The document discusses cloud computing and data security. It provides an overview of cloud computing including deployment models, service models, and sub-service models. It also discusses key aspects of cloud data security such as authentication using OTP, encryption of data using strong algorithms, and ensuring data integrity through hashing. The proposed cloud data security model uses three levels of defense - strong authentication through OTP, automatic encryption of data using a fast and strong algorithm, and fast recovery of user data.
Cloud Security is critical to Data Security and Application Resilience against CyberAttacks. This talk looks at Security Best Practices that need to be practised.
This talk was presented at AWS Community Day Bengaluru 2019 by Amar Prusty, Cloud-Data Center Consultant Architect, DXC Technology
This presentation gives a detailed overview about Cloud Computing, its features and challenges faced by it in the market. It gives an insight into cloud security and privacy issues and its measures.
Cloud computing means storing and accessing data and programs over the Internet instead of your computer's hard drive.In computer networking, cloud computing is a phrase used to describe a variety of computing concepts that involve a large number of computers connected through a real-time communication network such as the Internet.
Cloud computing is a releasing individual and institutions from the traditional cvcle of buying-using-maintaining-upgrading IT resourcs - both hardware and software. Instead it is making IT resource accessible from anywhere and at proportions as required by the end user. Here is a brief introduction to this new transformation
Cloud Computing offers an on-demand and scalable access to a shared pool of resources hosted in a data center at providers’ site. It reduces the overheads of up-front investments and financial risks for the end-user. Regardless of the fact that cloud computing offers great advantages to the end users, there are several challenging issues that are mandatory to be addressed.
What Is Cloud Computing? | Cloud Computing For Beginners | Cloud Computing Tr...Simplilearn
This Cloud Computing presentation will help you understand what is Cloud Computing, benefits of Cloud Computing, types of Cloud Computing and who uses Cloud Computing. In simple words, Cloud Computing is the use of a network of remote servers hosted on the internet to store, manage and process data rather than a local server. With the increased importance of Cloud Computing, qualified Cloud solutions architects and engineers are in great demand. Organizations have moved to cloud platforms for better scalability, mobility, and security. Cloud solutions architects are among the highest paid professionals in the IT industry. With the cloud market set to grow more than ever before the need for IT staff with the appropriate technical and business skills has never been greater. This video will introduce you to Cloud Computing by explaining what it is and how do you get benefited from this Cloud Computing technology.
Below topics are explained in this Cloud Computing presentation:
1. Before Cloud Computing
2. What is Cloud Computing?
3. Benefits of Cloud Computing
4. Types of Cloud Computing
5. Who uses Cloud Computing?
Simplilearn’s Cloud Architect Master’s Program will build your Amazon Web Services (AWS) and Microsoft Azure cloud expertise from the ground up. You’ll learn to master the architectural principles and services of two of the top cloud platforms, design and deploy highly scalable, fault-tolerant applications and develop skills to transform yourself into an AWS and Azure cloud architect.
Why become a Cloud Architect?
With the increasing focus on cloud computing and infrastructure over the last several years, cloud architects are in great demand worldwide. Many organizations have moved to cloud platforms for better scalability, mobility, and security, and cloud solutions architects are among the highest paid professionals in the IT industry.
According to a study by Goldman Sachs, cloud computing is one of the top three initiatives planned by IT executives as they make cloud infrastructure an integral part of their organizations. According to Forbes, enterprise IT architects with cloud computing expertise are earning a median salary of $137,957.
Learn more at: https://www.simplilearn.com
Cloud Security is critical to Data Security and Application Resilience against CyberAttacks. This talk looks at Security Best Practices that need to be practised.
This talk was presented at AWS Community Day Bengaluru 2019 by Amar Prusty, Cloud-Data Center Consultant Architect, DXC Technology
This presentation gives a detailed overview about Cloud Computing, its features and challenges faced by it in the market. It gives an insight into cloud security and privacy issues and its measures.
Cloud computing means storing and accessing data and programs over the Internet instead of your computer's hard drive.In computer networking, cloud computing is a phrase used to describe a variety of computing concepts that involve a large number of computers connected through a real-time communication network such as the Internet.
Cloud computing is a releasing individual and institutions from the traditional cvcle of buying-using-maintaining-upgrading IT resourcs - both hardware and software. Instead it is making IT resource accessible from anywhere and at proportions as required by the end user. Here is a brief introduction to this new transformation
Cloud Computing offers an on-demand and scalable access to a shared pool of resources hosted in a data center at providers’ site. It reduces the overheads of up-front investments and financial risks for the end-user. Regardless of the fact that cloud computing offers great advantages to the end users, there are several challenging issues that are mandatory to be addressed.
What Is Cloud Computing? | Cloud Computing For Beginners | Cloud Computing Tr...Simplilearn
This Cloud Computing presentation will help you understand what is Cloud Computing, benefits of Cloud Computing, types of Cloud Computing and who uses Cloud Computing. In simple words, Cloud Computing is the use of a network of remote servers hosted on the internet to store, manage and process data rather than a local server. With the increased importance of Cloud Computing, qualified Cloud solutions architects and engineers are in great demand. Organizations have moved to cloud platforms for better scalability, mobility, and security. Cloud solutions architects are among the highest paid professionals in the IT industry. With the cloud market set to grow more than ever before the need for IT staff with the appropriate technical and business skills has never been greater. This video will introduce you to Cloud Computing by explaining what it is and how do you get benefited from this Cloud Computing technology.
Below topics are explained in this Cloud Computing presentation:
1. Before Cloud Computing
2. What is Cloud Computing?
3. Benefits of Cloud Computing
4. Types of Cloud Computing
5. Who uses Cloud Computing?
Simplilearn’s Cloud Architect Master’s Program will build your Amazon Web Services (AWS) and Microsoft Azure cloud expertise from the ground up. You’ll learn to master the architectural principles and services of two of the top cloud platforms, design and deploy highly scalable, fault-tolerant applications and develop skills to transform yourself into an AWS and Azure cloud architect.
Why become a Cloud Architect?
With the increasing focus on cloud computing and infrastructure over the last several years, cloud architects are in great demand worldwide. Many organizations have moved to cloud platforms for better scalability, mobility, and security, and cloud solutions architects are among the highest paid professionals in the IT industry.
According to a study by Goldman Sachs, cloud computing is one of the top three initiatives planned by IT executives as they make cloud infrastructure an integral part of their organizations. According to Forbes, enterprise IT architects with cloud computing expertise are earning a median salary of $137,957.
Learn more at: https://www.simplilearn.com
This Presentation is on a very popular technology related topic, Cloud Computing. It is in our basic daily technology need like gmail i.e. also based on Cloud Computing. And also it has also very good source of job in it. Hope it would be helpful for your School or College project.
Introduction of Cloud Computing & Historical Background
Cloud Service Models & Cloud Deployment Models
Benefits of Cloud Computing
Risks and Challenges
Future Trends in Cloud Computing
Edge Computing, Serverless Computing, AI & Machine Learning in Cloud, Security and
Compliance
Needs and Obstacles for Cloud Deployment
Conclusion
Cloud Computing definition , its history , Service Models , Deployment Models , Architecture, pretty much all the important aspects related to cloud computing
Detailed explanation of SQL Injection
It will help to understand the SQL injection and how handle the SQL injection.
This is very useful to enhance the data security of web applications which are exposed to customers.
Domain driven design is help as part of software development for proper deliver of software applications.
It will help on strategic planning of software design and delivery.
New relic tool is user to analyse the logs, monitor the servers, generate the events and resolve the issues.
This is a available on free and paid version.
For more features you need take the licence.
It has dashboard through which you can monitor many metrics.
We can integrate with different software applications.
As part of this presentation we covered basics of Terraform which is Infrastructure as code. It will helps to Devops teams to start with Terraform.
This document will be helpful for the development who wants to understand infrastructure as code concepts and if they want to understand the usability of terrform
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
3. Overview of Cloud Computing
• Cloud computing provides the ability to scale to tens of thousands of systems, as
well as the ability to massively scale bandwidth and storage space.
• Cloud computing might be confused with distributed system, grid computing,
utility computing, service oriented architecture, web application, web 2.0,
broadband network, browser as a platform,Virtualization and free/open software.
• Cloud computing is a natural evolution of the widespread adoption of virtualization,
service-oriented architecture, autonomic and utility computing.
• Cloud services exhibit five essential characteristics that demonstrate their relation
to, and differences from, traditional computing approaches such as on-demand
self-service, broad network access, resource pooling, rapid elasticity and measured
service.
• Cloud computing often leverages massive scale, homogeneity, virtualization,
resilient computing (no stop computing), low cost/free software, geographic
distribution, service orientation software and advanced security technologies.
4. Overview of Cloud Computing
• Lower computer costs, improved performance, reduced software costs,
instant software updates, improved document format compatibility,
unlimited storage capacity, device independence, and increased data
reliability.
• Cloud computing is based on five attributes…
• Multi-tenancy (shared resources).
• Massive scalability.
• Elasticity.
• Pay as you go .
• Self-provisioning of resources.
• It makes new improvements in processors,Virtualization technology, disk
storage, broadband Internet connection, and combined fast, inexpensive
servers to make the cloud to be a more compelling solution.
5. Overview of Cloud Computing
• Multi-tenancy (shared resources): Cloud computing is based on a business model
in which resources are shared (i.e., multiple users use the same resource) at the
network level, host level and application level.
• Multi-tenancy (shared resources): Cloud computing is based on a business model
in which resources are shared (i.e., multiple users use the same resource) at the
network level, host level and application level.
• Massive scalability: Cloud computing provides the ability to scale to tens of
thousands of systems, as well as the ability to massively scale bandwidth and
storage space.
• Elasticity: Users can rapidly increase and decrease their computing resources as
needed; Pay as you used: Users to pay for only the resources they actually use and
for only the time they require them.
• Self-provisioning of resources: Users’ self-provision resources, such as additional
systems (processing capability, software, storage) and network resources.
7. Cloud Computing Providers
• Following are the list of cloud computing providers...
• AWS (amazon web services)—includeAmazon S3, Amazon EC2, Amazon Simple-
DB,Amazon SQS,Amazon FPS, and others.
• Salesforce.com—Delivers businesses over the internet using the software as a
service model.
• GoogleApps—Software-as-a-service for business email, information sharing and
security.
• And others providers such as
• Microsoft Azure Services Platform
• Proof-point
• Sun Open Cloud Platform
• Workday, etc..
8. Cloud Computing Deployment Models
• Private cloud :
• This model doesn’t bring much in terms of cost efficiency, it is comparable to
buying, building and managing your own infrastructure.
• It brings in tremendous value from a security point of view.
• Security concerns are addressed through secure-accessVPN or by the physical
location within the client’s firewall system.
• Community cloud:
• In the community deployment model, the cloud infrastructure is shared by
several organizations with the same policy and compliance considerations.
• This helps to further reduce costs as compared to a private cloud, as it is shared
by larger group.
9. Cloud Computing Deployment Models
• Public cloud:
• The public cloud deployment model represents true cloud hosting.
• In this deployment model, services and infrastructure are provided to various clients,
google is an example of a public cloud.
• This service can be provided by a vendor free of charge or on the basis of a pay-per-user
license policy.
• Hybrid cloud:
• This deployment model helps businesses to take advantage of secured applications and
data hosting on a private cloud, while still enjoying cost benefits by keeping shared data
and applications on the public cloud.
• This model is also used for handling cloud bursting, which refers to a scenario where the
existing private cloud infrastructure is not able to handle load spikes and requires a
fallback option to support the load.
10. Cloud Computing Models
• Cloud SaaS (software as a service):
• Application and information clouds.
• Use provider’s applications over a network, cloud provider examples Zoho, Salesforce.com,
and Google Apps.
• Cloud PaaS (platform as a service):
• Development clouds.
• Deploy customer-created applications to a cloud, cloud provider examplesWindows Azure,
Google App Engine and Aptana Cloud.
• Cloud IaaS (infrastructure as a service):
• Infrastructure clouds.
• Rent processing, storage.
• network capacity.
• Other fundamental computing resources like Dropbox, AmazonWeb Services, Mozy and
Akamai.
11. Cloud Computing Sub-services Models
• IaaS: DBaaS (database-as-a-service): DBaaS allows the access and
use of a database management system as a service.
• PaaS: STaaS (storage-as-a-service): STaaS involves the delivery of
data storage as a service, including database-like services, often
billed on a utility computing basis, e.g., per gigabyte per month.
• SaaS: CaaS (communications-as-a-service): CaaS is the delivery of an
enterprise communications solution, such asVoice over IP, instant
messaging, and video conferencing applications as a service.
• SaaS: SECaaS (security-as-a-service): SECaaS is the security of
business networks and mobile networks through the Internet for
events, database, application, transaction, and system incidents.
12. Cloud Computing Sub-services Models
• SaaS: MaaS (monitoring-as-a-service): MaaS refers to the delivery of
second-tier infrastructure components, such as log management and
asset tracking, as a service.
• PaaS: DTaaS (desktop-as-a-service): DTaaS is the decoupling of a
user’s physical machine from the desktop and software he or she uses
to work.
• IaaS: CCaaS (compute capacity-as-a-service): CCaaS is the provision
of “raw” computing resource, typically used in the execution of
mathematically complex models from either a single
“supercomputer” resource or a large number of distributed
computing resources where the task performs well .
13. Cloud Data Security
• Cloud computing, all your data is stored on the cloud, so cloud users ask
some questions like: How secure is the cloud? Can unauthorized users gain
access to your confidential data?.
• Cloud computing companies say that data is secure, but it is too early to be
completely sure of that. Only time will tell if your data is secure in the cloud.
• Cloud security concerns arising which both customer data and program are
residing in provider premises.
• While cost and ease of use are two great benefits of cloud computing, there
are significant security concerns that need to be addressed when
considering moving critical applications and sensitive data to public and
shared cloud environments.
14. Cloud Data Security
• To address these concerns, the cloud provider must develop sufficient
controls to provide the same or a greater.
• level of security than the organization would have if the cloud were not
used.
• There are three types of data in cloud computing
• Data in transit (transmission data)
• Data at rest (storage data)
• Data in processing (processing data).
• Clouds are massively complex systems can be reduced to simple primitives
that are replicated thousands of times and common functional units.
• These complexities create many issues related to security as well as all
aspects of Cloud computing.
15. Cloud Data Security
• Security of data and trust problem has always been a primary and challenging issue
in cloud computing.
• focuses on enhancing security by using…
• OTP authentication system.
• Check data integrity by using hashing algorithms.
• Encrypt data automatically with the highest strong/ fast encryption algorithm and finally
ensure the fast recovery of data.
• Most cloud computing providers..
• Authenticates (e.g.,Transfer usernames and password) via secure connections and secondly,
• Transfer (e.g., via HTTPS) data securely to/from their servers (so-called “data in transit encrypts
stored data (so-called “data at rest”) automatically.
• The authorization, the process of granting access to requested resources, is
pointless without suitable authentication.
16. Cloud Data Security
• In cloud computing, to ensure correctness of user data, in first, user must be
make authentication.
• Authentication is the process of validating or confirming that access
credentials provided by a user (for instance, a user ID and password) are
valid.
• When organizations begin to utilize applications in the cloud,
authenticating users in a trustworthy and manageable manner becomes an
additional challenge.
• Organizations must address authentication-related challenges such as
credential management, strong authentication, delegated authentication,
and trust across all types of cloud delivery models (SPI).
17. Cloud Data Security
• data security model must ensure…
• Data must be encrypted automatically
• Use a strong encryption algorithm.
• Use the strong encryption algorithm that must be fast to retrieve data faster.
• Use strong authentication.
• Ensure file integrity.
• Amazon web services encourage user’s to encrypt sensitive data by using
TrueCrypt software.
• TrueCrypt is an outstanding encryption solution for anyone familiar with
managing volumes and a slight knowledge of encryption technology.
18. Cloud Data Security
• Any organization planning to deployTrueCrypt as a cloud-data
protection solution must consider the cost and logistics of training
and supporting users, managing versions, and recovering damages.
• TrueCrypt is a computer software program whose primary purposes
are to…
• Secure data by encrypting it before it is written to a disk.
• Decrypt encrypted data after it is read from the disk.
• TrueCrypt uses only three methods (AES, Serpent andTwofish) to
encrypt data.
19. Cloud Data Security
• The proposed data security model uses three-level defense system
structure…
• Strong authentication is achieved by using OTP.
• Data are encrypted automatically by using strong/fast encryption algorithm.
• Fast recovery of user data.
21. Cloud Data Security
• OTP Authentication:
• The users connect to the cloud provider.Then the user gets the username (e-mail),
password and finally account password.
• Users login to the cloud provider website by getting username (e-mail), password and
account password. Cloud node controller verifies user info.
• If user info is true, controller-node send that login authentication success and require
OTP.
• Users generate OTP by using MD5 hash function and sequence number based on user
name, password and account password.
• Then users login to cloud website with OTP .
• The cloud controller node generates 1000 OTP based on user info by using the MD5
hash function.Then the cloud controller saves 1000 OTP in the temporary OTP
database.
22. Cloud Data Security
• OTP Authentication:
• The cloud controller verifies user OTP from the temporary OTP database.
• If OTP is true, send OTP login success.
23. Cloud Data Security
• Evaluation Algorithm Results:
• Select the strongest and the fastest encryption algorithm by proposing algorithm
called “Evaluation algorithm”.
• This algorithm used for selecting eight modern encryption techniques namely:
RC4, RC6, MARS,AES, DES, 3DES,Two-Fish and Blowfish.
• The evaluation has performed for those encryption algorithms according to
randomness testing by using NIST statistical testing.
• This evaluation algorithm performed at Amazon EC2 Micro Instance cloud
computing environment.
• RC4 has an advantage over other DES, RC6, MARS, 3DES andTwofish in terms of
time consumption.
• Twofish has low performance when compared with other algorithms.
25. Cloud Data Security
• Ensuring Integrity:
• This is an extra concern for customers that now they have to worry about how to
keep data hidden from auditors.
• This integrity check can be done by using cryptographic hash functions.
• For integrity check, we have to think about a simple solution that is feasible and
easy to implement for a common user.
• The trust problem between Cloud storage and customer can be solved, if users
can check the integrity of data themselves instead of renting an auditing service
to do the same.
• This can be achieved by hashing the data on user’s side and storing the hash
values in the cloud with the original data.
26. Cloud Data Security
• Ensuring Integrity:
• Hashing technique steps…
• The program takes file path which has to be accessed through cloud.
• The program computes a four-hash values in this file based on the four hash functions
(MD4, MD5, SHA-1 and SHA-2).
• When users store data in cloud storage devices, server stores four hash values.
• When a user retrieve data file from cloud, server generate four hash values.
• Server check integrity by comparing new four hash values with stored four hash values.
27. Cloud Data Security
Features Description
Authentication OTP Authentication System (mathematical generation).
Provider encryption Software implemented to select the highest security and faster
encryption algorithm based on NIST statistical tests.
Private user encryption TrueCrypt system or proposed software CloudCrypt v.10.
Data integrity Hashing-MD5-MD4-SHA-1-SHA-2.
Data fast recovery Based on decryption algorithm speed.
Key management User keys not stored in provider control domain.
High Level Summary of Cloud Data Security Features