SlideShare a Scribd company logo
Seminar Presentation
on
Security Issues in Cloud Computing
Presented by :
Jyotika Pandey
4th year , JIET-SETG
Rollno.- 10EJTIT013
What is Cloud Computing ?
• Cloud computing means ability to run a program or
application on many connected computer at the same time.
• NETWORK BASED SERVICES provided by VIRTUAL
SERVERS, server which do not actually exits and which are
actually stimulated by software running on real machines.
• NOTE: as virtual server do not actually exist physically, they
can be scaled up, moved from place to place just like
CLOUD.
• “Cloud” is basically a metaphor for “internet”.
How does this happen:
• The seller actually purchases the energy consuming server and host
the product and services from the remote location so that the user
don’t have to , they can simply logon into network without install
anything.
• GOOGLE, AMAZON, MICROSOFT AZURE are some of the
suppliers.
CLOUD COMPUTING SERVICES:
• Software as a service SAAS : End user
• Platform as a services PAAS : Application Developer
• Infrastructure as a service IAAS : Network Architect
Cloud Architecture
Service Models
• IAAS: It provides computer – physical, virtual machines .
• The service can be scaled up and down according to consumer needs
software bundles , firewalls , cost reflects the amount of resources
allocated and consumed.
• PAAS: It provides the operating system , application platform
development environment, web servers , data base etc,
• The resource automatically scales up (modify) the resources so that the
user does not have to manually allocate resource.
• SAAS: In SAAS the user is provided application to software and database
and cloud provider manages the infrastructure and platform.
• It is usually the on demand software which the user pay on the pay – per –
use basis.
• Scalability: the application software can use vary no. of users.
• Load Distributer : It distributes the work load over machines.
Deployment Models
Public Cloud
• Computing infrastructure is shared by various organizations.
• E.g. : Amazon, Google, Microsoft
Private Cloud
• The computing infrastructure is dedicated to a particular
organization and not shared with other organizations.
• more expensive and more secure when compare to public cloud.
• E.g. : HP data center, IBM, Oracle
Hybrid Cloud
• Organizations may host critical applications on private clouds.
• where as application which requires relatively less security
concerns on public cloud.
• usage of both public and private together is called hybrid cloud.
Security :
• Although cloud computing has achieve a huge success in various
industries but there is a huge a concern in the field of information
system and security. Various issues has been raised regarding
the security of data being saved on the provider‟s cloud and
security when the data is being transmitted.
• To make the data secure from various attack, encryption of data is
needed to before it is stored and transmitted.
Encryption Techniques: Blowfish Algorithm
• Blowfish is a symmetric block cipher encryption algorithm meaning
that it uses the same secret key to both encrypt and decrypt messages
• It Divides a message up into fixed length blocks during encryption
and decryption.
• The block length for Blowfish is 64 bits; messages that aren't
multiple of eight bytes in size must be padded.
• It takes a variable-length key, from 32 bits to 448 bits, making it
ideal for securing data.
• It is suitable for applications where the key does not change often,
like a communications link or an automatic file encryptor. It is
significantly faster than most encryption algorithms
Blowfish Algorithm : Working
• Split each block into halves
• Right half becomes new left half
• New right half is the final result when the left half is XOR„d with the
result of applying f to the right half and the key.
AES Algorithm ( Advenced Encryption
Algorithem )
• AES is a symmetric block cipher. This means that it uses the
same key for both encryption and decryption.
• Accept a block size of 128 bits;
• A choice of three keys - 128, 192, 256 bits.
• Depending on version of key used, the name of the standard is
modified to AES-128, AES-192 or AES- 256 respectively.
• 10 rounds -128-bit keys,
12 rounds -192-bit keys,
14 rounds - 256-bit keys.
Note : Except for the last round in each case, all other rounds are
identical
RSA Algorithm ( Revist-Shamir-
Aldeman
• Most commonly used encryption and authentication algorithm
• It is included as part of the Web browsers from Microsoft and
Netscape.
• It involves a public key and a private key. The public key can be
known to everyone and is used for encrypting messages.
• The basic steps of RSA algorithm are:
• Key Generation
• Encryption and
• Decryption
RSA Algorithem : Working ( cont.)
RSA Algorithem : Working ( cont.)
• Multiplying two large prime no. and do some
processing on it .
• Key created : Public and private key
• The private key is used to decrypt text that has
been encrypted with the public key.
Summery
• Cloud computing is revolutionizing the way business is
carried out in various industries (Government, Healthcare,
Software etc.), use of information technology resources and
services, but the revolution always comes with new problem.
• One of the major problems associated with Cloud computing
is Security.
• Various Security issues and Algorithms to deal with data
security issues are discussed .
• Discussed the advantages, services of the cloud and the
different deployment models.
• In future, security algorithms will be implemented producing
results to justify the concepts of security for cloud computing
and comparing them to find out which is the most efficient
one.
Queries ???
Thank You !

More Related Content

What's hot

Cloud computing
Cloud computingCloud computing
Cloud computing
compherals
 
Third Party Cloud Management
Third Party Cloud ManagementThird Party Cloud Management
Third Party Cloud Management
Orchestrate Mortgage and Title Solutions, LLC
 
Cloud Computing Business Models
Cloud Computing Business ModelsCloud Computing Business Models
Cloud Computing Business Models
Karri Huhtanen
 
Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0David Spinks
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Siddiq Abu Bakkar
 
cloud computing ppt
cloud computing pptcloud computing ppt
cloud computing ppt
himanshuawasthi2109
 
Cloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentalsCloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentals
Viresh Suri
 
Cloud computing
Cloud computingCloud computing
Cloud computing
pgayatrinaidu
 
AWS CloudFront 가속 및 DDoS 방어
AWS CloudFront 가속 및 DDoS 방어AWS CloudFront 가속 및 DDoS 방어
AWS CloudFront 가속 및 DDoS 방어
Kyle(KY) Yang
 
On Premise vs Cloud Computing | Cloud Certification Training | Edureka
On Premise vs Cloud Computing | Cloud Certification Training | EdurekaOn Premise vs Cloud Computing | Cloud Certification Training | Edureka
On Premise vs Cloud Computing | Cloud Certification Training | Edureka
Edureka!
 
Disaster Recovery, Continuity of Operations, Backup, and Archive on AWS | AWS...
Disaster Recovery, Continuity of Operations, Backup, and Archive on AWS | AWS...Disaster Recovery, Continuity of Operations, Backup, and Archive on AWS | AWS...
Disaster Recovery, Continuity of Operations, Backup, and Archive on AWS | AWS...
Amazon Web Services
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Ankita Khadatkar
 
Infrastructure as a Service ( IaaS)
Infrastructure as a Service ( IaaS)Infrastructure as a Service ( IaaS)
Infrastructure as a Service ( IaaS)
Ravindra Dastikop
 
Migrating Oracle Databases to AWS
Migrating Oracle Databases to AWSMigrating Oracle Databases to AWS
Migrating Oracle Databases to AWS
AWS Germany
 
Cloud computing-security-issues
Cloud computing-security-issuesCloud computing-security-issues
Cloud computing-security-issues
Aleem Mohammed
 
Amazon WorkSpaces for Education
Amazon WorkSpaces for EducationAmazon WorkSpaces for Education
Amazon WorkSpaces for Education
Amazon Web Services
 
High performance computing for research
High performance computing for researchHigh performance computing for research
High performance computing for research
Esteban Hernandez
 
Chap 3 infrastructure as a service(iaas)
Chap 3 infrastructure as a service(iaas)Chap 3 infrastructure as a service(iaas)
Chap 3 infrastructure as a service(iaas)
Raj Sarode
 
Cloud Security And Privacy
Cloud Security And PrivacyCloud Security And Privacy
Cloud Security And Privacy
tmather
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
Dheeraj Negi
 

What's hot (20)

Cloud computing
Cloud computingCloud computing
Cloud computing
 
Third Party Cloud Management
Third Party Cloud ManagementThird Party Cloud Management
Third Party Cloud Management
 
Cloud Computing Business Models
Cloud Computing Business ModelsCloud Computing Business Models
Cloud Computing Business Models
 
Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
cloud computing ppt
cloud computing pptcloud computing ppt
cloud computing ppt
 
Cloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentalsCloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentals
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
AWS CloudFront 가속 및 DDoS 방어
AWS CloudFront 가속 및 DDoS 방어AWS CloudFront 가속 및 DDoS 방어
AWS CloudFront 가속 및 DDoS 방어
 
On Premise vs Cloud Computing | Cloud Certification Training | Edureka
On Premise vs Cloud Computing | Cloud Certification Training | EdurekaOn Premise vs Cloud Computing | Cloud Certification Training | Edureka
On Premise vs Cloud Computing | Cloud Certification Training | Edureka
 
Disaster Recovery, Continuity of Operations, Backup, and Archive on AWS | AWS...
Disaster Recovery, Continuity of Operations, Backup, and Archive on AWS | AWS...Disaster Recovery, Continuity of Operations, Backup, and Archive on AWS | AWS...
Disaster Recovery, Continuity of Operations, Backup, and Archive on AWS | AWS...
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Infrastructure as a Service ( IaaS)
Infrastructure as a Service ( IaaS)Infrastructure as a Service ( IaaS)
Infrastructure as a Service ( IaaS)
 
Migrating Oracle Databases to AWS
Migrating Oracle Databases to AWSMigrating Oracle Databases to AWS
Migrating Oracle Databases to AWS
 
Cloud computing-security-issues
Cloud computing-security-issuesCloud computing-security-issues
Cloud computing-security-issues
 
Amazon WorkSpaces for Education
Amazon WorkSpaces for EducationAmazon WorkSpaces for Education
Amazon WorkSpaces for Education
 
High performance computing for research
High performance computing for researchHigh performance computing for research
High performance computing for research
 
Chap 3 infrastructure as a service(iaas)
Chap 3 infrastructure as a service(iaas)Chap 3 infrastructure as a service(iaas)
Chap 3 infrastructure as a service(iaas)
 
Cloud Security And Privacy
Cloud Security And PrivacyCloud Security And Privacy
Cloud Security And Privacy
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 

Viewers also liked

Cloud Security Issues 1.04.10
Cloud Security  Issues 1.04.10Cloud Security  Issues 1.04.10
Cloud Security Issues 1.04.10
Rugby7277
 
Cloud security issues and concerns
Cloud security   issues and concernsCloud security   issues and concerns
Cloud security issues and concerns
Mrinal Baowaly
 
multiple encryption in clouud computing
multiple encryption in clouud computingmultiple encryption in clouud computing
multiple encryption in clouud computingRauf Wani
 
Security issues in cloud
Security issues in cloudSecurity issues in cloud
Security issues in cloudWipro
 
Cloud Computing Security Issues
Cloud Computing Security Issues Cloud Computing Security Issues
Cloud Computing Security Issues
Discover Cloud Computing
 
Cryptography
CryptographyCryptography
Cryptography
Techprahlad
 
App sec in the time of docker containers
App sec in the time of docker containersApp sec in the time of docker containers
App sec in the time of docker containers
Akash Mahajan
 
Analysis of-security-algorithms-in-cloud-computing [autosaved]
Analysis of-security-algorithms-in-cloud-computing [autosaved]Analysis of-security-algorithms-in-cloud-computing [autosaved]
Analysis of-security-algorithms-in-cloud-computing [autosaved]
Md. Fazla Rabbi
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014
Akash Mahajan
 
Cloud Encryption
Cloud EncryptionCloud Encryption
Cloud Encryption
RituparnaNag
 
On technical security issues in cloud computing
On technical security issues in cloud computingOn technical security issues in cloud computing
On technical security issues in cloud computing
sashi799
 
Trust and Cloud computing, removing the need for the consumer to trust their ...
Trust and Cloud computing, removing the need for the consumer to trust their ...Trust and Cloud computing, removing the need for the consumer to trust their ...
Trust and Cloud computing, removing the need for the consumer to trust their ...
David Wallom
 
T-BROKER: A TRUST-AWARE SERVICE BROKERING SCHEME FOR MULTIPLE CLOUD COLLABORA...
T-BROKER: A TRUST-AWARE SERVICE BROKERING SCHEME FOR MULTIPLE CLOUD COLLABORA...T-BROKER: A TRUST-AWARE SERVICE BROKERING SCHEME FOR MULTIPLE CLOUD COLLABORA...
T-BROKER: A TRUST-AWARE SERVICE BROKERING SCHEME FOR MULTIPLE CLOUD COLLABORA...
I3E Technologies
 
Cloud armor supporting reputation based trust management for cloud services
Cloud armor supporting reputation based trust management for cloud servicesCloud armor supporting reputation based trust management for cloud services
Cloud armor supporting reputation based trust management for cloud services
ieeepondy
 
Cloudarmor supporting reputation based trust management for cloud services
Cloudarmor supporting reputation based trust management for cloud servicesCloudarmor supporting reputation based trust management for cloud services
Cloudarmor supporting reputation based trust management for cloud services
Shakas Technologies
 
Cloudarmor supporting reputation based trust management for cloud services
Cloudarmor supporting reputation based trust management for cloud servicesCloudarmor supporting reputation based trust management for cloud services
Cloudarmor supporting reputation based trust management for cloud services
Shakas Technologies
 
Storage on cloud using dynamic encryption
Storage on cloud using dynamic encryptionStorage on cloud using dynamic encryption
Storage on cloud using dynamic encryption
Mphasis
 
Classification of secure encrypted relationaldata in cloud computing
Classification of secure encrypted relationaldata in cloud computingClassification of secure encrypted relationaldata in cloud computing
Classification of secure encrypted relationaldata in cloud computing
eSAT Journals
 
Cloud computing and security final
Cloud computing and security finalCloud computing and security final
Cloud computing and security final
Akash Kamble
 
Secure Computing in Enterprise Cloud Environments
Secure Computing in Enterprise Cloud EnvironmentsSecure Computing in Enterprise Cloud Environments
Secure Computing in Enterprise Cloud Environments
Shaun Thomas
 

Viewers also liked (20)

Cloud Security Issues 1.04.10
Cloud Security  Issues 1.04.10Cloud Security  Issues 1.04.10
Cloud Security Issues 1.04.10
 
Cloud security issues and concerns
Cloud security   issues and concernsCloud security   issues and concerns
Cloud security issues and concerns
 
multiple encryption in clouud computing
multiple encryption in clouud computingmultiple encryption in clouud computing
multiple encryption in clouud computing
 
Security issues in cloud
Security issues in cloudSecurity issues in cloud
Security issues in cloud
 
Cloud Computing Security Issues
Cloud Computing Security Issues Cloud Computing Security Issues
Cloud Computing Security Issues
 
Cryptography
CryptographyCryptography
Cryptography
 
App sec in the time of docker containers
App sec in the time of docker containersApp sec in the time of docker containers
App sec in the time of docker containers
 
Analysis of-security-algorithms-in-cloud-computing [autosaved]
Analysis of-security-algorithms-in-cloud-computing [autosaved]Analysis of-security-algorithms-in-cloud-computing [autosaved]
Analysis of-security-algorithms-in-cloud-computing [autosaved]
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014
 
Cloud Encryption
Cloud EncryptionCloud Encryption
Cloud Encryption
 
On technical security issues in cloud computing
On technical security issues in cloud computingOn technical security issues in cloud computing
On technical security issues in cloud computing
 
Trust and Cloud computing, removing the need for the consumer to trust their ...
Trust and Cloud computing, removing the need for the consumer to trust their ...Trust and Cloud computing, removing the need for the consumer to trust their ...
Trust and Cloud computing, removing the need for the consumer to trust their ...
 
T-BROKER: A TRUST-AWARE SERVICE BROKERING SCHEME FOR MULTIPLE CLOUD COLLABORA...
T-BROKER: A TRUST-AWARE SERVICE BROKERING SCHEME FOR MULTIPLE CLOUD COLLABORA...T-BROKER: A TRUST-AWARE SERVICE BROKERING SCHEME FOR MULTIPLE CLOUD COLLABORA...
T-BROKER: A TRUST-AWARE SERVICE BROKERING SCHEME FOR MULTIPLE CLOUD COLLABORA...
 
Cloud armor supporting reputation based trust management for cloud services
Cloud armor supporting reputation based trust management for cloud servicesCloud armor supporting reputation based trust management for cloud services
Cloud armor supporting reputation based trust management for cloud services
 
Cloudarmor supporting reputation based trust management for cloud services
Cloudarmor supporting reputation based trust management for cloud servicesCloudarmor supporting reputation based trust management for cloud services
Cloudarmor supporting reputation based trust management for cloud services
 
Cloudarmor supporting reputation based trust management for cloud services
Cloudarmor supporting reputation based trust management for cloud servicesCloudarmor supporting reputation based trust management for cloud services
Cloudarmor supporting reputation based trust management for cloud services
 
Storage on cloud using dynamic encryption
Storage on cloud using dynamic encryptionStorage on cloud using dynamic encryption
Storage on cloud using dynamic encryption
 
Classification of secure encrypted relationaldata in cloud computing
Classification of secure encrypted relationaldata in cloud computingClassification of secure encrypted relationaldata in cloud computing
Classification of secure encrypted relationaldata in cloud computing
 
Cloud computing and security final
Cloud computing and security finalCloud computing and security final
Cloud computing and security final
 
Secure Computing in Enterprise Cloud Environments
Secure Computing in Enterprise Cloud EnvironmentsSecure Computing in Enterprise Cloud Environments
Secure Computing in Enterprise Cloud Environments
 

Similar to Security Issues in Cloud Computing

Trends in recent technology
Trends in recent technologyTrends in recent technology
Trends in recent technologysai krishna
 
Cloud architecture, conception and computing PPT
Cloud architecture, conception and computing PPTCloud architecture, conception and computing PPT
Cloud architecture, conception and computing PPT
NangVictorin
 
Cloud by SBS.pptx
Cloud by SBS.pptxCloud by SBS.pptx
Cloud by SBS.pptx
YounusS2
 
Cloud computing and data security
Cloud computing and data securityCloud computing and data security
Cloud computing and data security
Mohammed Fazuluddin
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Dr. B T Sampath Kumar
 
Cloud Computing
Cloud Computing Cloud Computing
Cloud Computing
seleshkumar Prajapati
 
Cloud computing by NADEEM AHMED
Cloud computing by NADEEM AHMEDCloud computing by NADEEM AHMED
Cloud computing by NADEEM AHMED
NA000000
 
lecture5_4.pptx
lecture5_4.pptxlecture5_4.pptx
lecture5_4.pptx
RajeshSukte1
 
lecture5_4.pptx
lecture5_4.pptxlecture5_4.pptx
lecture5_4.pptx
DeerajKumarBURNAH
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
Muhammad Yaqoob
 
Cloud computing
Cloud computingCloud computing
Cloud computing
MOHIT PANDEY
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computingnitinw25
 
cloud computing
 cloud computing cloud computing
cloud computing
Tapesh Chalisgaonkar
 
presentation_introduction_to_cloud_computing_1565085358_46246.pptx
presentation_introduction_to_cloud_computing_1565085358_46246.pptxpresentation_introduction_to_cloud_computing_1565085358_46246.pptx
presentation_introduction_to_cloud_computing_1565085358_46246.pptx
SimmyNayak
 
Presentation on Cloud Computing
Presentation on Cloud ComputingPresentation on Cloud Computing
Presentation on Cloud Computing
Oshin Kandpal
 
cloudcomputing.pptx
cloudcomputing.pptxcloudcomputing.pptx
cloudcomputing.pptx
ahmedsamir339466
 
Presentation on Cloud computing
Presentation on Cloud computingPresentation on Cloud computing
Presentation on Cloud computing
Vijay Bhanu Thodupunoori
 
Presentation on Cloud Computing
Presentation on Cloud ComputingPresentation on Cloud Computing
Presentation on Cloud Computing
HarpreetKaur1382
 
Cloud Computing : Revised Presentation
Cloud Computing : Revised PresentationCloud Computing : Revised Presentation
Cloud Computing : Revised Presentation
Mayank Aggarwal
 

Similar to Security Issues in Cloud Computing (20)

Trends in recent technology
Trends in recent technologyTrends in recent technology
Trends in recent technology
 
Cloud architecture, conception and computing PPT
Cloud architecture, conception and computing PPTCloud architecture, conception and computing PPT
Cloud architecture, conception and computing PPT
 
Cloud by SBS.pptx
Cloud by SBS.pptxCloud by SBS.pptx
Cloud by SBS.pptx
 
Cloud computing and data security
Cloud computing and data securityCloud computing and data security
Cloud computing and data security
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Computing
Cloud Computing Cloud Computing
Cloud Computing
 
Cloud computing by NADEEM AHMED
Cloud computing by NADEEM AHMEDCloud computing by NADEEM AHMED
Cloud computing by NADEEM AHMED
 
lecture5_4.pptx
lecture5_4.pptxlecture5_4.pptx
lecture5_4.pptx
 
lecture5_4.pptx
lecture5_4.pptxlecture5_4.pptx
lecture5_4.pptx
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
cloud computing
 cloud computing cloud computing
cloud computing
 
presentation_introduction_to_cloud_computing_1565085358_46246.pptx
presentation_introduction_to_cloud_computing_1565085358_46246.pptxpresentation_introduction_to_cloud_computing_1565085358_46246.pptx
presentation_introduction_to_cloud_computing_1565085358_46246.pptx
 
Presentation on Cloud Computing
Presentation on Cloud ComputingPresentation on Cloud Computing
Presentation on Cloud Computing
 
cloudcomputing.pptx
cloudcomputing.pptxcloudcomputing.pptx
cloudcomputing.pptx
 
Presentation on Cloud computing
Presentation on Cloud computingPresentation on Cloud computing
Presentation on Cloud computing
 
Presentation on Cloud Computing
Presentation on Cloud ComputingPresentation on Cloud Computing
Presentation on Cloud Computing
 
Cloud Computing : Revised Presentation
Cloud Computing : Revised PresentationCloud Computing : Revised Presentation
Cloud Computing : Revised Presentation
 

Recently uploaded

FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 

Security Issues in Cloud Computing

  • 1. Seminar Presentation on Security Issues in Cloud Computing Presented by : Jyotika Pandey 4th year , JIET-SETG Rollno.- 10EJTIT013
  • 2. What is Cloud Computing ? • Cloud computing means ability to run a program or application on many connected computer at the same time. • NETWORK BASED SERVICES provided by VIRTUAL SERVERS, server which do not actually exits and which are actually stimulated by software running on real machines. • NOTE: as virtual server do not actually exist physically, they can be scaled up, moved from place to place just like CLOUD. • “Cloud” is basically a metaphor for “internet”.
  • 3. How does this happen: • The seller actually purchases the energy consuming server and host the product and services from the remote location so that the user don’t have to , they can simply logon into network without install anything. • GOOGLE, AMAZON, MICROSOFT AZURE are some of the suppliers.
  • 4. CLOUD COMPUTING SERVICES: • Software as a service SAAS : End user • Platform as a services PAAS : Application Developer • Infrastructure as a service IAAS : Network Architect
  • 6. Service Models • IAAS: It provides computer – physical, virtual machines . • The service can be scaled up and down according to consumer needs software bundles , firewalls , cost reflects the amount of resources allocated and consumed. • PAAS: It provides the operating system , application platform development environment, web servers , data base etc, • The resource automatically scales up (modify) the resources so that the user does not have to manually allocate resource. • SAAS: In SAAS the user is provided application to software and database and cloud provider manages the infrastructure and platform. • It is usually the on demand software which the user pay on the pay – per – use basis. • Scalability: the application software can use vary no. of users. • Load Distributer : It distributes the work load over machines.
  • 7. Deployment Models Public Cloud • Computing infrastructure is shared by various organizations. • E.g. : Amazon, Google, Microsoft Private Cloud • The computing infrastructure is dedicated to a particular organization and not shared with other organizations. • more expensive and more secure when compare to public cloud. • E.g. : HP data center, IBM, Oracle Hybrid Cloud • Organizations may host critical applications on private clouds. • where as application which requires relatively less security concerns on public cloud. • usage of both public and private together is called hybrid cloud.
  • 8. Security : • Although cloud computing has achieve a huge success in various industries but there is a huge a concern in the field of information system and security. Various issues has been raised regarding the security of data being saved on the provider‟s cloud and security when the data is being transmitted. • To make the data secure from various attack, encryption of data is needed to before it is stored and transmitted.
  • 9. Encryption Techniques: Blowfish Algorithm • Blowfish is a symmetric block cipher encryption algorithm meaning that it uses the same secret key to both encrypt and decrypt messages • It Divides a message up into fixed length blocks during encryption and decryption. • The block length for Blowfish is 64 bits; messages that aren't multiple of eight bytes in size must be padded. • It takes a variable-length key, from 32 bits to 448 bits, making it ideal for securing data. • It is suitable for applications where the key does not change often, like a communications link or an automatic file encryptor. It is significantly faster than most encryption algorithms
  • 10. Blowfish Algorithm : Working • Split each block into halves • Right half becomes new left half • New right half is the final result when the left half is XOR„d with the result of applying f to the right half and the key.
  • 11. AES Algorithm ( Advenced Encryption Algorithem ) • AES is a symmetric block cipher. This means that it uses the same key for both encryption and decryption. • Accept a block size of 128 bits; • A choice of three keys - 128, 192, 256 bits. • Depending on version of key used, the name of the standard is modified to AES-128, AES-192 or AES- 256 respectively. • 10 rounds -128-bit keys, 12 rounds -192-bit keys, 14 rounds - 256-bit keys. Note : Except for the last round in each case, all other rounds are identical
  • 12. RSA Algorithm ( Revist-Shamir- Aldeman • Most commonly used encryption and authentication algorithm • It is included as part of the Web browsers from Microsoft and Netscape. • It involves a public key and a private key. The public key can be known to everyone and is used for encrypting messages. • The basic steps of RSA algorithm are: • Key Generation • Encryption and • Decryption
  • 13. RSA Algorithem : Working ( cont.)
  • 14. RSA Algorithem : Working ( cont.) • Multiplying two large prime no. and do some processing on it . • Key created : Public and private key • The private key is used to decrypt text that has been encrypted with the public key.
  • 15. Summery • Cloud computing is revolutionizing the way business is carried out in various industries (Government, Healthcare, Software etc.), use of information technology resources and services, but the revolution always comes with new problem. • One of the major problems associated with Cloud computing is Security. • Various Security issues and Algorithms to deal with data security issues are discussed . • Discussed the advantages, services of the cloud and the different deployment models. • In future, security algorithms will be implemented producing results to justify the concepts of security for cloud computing and comparing them to find out which is the most efficient one.