SlideShare a Scribd company logo
SCUDE
Name: AmaliGlorya
E-mail: zianacorps18@gmail.com
University: Pondicherry
Year/Semester: III year/ VI
Branch: Information Technology
Introduction
o Social media has provided businesses with new ways to
reach and interact with customers, while mobile
technologies have changed the way people
communicate, shop and work. Analytics allow
businesses to understand how, when and where people
consume certain goods and services and cloud
computing provides a new way to access technology
and the data a business needs to quickly respond to
changing markets and solve business problems .One of
the most emerging technology is cloud computing.
Many Multinational Companies started to move on to
the cloud. Unfortunately the big threat that scares all is
DATA INSECURITY in cloud. Data breach and data loss is
the popular problems faced by cloud technology.
 To resolve this problem our project is trying to give a solution
by using a technology called DYNAMIC ENCRYPTION. With
this we can prevent the hackers in decrypting the data
present in the cloud. In this document we tried to
overcome the security issue faced by cloud during file
transfer. Despite of vast researches made to overcome
these issues, there is no perfect solution till determined. We
took this as a problem and proposed a simple solution to
overcome the issues through DYNAMIC ENCRYPTION
algorithms. Here we use two algorithms namely:
1. AES(Advanced Encryption
Standard)
2. RSA(Rivest Shamir Adleman)
Problem definition
 The topic SCUDE briefly explains Storing and transferring
data in Cloud securely Using Dynamic Encryption. The
encrypted data in cloud server is again dynamically
encrypted with respect to time.
 Symmetric key algorithms are used to encrypt the data
which rest on cloud, while transferring the data
asymmetric key algorithms are used.
Trends
 Cloud computing has experienced exponential growth
over the last few years . The latest trends are listed
below .
 Hybrid clouds
 BYOD
 Platform-as-a-Service (PaaS)
 Big data analytics
 Graphics as a service
 Identity management and protection
 Web-powered apps
 The two trends that has an impact in next five years are
identity management and protection and web-
powered apps . Security has always been a major
concern with cloud computing. As more businesses
move more information and data into cloud servers, this
concern is more important than ever. It is anticipated
that over the next year, there will be identity
management solutions based on new cloud based
security paradigms. As efficiency and scalability are
among the primary benefits of cloud computing, then it
only makes sense to start developing cloud-based
applications that are compatible with multiple
platforms.
Solution
 With help of RSA algorithm the data is encrypted first in
client side and sent to the cloud server.
 Here the private key is held by user and public key is
held by cloud vendor.
 The encrypted data present in the cloud server is again
dynamically encrypted with respect to time.
 The user again decrypts the primary encrypted data
and gets the actual data.
Interest Areas
 My interest area in cloud computing technology is
cloud security .
 Cloud security is an evolving sub-domain of computer
security, network security, and, more broadly,
information security.
 It refers to a broad set of policies, technologies, and
controls deployed to protect data, applications, and
the associated infrastructure of cloud computing.
 Cloud computing security is the set of control-based
technologies and policies designed to adhere to
regulatory compliance rules and protect information,
data applications and infrastructure associated with
cloud computing use .
Impacts
 The main advantage is preventing hacking and
cracking of data from unauthorized source.
 Reliability and scalability can be improved.
 This algorithm provides high security with firewalls.
 Data breach and data loss is the major drawback in
the existing system which has been overcome in
SCUDE.
Thank you

More Related Content

What's hot

2014-11-19 fog computing expo
2014-11-19 fog computing expo2014-11-19 fog computing expo
2014-11-19 fog computing expo
szhosain
 
Fog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptFog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud ppt
priyanka reddy
 
Fog computing : The new age Technology
Fog computing : The new age TechnologyFog computing : The new age Technology
Fog computing : The new age Technology
Prankit Mishra
 
Analysis of classical encryption techniques in cloud computing
Analysis of classical encryption techniques in cloud computingAnalysis of classical encryption techniques in cloud computing
Analysis of classical encryption techniques in cloud computing
redpel dot com
 
FOG COMPUTING
FOG COMPUTINGFOG COMPUTING
FOG COMPUTING
Saisharan Amaravadhi
 
Seminar ppt fog comp
Seminar ppt fog compSeminar ppt fog comp
Seminar ppt fog comp
Mahantesh Hiremath
 
Security and Privacy in Cloud Computing - a High-level view
Security and Privacy in Cloud Computing - a High-level viewSecurity and Privacy in Cloud Computing - a High-level view
Security and Privacy in Cloud Computing - a High-level view
ragibhasan
 
Fog computing document
Fog computing documentFog computing document
Fog computing document
sravya raju
 
Review of implementing fog computing
Review of implementing fog computingReview of implementing fog computing
Review of implementing fog computing
eSAT Journals
 
Fog computing ( foggy cloud)
Fog computing  ( foggy cloud)Fog computing  ( foggy cloud)
Fog computing ( foggy cloud)
Iffat Anjum
 
Privacy and security in the cloud Challenges and solutions for our future inf...
Privacy and security in the cloud Challenges and solutions for our future inf...Privacy and security in the cloud Challenges and solutions for our future inf...
Privacy and security in the cloud Challenges and solutions for our future inf...
PRISMACLOUD Project
 
Fog computing
Fog computingFog computing
Fog computing
Ayush Chaurasia
 
Research proposal on Computing Security and Reliability - Phdassistance.com
Research proposal on Computing Security and Reliability - Phdassistance.comResearch proposal on Computing Security and Reliability - Phdassistance.com
Research proposal on Computing Security and Reliability - Phdassistance.com
PhD Assistance
 
Fog Computing and Cloud Computing
Fog Computing and Cloud ComputingFog Computing and Cloud Computing
Fog Computing and Cloud Computing
Ahmed Banafa
 
FOG COMPUTING- Presentation
FOG COMPUTING- Presentation FOG COMPUTING- Presentation
FOG COMPUTING- Presentation
Anjana Shivangi
 
Michael Enescu - Cloud + IoT at IEEE
Michael Enescu - Cloud + IoT at IEEEMichael Enescu - Cloud + IoT at IEEE
Michael Enescu - Cloud + IoT at IEEE
Michael Enescu
 
Cloud.ppt
Cloud.pptCloud.ppt
Cloud.ppt
Raj Chakrabarty
 
Data security in cloud compu
Data security in cloud compuData security in cloud compu
Data security in cloud compu
ANIL247048
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
Gahya Pandian
 

What's hot (19)

2014-11-19 fog computing expo
2014-11-19 fog computing expo2014-11-19 fog computing expo
2014-11-19 fog computing expo
 
Fog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptFog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud ppt
 
Fog computing : The new age Technology
Fog computing : The new age TechnologyFog computing : The new age Technology
Fog computing : The new age Technology
 
Analysis of classical encryption techniques in cloud computing
Analysis of classical encryption techniques in cloud computingAnalysis of classical encryption techniques in cloud computing
Analysis of classical encryption techniques in cloud computing
 
FOG COMPUTING
FOG COMPUTINGFOG COMPUTING
FOG COMPUTING
 
Seminar ppt fog comp
Seminar ppt fog compSeminar ppt fog comp
Seminar ppt fog comp
 
Security and Privacy in Cloud Computing - a High-level view
Security and Privacy in Cloud Computing - a High-level viewSecurity and Privacy in Cloud Computing - a High-level view
Security and Privacy in Cloud Computing - a High-level view
 
Fog computing document
Fog computing documentFog computing document
Fog computing document
 
Review of implementing fog computing
Review of implementing fog computingReview of implementing fog computing
Review of implementing fog computing
 
Fog computing ( foggy cloud)
Fog computing  ( foggy cloud)Fog computing  ( foggy cloud)
Fog computing ( foggy cloud)
 
Privacy and security in the cloud Challenges and solutions for our future inf...
Privacy and security in the cloud Challenges and solutions for our future inf...Privacy and security in the cloud Challenges and solutions for our future inf...
Privacy and security in the cloud Challenges and solutions for our future inf...
 
Fog computing
Fog computingFog computing
Fog computing
 
Research proposal on Computing Security and Reliability - Phdassistance.com
Research proposal on Computing Security and Reliability - Phdassistance.comResearch proposal on Computing Security and Reliability - Phdassistance.com
Research proposal on Computing Security and Reliability - Phdassistance.com
 
Fog Computing and Cloud Computing
Fog Computing and Cloud ComputingFog Computing and Cloud Computing
Fog Computing and Cloud Computing
 
FOG COMPUTING- Presentation
FOG COMPUTING- Presentation FOG COMPUTING- Presentation
FOG COMPUTING- Presentation
 
Michael Enescu - Cloud + IoT at IEEE
Michael Enescu - Cloud + IoT at IEEEMichael Enescu - Cloud + IoT at IEEE
Michael Enescu - Cloud + IoT at IEEE
 
Cloud.ppt
Cloud.pptCloud.ppt
Cloud.ppt
 
Data security in cloud compu
Data security in cloud compuData security in cloud compu
Data security in cloud compu
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 

Viewers also liked

Howard C. Williams good resume
Howard C. Williams good resumeHoward C. Williams good resume
Howard C. Williams good resume
Howard Williams
 
Manos a la obra: Cómo dar grandes pasos en el marketing digital
Manos a la obra: Cómo dar grandes pasos en el marketing digitalManos a la obra: Cómo dar grandes pasos en el marketing digital
Manos a la obra: Cómo dar grandes pasos en el marketing digital
Igni
 
Teaching Software Engineering with Open Source Projects
Teaching Software Engineering with Open Source ProjectsTeaching Software Engineering with Open Source Projects
Teaching Software Engineering with Open Source Projects
Aristotle University of Thessaloniki
 
Mobile messaging solutions for online gaming companies
Mobile messaging solutions for online gaming companiesMobile messaging solutions for online gaming companies
Mobile messaging solutions for online gaming companies
MDK Labs GmbH
 
Educación Vial
Educación VialEducación Vial
Educación Vial
Bitaka
 
Twig Embody - the wearable 3G/GSM/GNSS personal alarm device
Twig Embody - the wearable 3G/GSM/GNSS personal alarm deviceTwig Embody - the wearable 3G/GSM/GNSS personal alarm device
Twig Embody - the wearable 3G/GSM/GNSS personal alarm device
Jane Lindell
 
Sesiones clinicas basadas en la evidencia 2014 - Sessió de Residents 2013-201...
Sesiones clinicas basadas en la evidencia 2014 - Sessió de Residents 2013-201...Sesiones clinicas basadas en la evidencia 2014 - Sessió de Residents 2013-201...
Sesiones clinicas basadas en la evidencia 2014 - Sessió de Residents 2013-201...
Grup Pere Mata
 
6.24.15
6.24.156.24.15
BottleGame Presentation
BottleGame PresentationBottleGame Presentation
BottleGame Presentation
Volodymyr Bilokur
 
Los retablos en sevilla 1
Los retablos en sevilla 1Los retablos en sevilla 1
Los retablos en sevilla 1
Sanmoreno
 
UM ICT Road Map
UM ICT Road MapUM ICT Road Map
UM ICT Road Map
David Asirvatham
 
Sanjay_Saini-Resume
Sanjay_Saini-ResumeSanjay_Saini-Resume
Sanjay_Saini-Resume
Sanjay Saini
 
Richa Industries Ltd
Richa Industries LtdRicha Industries Ltd
Richa Industries Ltd
Richa Industries Ltd
 
QualysGuard InfoDay 2012 - QualysGuard Suite 7.0
QualysGuard InfoDay 2012 - QualysGuard Suite 7.0QualysGuard InfoDay 2012 - QualysGuard Suite 7.0
QualysGuard InfoDay 2012 - QualysGuard Suite 7.0
Risk Analysis Consultants, s.r.o.
 
Biblioteca Escolar Valenzuela
Biblioteca Escolar ValenzuelaBiblioteca Escolar Valenzuela
Biblioteca Escolar Valenzuela
amalba
 
Efectos de las aflatoxinas
Efectos de las aflatoxinasEfectos de las aflatoxinas
Efectos de las aflatoxinas
ESPOL
 
Design and Simulation Triple-DES
Design and Simulation Triple-DESDesign and Simulation Triple-DES
Design and Simulation Triple-DES
chatsiri
 
Primer método de coaching para traders a través de Jose Luis Cases Lozano
Primer método de coaching para traders a través de Jose Luis Cases LozanoPrimer método de coaching para traders a través de Jose Luis Cases Lozano
Primer método de coaching para traders a través de Jose Luis Cases Lozano
Pullback.es
 
Anatomía cardiovascular por imagen
Anatomía cardiovascular por  imagenAnatomía cardiovascular por  imagen
Anatomía cardiovascular por imagen
ITESM - EMIS
 
GESTIÓN INTEGRADA DE LOS RECURSOS HÍDRICOS - LA GESTIÓN DE LOS ACUÍFEROS
GESTIÓN INTEGRADA DE LOS RECURSOS HÍDRICOS - LA GESTIÓN DE LOS ACUÍFEROSGESTIÓN INTEGRADA DE LOS RECURSOS HÍDRICOS - LA GESTIÓN DE LOS ACUÍFEROS
GESTIÓN INTEGRADA DE LOS RECURSOS HÍDRICOS - LA GESTIÓN DE LOS ACUÍFEROS
Sector Energía y Minas - INGEMMET
 

Viewers also liked (20)

Howard C. Williams good resume
Howard C. Williams good resumeHoward C. Williams good resume
Howard C. Williams good resume
 
Manos a la obra: Cómo dar grandes pasos en el marketing digital
Manos a la obra: Cómo dar grandes pasos en el marketing digitalManos a la obra: Cómo dar grandes pasos en el marketing digital
Manos a la obra: Cómo dar grandes pasos en el marketing digital
 
Teaching Software Engineering with Open Source Projects
Teaching Software Engineering with Open Source ProjectsTeaching Software Engineering with Open Source Projects
Teaching Software Engineering with Open Source Projects
 
Mobile messaging solutions for online gaming companies
Mobile messaging solutions for online gaming companiesMobile messaging solutions for online gaming companies
Mobile messaging solutions for online gaming companies
 
Educación Vial
Educación VialEducación Vial
Educación Vial
 
Twig Embody - the wearable 3G/GSM/GNSS personal alarm device
Twig Embody - the wearable 3G/GSM/GNSS personal alarm deviceTwig Embody - the wearable 3G/GSM/GNSS personal alarm device
Twig Embody - the wearable 3G/GSM/GNSS personal alarm device
 
Sesiones clinicas basadas en la evidencia 2014 - Sessió de Residents 2013-201...
Sesiones clinicas basadas en la evidencia 2014 - Sessió de Residents 2013-201...Sesiones clinicas basadas en la evidencia 2014 - Sessió de Residents 2013-201...
Sesiones clinicas basadas en la evidencia 2014 - Sessió de Residents 2013-201...
 
6.24.15
6.24.156.24.15
6.24.15
 
BottleGame Presentation
BottleGame PresentationBottleGame Presentation
BottleGame Presentation
 
Los retablos en sevilla 1
Los retablos en sevilla 1Los retablos en sevilla 1
Los retablos en sevilla 1
 
UM ICT Road Map
UM ICT Road MapUM ICT Road Map
UM ICT Road Map
 
Sanjay_Saini-Resume
Sanjay_Saini-ResumeSanjay_Saini-Resume
Sanjay_Saini-Resume
 
Richa Industries Ltd
Richa Industries LtdRicha Industries Ltd
Richa Industries Ltd
 
QualysGuard InfoDay 2012 - QualysGuard Suite 7.0
QualysGuard InfoDay 2012 - QualysGuard Suite 7.0QualysGuard InfoDay 2012 - QualysGuard Suite 7.0
QualysGuard InfoDay 2012 - QualysGuard Suite 7.0
 
Biblioteca Escolar Valenzuela
Biblioteca Escolar ValenzuelaBiblioteca Escolar Valenzuela
Biblioteca Escolar Valenzuela
 
Efectos de las aflatoxinas
Efectos de las aflatoxinasEfectos de las aflatoxinas
Efectos de las aflatoxinas
 
Design and Simulation Triple-DES
Design and Simulation Triple-DESDesign and Simulation Triple-DES
Design and Simulation Triple-DES
 
Primer método de coaching para traders a través de Jose Luis Cases Lozano
Primer método de coaching para traders a través de Jose Luis Cases LozanoPrimer método de coaching para traders a través de Jose Luis Cases Lozano
Primer método de coaching para traders a través de Jose Luis Cases Lozano
 
Anatomía cardiovascular por imagen
Anatomía cardiovascular por  imagenAnatomía cardiovascular por  imagen
Anatomía cardiovascular por imagen
 
GESTIÓN INTEGRADA DE LOS RECURSOS HÍDRICOS - LA GESTIÓN DE LOS ACUÍFEROS
GESTIÓN INTEGRADA DE LOS RECURSOS HÍDRICOS - LA GESTIÓN DE LOS ACUÍFEROSGESTIÓN INTEGRADA DE LOS RECURSOS HÍDRICOS - LA GESTIÓN DE LOS ACUÍFEROS
GESTIÓN INTEGRADA DE LOS RECURSOS HÍDRICOS - LA GESTIÓN DE LOS ACUÍFEROS
 

Similar to Encryption Algorithms for Cloud

SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTINGSECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
IRJET Journal
 
Ad4502189193
Ad4502189193Ad4502189193
Ad4502189193
IJERA Editor
 
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
cscpconf
 
Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...
csandit
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar report
shafzonly
 
Kp3419221926
Kp3419221926Kp3419221926
Kp3419221926
IJERA Editor
 
Why Cloud Security Matters in Today's Business World
Why Cloud Security Matters in Today's Business WorldWhy Cloud Security Matters in Today's Business World
Why Cloud Security Matters in Today's Business World
Ciente
 
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
AJASTJournal
 
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Associate Professor in VSB Coimbatore
 
B1802041217
B1802041217B1802041217
B1802041217
IOSR Journals
 
Security and privacy approach of cloud computing
Security and privacy approach of cloud computingSecurity and privacy approach of cloud computing
Security and privacy approach of cloud computing
Jahangeer Qadiree
 
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdfCloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
DataSpace Academy
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
IOSR Journals
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
IOSR Journals
 
H017155360
H017155360H017155360
H017155360
IOSR Journals
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
IOSR Journals
 
Major Cloud Security Challenges concerning the Enterprises | Sysfore
Major Cloud Security Challenges concerning the Enterprises | SysforeMajor Cloud Security Challenges concerning the Enterprises | Sysfore
Major Cloud Security Challenges concerning the Enterprises | Sysfore
Sysfore Technologies
 
Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409
Editor IJARCET
 
C017421624
C017421624C017421624
C017421624
IOSR Journals
 
How Deep Observability Powers Strong Cybersecurity and Network Insights Acros...
How Deep Observability Powers Strong Cybersecurity and Network Insights Acros...How Deep Observability Powers Strong Cybersecurity and Network Insights Acros...
How Deep Observability Powers Strong Cybersecurity and Network Insights Acros...
Dana Gardner
 

Similar to Encryption Algorithms for Cloud (20)

SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTINGSECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
 
Ad4502189193
Ad4502189193Ad4502189193
Ad4502189193
 
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
 
Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar report
 
Kp3419221926
Kp3419221926Kp3419221926
Kp3419221926
 
Why Cloud Security Matters in Today's Business World
Why Cloud Security Matters in Today's Business WorldWhy Cloud Security Matters in Today's Business World
Why Cloud Security Matters in Today's Business World
 
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
 
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
 
B1802041217
B1802041217B1802041217
B1802041217
 
Security and privacy approach of cloud computing
Security and privacy approach of cloud computingSecurity and privacy approach of cloud computing
Security and privacy approach of cloud computing
 
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdfCloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
H017155360
H017155360H017155360
H017155360
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
Major Cloud Security Challenges concerning the Enterprises | Sysfore
Major Cloud Security Challenges concerning the Enterprises | SysforeMajor Cloud Security Challenges concerning the Enterprises | Sysfore
Major Cloud Security Challenges concerning the Enterprises | Sysfore
 
Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409
 
C017421624
C017421624C017421624
C017421624
 
How Deep Observability Powers Strong Cybersecurity and Network Insights Acros...
How Deep Observability Powers Strong Cybersecurity and Network Insights Acros...How Deep Observability Powers Strong Cybersecurity and Network Insights Acros...
How Deep Observability Powers Strong Cybersecurity and Network Insights Acros...
 

More from Mphasis

SMAC
SMACSMAC
SMAC
Mphasis
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
Mphasis
 
Automation
AutomationAutomation
Automation
Mphasis
 
IoT
IoTIoT
IoT
Mphasis
 
Home Automation System
Home Automation SystemHome Automation System
Home Automation System
Mphasis
 
IoT
IoTIoT
IoT
Mphasis
 
SMAC
SMACSMAC
SMAC
Mphasis
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
Mphasis
 
Mphasis kushagra
Mphasis kushagraMphasis kushagra
Mphasis kushagra
Mphasis
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
Mphasis
 
SMAC
SMACSMAC
SMAC
Mphasis
 
Io t 22
Io t 22Io t 22
Io t 22
Mphasis
 
IoT
IoTIoT
IoT
Mphasis
 
IoT
IoTIoT
IoT
Mphasis
 
IoT
IoTIoT
IoT
Mphasis
 
IoT
IoTIoT
IoT
Mphasis
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
Mphasis
 
SMAC
SMACSMAC
SMAC
Mphasis
 
IoT
IoTIoT
IoT
Mphasis
 
Automation
AutomationAutomation
Automation
Mphasis
 

More from Mphasis (20)

SMAC
SMACSMAC
SMAC
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Automation
AutomationAutomation
Automation
 
IoT
IoTIoT
IoT
 
Home Automation System
Home Automation SystemHome Automation System
Home Automation System
 
IoT
IoTIoT
IoT
 
SMAC
SMACSMAC
SMAC
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Mphasis kushagra
Mphasis kushagraMphasis kushagra
Mphasis kushagra
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
SMAC
SMACSMAC
SMAC
 
Io t 22
Io t 22Io t 22
Io t 22
 
IoT
IoTIoT
IoT
 
IoT
IoTIoT
IoT
 
IoT
IoTIoT
IoT
 
IoT
IoTIoT
IoT
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
SMAC
SMACSMAC
SMAC
 
IoT
IoTIoT
IoT
 
Automation
AutomationAutomation
Automation
 

Recently uploaded

Microservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we workMicroservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we work
Sven Peters
 
UI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design SystemUI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design System
Peter Muessig
 
Requirement Traceability in Xen Functional Safety
Requirement Traceability in Xen Functional SafetyRequirement Traceability in Xen Functional Safety
Requirement Traceability in Xen Functional Safety
Ayan Halder
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
Łukasz Chruściel
 
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian CompaniesE-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
Quickdice ERP
 
Lecture 2 - software testing SE 412.pptx
Lecture 2 - software testing SE 412.pptxLecture 2 - software testing SE 412.pptx
Lecture 2 - software testing SE 412.pptx
TaghreedAltamimi
 
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CDKuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
rodomar2
 
Using Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query PerformanceUsing Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query Performance
Grant Fritchey
 
SMS API Integration in Saudi Arabia| Best SMS API Service
SMS API Integration in Saudi Arabia| Best SMS API ServiceSMS API Integration in Saudi Arabia| Best SMS API Service
SMS API Integration in Saudi Arabia| Best SMS API Service
Yara Milbes
 
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Crescat
 
socradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdfsocradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdf
SOCRadar
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
Aftab Hussain
 
Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
Drona Infotech
 
Empowering Growth with Best Software Development Company in Noida - Deuglo
Empowering Growth with Best Software  Development Company in Noida - DeugloEmpowering Growth with Best Software  Development Company in Noida - Deuglo
Empowering Growth with Best Software Development Company in Noida - Deuglo
Deuglo Infosystem Pvt Ltd
 
Webinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for EmbeddedWebinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for Embedded
ICS
 
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s EcosystemUI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
Peter Muessig
 
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j
 
Transform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR SolutionsTransform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR Solutions
TheSMSPoint
 
Graspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code AnalysisGraspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code Analysis
Aftab Hussain
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
Shane Coughlan
 

Recently uploaded (20)

Microservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we workMicroservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we work
 
UI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design SystemUI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design System
 
Requirement Traceability in Xen Functional Safety
Requirement Traceability in Xen Functional SafetyRequirement Traceability in Xen Functional Safety
Requirement Traceability in Xen Functional Safety
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
 
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian CompaniesE-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
 
Lecture 2 - software testing SE 412.pptx
Lecture 2 - software testing SE 412.pptxLecture 2 - software testing SE 412.pptx
Lecture 2 - software testing SE 412.pptx
 
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CDKuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
 
Using Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query PerformanceUsing Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query Performance
 
SMS API Integration in Saudi Arabia| Best SMS API Service
SMS API Integration in Saudi Arabia| Best SMS API ServiceSMS API Integration in Saudi Arabia| Best SMS API Service
SMS API Integration in Saudi Arabia| Best SMS API Service
 
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
 
socradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdfsocradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdf
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
 
Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
 
Empowering Growth with Best Software Development Company in Noida - Deuglo
Empowering Growth with Best Software  Development Company in Noida - DeugloEmpowering Growth with Best Software  Development Company in Noida - Deuglo
Empowering Growth with Best Software Development Company in Noida - Deuglo
 
Webinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for EmbeddedWebinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for Embedded
 
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s EcosystemUI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
 
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
 
Transform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR SolutionsTransform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR Solutions
 
Graspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code AnalysisGraspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code Analysis
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
 

Encryption Algorithms for Cloud

  • 1. SCUDE Name: AmaliGlorya E-mail: zianacorps18@gmail.com University: Pondicherry Year/Semester: III year/ VI Branch: Information Technology
  • 2. Introduction o Social media has provided businesses with new ways to reach and interact with customers, while mobile technologies have changed the way people communicate, shop and work. Analytics allow businesses to understand how, when and where people consume certain goods and services and cloud computing provides a new way to access technology and the data a business needs to quickly respond to changing markets and solve business problems .One of the most emerging technology is cloud computing. Many Multinational Companies started to move on to the cloud. Unfortunately the big threat that scares all is DATA INSECURITY in cloud. Data breach and data loss is the popular problems faced by cloud technology.
  • 3.  To resolve this problem our project is trying to give a solution by using a technology called DYNAMIC ENCRYPTION. With this we can prevent the hackers in decrypting the data present in the cloud. In this document we tried to overcome the security issue faced by cloud during file transfer. Despite of vast researches made to overcome these issues, there is no perfect solution till determined. We took this as a problem and proposed a simple solution to overcome the issues through DYNAMIC ENCRYPTION algorithms. Here we use two algorithms namely: 1. AES(Advanced Encryption Standard) 2. RSA(Rivest Shamir Adleman)
  • 4. Problem definition  The topic SCUDE briefly explains Storing and transferring data in Cloud securely Using Dynamic Encryption. The encrypted data in cloud server is again dynamically encrypted with respect to time.  Symmetric key algorithms are used to encrypt the data which rest on cloud, while transferring the data asymmetric key algorithms are used.
  • 5. Trends  Cloud computing has experienced exponential growth over the last few years . The latest trends are listed below .  Hybrid clouds  BYOD  Platform-as-a-Service (PaaS)  Big data analytics  Graphics as a service  Identity management and protection  Web-powered apps
  • 6.  The two trends that has an impact in next five years are identity management and protection and web- powered apps . Security has always been a major concern with cloud computing. As more businesses move more information and data into cloud servers, this concern is more important than ever. It is anticipated that over the next year, there will be identity management solutions based on new cloud based security paradigms. As efficiency and scalability are among the primary benefits of cloud computing, then it only makes sense to start developing cloud-based applications that are compatible with multiple platforms.
  • 7. Solution  With help of RSA algorithm the data is encrypted first in client side and sent to the cloud server.  Here the private key is held by user and public key is held by cloud vendor.  The encrypted data present in the cloud server is again dynamically encrypted with respect to time.  The user again decrypts the primary encrypted data and gets the actual data.
  • 8. Interest Areas  My interest area in cloud computing technology is cloud security .  Cloud security is an evolving sub-domain of computer security, network security, and, more broadly, information security.  It refers to a broad set of policies, technologies, and controls deployed to protect data, applications, and the associated infrastructure of cloud computing.  Cloud computing security is the set of control-based technologies and policies designed to adhere to regulatory compliance rules and protect information, data applications and infrastructure associated with cloud computing use .
  • 9. Impacts  The main advantage is preventing hacking and cracking of data from unauthorized source.  Reliability and scalability can be improved.  This algorithm provides high security with firewalls.  Data breach and data loss is the major drawback in the existing system which has been overcome in SCUDE.