SCUDE
Name: AmaliGlorya
E-mail: zianacorps18@gmail.com
University: Pondicherry
Year/Semester: III year/ VI
Branch: Information Technology
Introduction
o Social media has provided businesses with new ways to
reach and interact with customers, while mobile
technologies have changed the way people
communicate, shop and work. Analytics allow
businesses to understand how, when and where people
consume certain goods and services and cloud
computing provides a new way to access technology
and the data a business needs to quickly respond to
changing markets and solve business problems .One of
the most emerging technology is cloud computing.
Many Multinational Companies started to move on to
the cloud. Unfortunately the big threat that scares all is
DATA INSECURITY in cloud. Data breach and data loss is
the popular problems faced by cloud technology.
 To resolve this problem our project is trying to give a solution
by using a technology called DYNAMIC ENCRYPTION. With
this we can prevent the hackers in decrypting the data
present in the cloud. In this document we tried to
overcome the security issue faced by cloud during file
transfer. Despite of vast researches made to overcome
these issues, there is no perfect solution till determined. We
took this as a problem and proposed a simple solution to
overcome the issues through DYNAMIC ENCRYPTION
algorithms. Here we use two algorithms namely:
1. AES(Advanced Encryption
Standard)
2. RSA(Rivest Shamir Adleman)
Problem definition
 The topic SCUDE briefly explains Storing and transferring
data in Cloud securely Using Dynamic Encryption. The
encrypted data in cloud server is again dynamically
encrypted with respect to time.
 Symmetric key algorithms are used to encrypt the data
which rest on cloud, while transferring the data
asymmetric key algorithms are used.
Trends
 Cloud computing has experienced exponential growth
over the last few years . The latest trends are listed
below .
 Hybrid clouds
 BYOD
 Platform-as-a-Service (PaaS)
 Big data analytics
 Graphics as a service
 Identity management and protection
 Web-powered apps
 The two trends that has an impact in next five years are
identity management and protection and web-
powered apps . Security has always been a major
concern with cloud computing. As more businesses
move more information and data into cloud servers, this
concern is more important than ever. It is anticipated
that over the next year, there will be identity
management solutions based on new cloud based
security paradigms. As efficiency and scalability are
among the primary benefits of cloud computing, then it
only makes sense to start developing cloud-based
applications that are compatible with multiple
platforms.
Solution
 With help of RSA algorithm the data is encrypted first in
client side and sent to the cloud server.
 Here the private key is held by user and public key is
held by cloud vendor.
 The encrypted data present in the cloud server is again
dynamically encrypted with respect to time.
 The user again decrypts the primary encrypted data
and gets the actual data.
Interest Areas
 My interest area in cloud computing technology is
cloud security .
 Cloud security is an evolving sub-domain of computer
security, network security, and, more broadly,
information security.
 It refers to a broad set of policies, technologies, and
controls deployed to protect data, applications, and
the associated infrastructure of cloud computing.
 Cloud computing security is the set of control-based
technologies and policies designed to adhere to
regulatory compliance rules and protect information,
data applications and infrastructure associated with
cloud computing use .
Impacts
 The main advantage is preventing hacking and
cracking of data from unauthorized source.
 Reliability and scalability can be improved.
 This algorithm provides high security with firewalls.
 Data breach and data loss is the major drawback in
the existing system which has been overcome in
SCUDE.
Thank you

Encryption Algorithms for Cloud

  • 1.
    SCUDE Name: AmaliGlorya E-mail: zianacorps18@gmail.com University:Pondicherry Year/Semester: III year/ VI Branch: Information Technology
  • 2.
    Introduction o Social mediahas provided businesses with new ways to reach and interact with customers, while mobile technologies have changed the way people communicate, shop and work. Analytics allow businesses to understand how, when and where people consume certain goods and services and cloud computing provides a new way to access technology and the data a business needs to quickly respond to changing markets and solve business problems .One of the most emerging technology is cloud computing. Many Multinational Companies started to move on to the cloud. Unfortunately the big threat that scares all is DATA INSECURITY in cloud. Data breach and data loss is the popular problems faced by cloud technology.
  • 3.
     To resolvethis problem our project is trying to give a solution by using a technology called DYNAMIC ENCRYPTION. With this we can prevent the hackers in decrypting the data present in the cloud. In this document we tried to overcome the security issue faced by cloud during file transfer. Despite of vast researches made to overcome these issues, there is no perfect solution till determined. We took this as a problem and proposed a simple solution to overcome the issues through DYNAMIC ENCRYPTION algorithms. Here we use two algorithms namely: 1. AES(Advanced Encryption Standard) 2. RSA(Rivest Shamir Adleman)
  • 4.
    Problem definition  Thetopic SCUDE briefly explains Storing and transferring data in Cloud securely Using Dynamic Encryption. The encrypted data in cloud server is again dynamically encrypted with respect to time.  Symmetric key algorithms are used to encrypt the data which rest on cloud, while transferring the data asymmetric key algorithms are used.
  • 5.
    Trends  Cloud computinghas experienced exponential growth over the last few years . The latest trends are listed below .  Hybrid clouds  BYOD  Platform-as-a-Service (PaaS)  Big data analytics  Graphics as a service  Identity management and protection  Web-powered apps
  • 6.
     The twotrends that has an impact in next five years are identity management and protection and web- powered apps . Security has always been a major concern with cloud computing. As more businesses move more information and data into cloud servers, this concern is more important than ever. It is anticipated that over the next year, there will be identity management solutions based on new cloud based security paradigms. As efficiency and scalability are among the primary benefits of cloud computing, then it only makes sense to start developing cloud-based applications that are compatible with multiple platforms.
  • 7.
    Solution  With helpof RSA algorithm the data is encrypted first in client side and sent to the cloud server.  Here the private key is held by user and public key is held by cloud vendor.  The encrypted data present in the cloud server is again dynamically encrypted with respect to time.  The user again decrypts the primary encrypted data and gets the actual data.
  • 8.
    Interest Areas  Myinterest area in cloud computing technology is cloud security .  Cloud security is an evolving sub-domain of computer security, network security, and, more broadly, information security.  It refers to a broad set of policies, technologies, and controls deployed to protect data, applications, and the associated infrastructure of cloud computing.  Cloud computing security is the set of control-based technologies and policies designed to adhere to regulatory compliance rules and protect information, data applications and infrastructure associated with cloud computing use .
  • 9.
    Impacts  The mainadvantage is preventing hacking and cracking of data from unauthorized source.  Reliability and scalability can be improved.  This algorithm provides high security with firewalls.  Data breach and data loss is the major drawback in the existing system which has been overcome in SCUDE.
  • 10.