Vial
Educación VialEducación Vial
Educación VialBitaka
 
Twig Embody - the wearable 3G/GSM/GNSS personal alarm device
Twig Embody - the wearable 3G/GSM/GNSS personal alarm deviceTwig Embody - the wearable 3G/GSM/GNSS personal alarm device
Twig Embody - the wearable 3G/GSM/GNSS personal alarm deviceJane Lindell
 
Sesiones clinicas basadas en la evidencia 2014 - Sessió de Residents 2013-201...
Sesiones clinicas basadas en la evidencia 2014 - Sessió de Residents 2013-201...Sesiones clinicas basadas en la evidencia 2014 - Sessió de Residents 2013-201...
Sesiones clinicas basadas en la evidencia 2014 - Sessió de Residents 2013-201...Grup Pere Mata
 
Los retablos en sevilla 1
Los retablos en sevilla 1Los retablos en sevilla 1
Los retablos en sevilla 1Sanmoreno
 
Sanjay_Saini-Resume
Sanjay_Saini-ResumeSanjay_Saini-Resume
Sanjay_Saini-ResumeSanjay Saini
 
Biblioteca Escolar Valenzuela
Biblioteca Escolar ValenzuelaBiblioteca Escolar Valenzuela
Biblioteca Escolar Valenzuelaamalba
 
Efectos de las aflatoxinas
Efectos de las aflatoxinasEfectos de las aflatoxinas
Efectos de las aflatoxinasESPOL
 
Design and Simulation Triple-DES
Design and Simulation Triple-DESDesign and Simulation Triple-DES
Design and Simulation Triple-DESchatsiri
 
Primer método de coaching para traders a través de Jose Luis Cases Lozano
Primer método de coaching para traders a través de Jose Luis Cases LozanoPrimer método de coaching para traders a través de Jose Luis Cases Lozano
Primer método de coaching para traders a través de Jose Luis Cases LozanoPullback.es
 
Anatomía cardiovascular por imagen
Anatomía cardiovascular por  imagenAnatomía cardiovascular por  imagen
Anatomía cardiovascular por imagenITESM - EMIS
 
GESTIÓN INTEGRADA DE LOS RECURSOS HÍDRICOS - LA GESTIÓN DE LOS ACUÍFEROS
GESTIÓN INTEGRADA DE LOS RECURSOS HÍDRICOS - LA GESTIÓN DE LOS ACUÍFEROSGESTIÓN INTEGRADA DE LOS RECURSOS HÍDRICOS - LA GESTIÓN DE LOS ACUÍFEROS
GESTIÓN INTEGRADA DE LOS RECURSOS HÍDRICOS - LA GESTIÓN DE LOS ACUÍFEROSSector Energía y Minas - INGEMMET
 

Viewers also liked (20)

Howard C. Williams good resume
Howard C. Williams good resumeHoward C. Williams good resume
Howard C. Williams good resume
 
Manos a la obra: Cómo dar grandes pasos en el marketing digital
Manos a la obra: Cómo dar grandes pasos en el marketing digitalManos a la obra: Cómo dar grandes pasos en el marketing digital
Manos a la obra: Cómo dar grandes pasos en el marketing digital
 
Teaching Software Engineering with Open Source Projects
Teaching Software Engineering with Open Source ProjectsTeaching Software Engineering with Open Source Projects
Teaching Software Engineering with Open Source Projects
 
Mobile messaging solutions for online gaming companies
Mobile messaging solutions for online gaming companiesMobile messaging solutions for online gaming companies
Mobile messaging solutions for online gaming companies
 
Educación Vial
Educación VialEducación Vial
Educación Vial
 
Twig Embody - the wearable 3G/GSM/GNSS personal alarm device
Twig Embody - the wearable 3G/GSM/GNSS personal alarm deviceTwig Embody - the wearable 3G/GSM/GNSS personal alarm device
Twig Embody - the wearable 3G/GSM/GNSS personal alarm device
 
Sesiones clinicas basadas en la evidencia 2014 - Sessió de Residents 2013-201...
Sesiones clinicas basadas en la evidencia 2014 - Sessió de Residents 2013-201...Sesiones clinicas basadas en la evidencia 2014 - Sessió de Residents 2013-201...
Sesiones clinicas basadas en la evidencia 2014 - Sessió de Residents 2013-201...
 
6.24.15
6.24.156.24.15
6.24.15
 
BottleGame Presentation
BottleGame PresentationBottleGame Presentation
BottleGame Presentation
 
Los retablos en sevilla 1
Los retablos en sevilla 1Los retablos en sevilla 1
Los retablos en sevilla 1
 
UM ICT Road Map
UM ICT Road MapUM ICT Road Map
UM ICT Road Map
 
Sanjay_Saini-Resume
Sanjay_Saini-ResumeSanjay_Saini-Resume
Sanjay_Saini-Resume
 
Richa Industries Ltd
Richa Industries LtdRicha Industries Ltd
Richa Industries Ltd
 
QualysGuard InfoDay 2012 - QualysGuard Suite 7.0
QualysGuard InfoDay 2012 - QualysGuard Suite 7.0QualysGuard InfoDay 2012 - QualysGuard Suite 7.0
QualysGuard InfoDay 2012 - QualysGuard Suite 7.0
 
Biblioteca Escolar Valenzuela
Biblioteca Escolar ValenzuelaBiblioteca Escolar Valenzuela
Biblioteca Escolar Valenzuela
 
Efectos de las aflatoxinas
Efectos de las aflatoxinasEfectos de las aflatoxinas
Efectos de las aflatoxinas
 
Design and Simulation Triple-DES
Design and Simulation Triple-DESDesign and Simulation Triple-DES
Design and Simulation Triple-DES
 
Primer método de coaching para traders a través de Jose Luis Cases Lozano
Primer método de coaching para traders a través de Jose Luis Cases LozanoPrimer método de coaching para traders a través de Jose Luis Cases Lozano
Primer método de coaching para traders a través de Jose Luis Cases Lozano
 
Anatomía cardiovascular por imagen
Anatomía cardiovascular por  imagenAnatomía cardiovascular por  imagen
Anatomía cardiovascular por imagen
 
GESTIÓN INTEGRADA DE LOS RECURSOS HÍDRICOS - LA GESTIÓN DE LOS ACUÍFEROS
GESTIÓN INTEGRADA DE LOS RECURSOS HÍDRICOS - LA GESTIÓN DE LOS ACUÍFEROSGESTIÓN INTEGRADA DE LOS RECURSOS HÍDRICOS - LA GESTIÓN DE LOS ACUÍFEROS
GESTIÓN INTEGRADA DE LOS RECURSOS HÍDRICOS - LA GESTIÓN DE LOS ACUÍFEROS
 

Similar to Encryption Algorithms for Cloud

SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTINGSECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTINGIRJET Journal
 
Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...csandit
 
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...cscpconf
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar reportshafzonly
 
Why Cloud Security Matters in Today's Business World
Why Cloud Security Matters in Today's Business WorldWhy Cloud Security Matters in Today's Business World
Why Cloud Security Matters in Today's Business WorldCiente
 
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...AJASTJournal
 
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...Associate Professor in VSB Coimbatore
 
Security and privacy approach of cloud computing
Security and privacy approach of cloud computingSecurity and privacy approach of cloud computing
Security and privacy approach of cloud computingJahangeer Qadiree
 
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdfCloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdfDataSpace Academy
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
Major Cloud Security Challenges concerning the Enterprises | Sysfore
Major Cloud Security Challenges concerning the Enterprises | SysforeMajor Cloud Security Challenges concerning the Enterprises | Sysfore
Major Cloud Security Challenges concerning the Enterprises | SysforeSysfore Technologies
 
Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Editor IJARCET
 
How Deep Observability Powers Strong Cybersecurity and Network Insights Acros...
How Deep Observability Powers Strong Cybersecurity and Network Insights Acros...How Deep Observability Powers Strong Cybersecurity and Network Insights Acros...
How Deep Observability Powers Strong Cybersecurity and Network Insights Acros...Dana Gardner
 

Similar to Encryption Algorithms for Cloud (20)

SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTINGSECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
 
Ad4502189193
Ad4502189193Ad4502189193
Ad4502189193
 
Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...
 
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar report
 
Kp3419221926
Kp3419221926Kp3419221926
Kp3419221926
 
Why Cloud Security Matters in Today's Business World
Why Cloud Security Matters in Today's Business WorldWhy Cloud Security Matters in Today's Business World
Why Cloud Security Matters in Today's Business World
 
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
 
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
 
B1802041217
B1802041217B1802041217
B1802041217
 
Security and privacy approach of cloud computing
Security and privacy approach of cloud computingSecurity and privacy approach of cloud computing
Security and privacy approach of cloud computing
 
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdfCloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
H017155360
H017155360H017155360
H017155360
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
Major Cloud Security Challenges concerning the Enterprises | Sysfore
Major Cloud Security Challenges concerning the Enterprises | SysforeMajor Cloud Security Challenges concerning the Enterprises | Sysfore
Major Cloud Security Challenges concerning the Enterprises | Sysfore
 
Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409
 
C017421624
C017421624C017421624
C017421624
 
How Deep Observability Powers Strong Cybersecurity and Network Insights Acros...
How Deep Observability Powers Strong Cybersecurity and Network Insights Acros...How Deep Observability Powers Strong Cybersecurity and Network Insights Acros...
How Deep Observability Powers Strong Cybersecurity and Network Insights Acros...
 

More from Mphasis

Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
Automation
AutomationAutomation
AutomationMphasis
 
Home Automation System
Home Automation SystemHome Automation System
Home Automation SystemMphasis
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
Mphasis kushagra
Mphasis kushagraMphasis kushagra
Mphasis kushagraMphasis
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
Automation
AutomationAutomation
AutomationMphasis
 

More from Mphasis (20)

SMAC
SMACSMAC
SMAC
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Automation
AutomationAutomation
Automation
 
IoT
IoTIoT
IoT
 
Home Automation System
Home Automation SystemHome Automation System
Home Automation System
 
IoT
IoTIoT
IoT
 
SMAC
SMACSMAC
SMAC
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Mphasis kushagra
Mphasis kushagraMphasis kushagra
Mphasis kushagra
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
SMAC
SMACSMAC
SMAC
 
Io t 22
Io t 22Io t 22
Io t 22
 
IoT
IoTIoT
IoT
 
IoT
IoTIoT
IoT
 
IoT
IoTIoT
IoT
 
IoT
IoTIoT
IoT
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
SMAC
SMACSMAC
SMAC
 
IoT
IoTIoT
IoT
 
Automation
AutomationAutomation
Automation
 

Recently uploaded

20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...Akihiro Suda
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Hr365.us smith
 
Sending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdfSending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdf31events.com
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
UI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptxUI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptxAndreas Kunz
 
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdfInnovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdfYashikaSharma391629
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...Technogeeks
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
Salesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZSalesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZABSYZ Inc
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsChristian Birchler
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odishasmiwainfosol
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalLionel Briand
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprisepreethippts
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)jennyeacort
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesŁukasz Chruściel
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Velvetech LLC
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtimeandrehoraa
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作qr0udbr0
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfFerryKemperman
 

Recently uploaded (20)

20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)
 
Sending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdfSending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdf
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
UI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptxUI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptx
 
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdfInnovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdf
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
Salesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZSalesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZ
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive Goal
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprise
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New Features
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtime
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdf
 

Encryption Algorithms for Cloud

  • 1. SCUDE Name: AmaliGlorya E-mail: zianacorps18@gmail.com University: Pondicherry Year/Semester: III year/ VI Branch: Information Technology
  • 2. Introduction o Social media has provided businesses with new ways to reach and interact with customers, while mobile technologies have changed the way people communicate, shop and work. Analytics allow businesses to understand how, when and where people consume certain goods and services and cloud computing provides a new way to access technology and the data a business needs to quickly respond to changing markets and solve business problems .One of the most emerging technology is cloud computing. Many Multinational Companies started to move on to the cloud. Unfortunately the big threat that scares all is DATA INSECURITY in cloud. Data breach and data loss is the popular problems faced by cloud technology.
  • 3.  To resolve this problem our project is trying to give a solution by using a technology called DYNAMIC ENCRYPTION. With this we can prevent the hackers in decrypting the data present in the cloud. In this document we tried to overcome the security issue faced by cloud during file transfer. Despite of vast researches made to overcome these issues, there is no perfect solution till determined. We took this as a problem and proposed a simple solution to overcome the issues through DYNAMIC ENCRYPTION algorithms. Here we use two algorithms namely: 1. AES(Advanced Encryption Standard) 2. RSA(Rivest Shamir Adleman)
  • 4. Problem definition  The topic SCUDE briefly explains Storing and transferring data in Cloud securely Using Dynamic Encryption. The encrypted data in cloud server is again dynamically encrypted with respect to time.  Symmetric key algorithms are used to encrypt the data which rest on cloud, while transferring the data asymmetric key algorithms are used.
  • 5. Trends  Cloud computing has experienced exponential growth over the last few years . The latest trends are listed below .  Hybrid clouds  BYOD  Platform-as-a-Service (PaaS)  Big data analytics  Graphics as a service  Identity management and protection  Web-powered apps
  • 6.  The two trends that has an impact in next five years are identity management and protection and web- powered apps . Security has always been a major concern with cloud computing. As more businesses move more information and data into cloud servers, this concern is more important than ever. It is anticipated that over the next year, there will be identity management solutions based on new cloud based security paradigms. As efficiency and scalability are among the primary benefits of cloud computing, then it only makes sense to start developing cloud-based applications that are compatible with multiple platforms.
  • 7. Solution  With help of RSA algorithm the data is encrypted first in client side and sent to the cloud server.  Here the private key is held by user and public key is held by cloud vendor.  The encrypted data present in the cloud server is again dynamically encrypted with respect to time.  The user again decrypts the primary encrypted data and gets the actual data.
  • 8. Interest Areas  My interest area in cloud computing technology is cloud security .  Cloud security is an evolving sub-domain of computer security, network security, and, more broadly, information security.  It refers to a broad set of policies, technologies, and controls deployed to protect data, applications, and the associated infrastructure of cloud computing.  Cloud computing security is the set of control-based technologies and policies designed to adhere to regulatory compliance rules and protect information, data applications and infrastructure associated with cloud computing use .
  • 9. Impacts  The main advantage is preventing hacking and cracking of data from unauthorized source.  Reliability and scalability can be improved.  This algorithm provides high security with firewalls.  Data breach and data loss is the major drawback in the existing system which has been overcome in SCUDE.