What is Infrastructure as a Service?, Comparison of Service Models, Why do we need IaaS?, Essential Characteristics of IaaS, Where IaaS May Not be the Best Option?, Cloud Deployment Models
https://notebookbft.wordpress.com/
On demand delivery of IT resources through the internet with payment depending on the use of the service is known as cloud computing.
The term cloud refers to a network or the internet.
It gives a solution for infrastructure at low cost.
Cloud computing refers to manipulating, configuring, and accessing the applications online. It offers online data storage, infrastructure and application.
Cloud computing is both a combination of software and hardware based computing resources delivered as a network service.
Using AWS Batch and AWS Step Functions to Design and Run High-Throughput Work...Amazon Web Services
Learning Objectives:
- How to simply scale out your batch workflows on AWS
- How to think about container/job management within managed, high-throughput workflows
- How to build a scalable orchestration framework within AWS Step Functions
What is Infrastructure as a Service?, Comparison of Service Models, Why do we need IaaS?, Essential Characteristics of IaaS, Where IaaS May Not be the Best Option?, Cloud Deployment Models
https://notebookbft.wordpress.com/
On demand delivery of IT resources through the internet with payment depending on the use of the service is known as cloud computing.
The term cloud refers to a network or the internet.
It gives a solution for infrastructure at low cost.
Cloud computing refers to manipulating, configuring, and accessing the applications online. It offers online data storage, infrastructure and application.
Cloud computing is both a combination of software and hardware based computing resources delivered as a network service.
Using AWS Batch and AWS Step Functions to Design and Run High-Throughput Work...Amazon Web Services
Learning Objectives:
- How to simply scale out your batch workflows on AWS
- How to think about container/job management within managed, high-throughput workflows
- How to build a scalable orchestration framework within AWS Step Functions
Cloud computing is the delivery of computing services over the Internet. Cloud services allow
individuals and businesses to use software and hardware that are managed by third parties at remote locations. Examples of cloud services include online file storage, social networking sites, webmail, and online business applications. The cloud computing model allows access to information and computer
resources from anywhere that a network connection is available. Cloud computing provides a shared pool of resources, including data storage space, networks,
computer processing power, and specialized corporate and user applications.
A quick overview of the possible business models of the cloud computing companies. Done for Tampere University of Technology seminar course about cloud computing ( http://www.cs.tut.fi/~tsysta/Pilvilaskenta.html ).
The practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer.
AWS의 CDN 서비스인 CloudFront의 가속 및 DDoS 방어 소개
# CloudFront 장점
- 수퍼 PoP: AWS 클라우드 구축/운영 Know-How 가 담긴 고성능/대용량 아키텍쳐
* 국내 최대 Capacity / 가장 빠르게 성장하는 글로벌 CDN 서비스
- Single-Service: (캐싱, 다이나믹 가속, HTTPS, AWS Shield Standard 등) 동일 가격 체계로 제공
- AWS Backbone 전용망: Edge <=> Origin 가속
- 인라인 DDoS 방어: Shield Standard & Advance
- AWS 서비스 연동성
On Premise vs Cloud Computing | Cloud Certification Training | EdurekaEdureka!
**Cloud Masters Certification Training: https://www.edureka.co/masters-program/cloud-architect-training **
This Edureka PPT on "On Premise vs Cloud Computing” will help you understand both On Premise and Cloud Computing approaches, thus easing up the process of choosing one for your business.
Following are the offerings of this PPT:
On Premise Approach
Cloud Computing Approach
Cost
Security
Control
Flexibility
Other Factors
Check out our Playlist: https://goo.gl/NRbdju
Blog Series: https://goo.gl/8S5WFJ
Instagram: https://www.instagram.com/edureka_lea...
Facebook: https://www.facebook.com/edurekaIN/
Twitter: https://twitter.com/edurekain
LinkedIn: https://www.linkedin.com/company/edureka
Disaster Recovery, Continuity of Operations, Backup, and Archive on AWS | AWS...Amazon Web Services
Traditional disaster recovery (DR) has had a spotty record for enterprises. This session compares conventional approaches to DR to those using the AWS cloud and talks about the four ascending levels of AWS DR options and the benefits and tradeoffs among them. The session goes on to discuss backup and restore architectures both using partner products and solutions that assist in backup, recovery, DR, and continuity of operations (COOP).
Infrastructure as a Service ( IaaS) is one of the three fundamental services in cloud computing. IaaS provides access to basic computing resources such as hardware- processor, storage , network cards and more
In part one you will learn about benefits of moving Oracle Database Workloads to AWS, licensing and key aspects to consider. Part two is about understanding how to execute migrations, key success factors, and demonstration.
Amazon WorkSpaces provides a virtual desktop experience in the cloud. It replaces traditional computer lab approaches through mobile desktop environments that can be accessed from the classroom or at home. WorkSpaces’ device agnostic technology also pairs well with one-to-one initiatives across geographies on almost every tablet and/or computer in the market – all while enforcing security policies across the fleet. WorkSpaces also helps educational institutions quickly provision multiple desktops where users can access their applications, documents, and intranet resources that they need from a centralized location. Attend this webinar to discover alternatives to traditional Virtual Desktop Infrastructure (VDI) and learn how to centralize management of student IT resources quickly, efficiently and at the lowest cost possible.
Cloud computing is the delivery of computing services over the Internet. Cloud services allow
individuals and businesses to use software and hardware that are managed by third parties at remote locations. Examples of cloud services include online file storage, social networking sites, webmail, and online business applications. The cloud computing model allows access to information and computer
resources from anywhere that a network connection is available. Cloud computing provides a shared pool of resources, including data storage space, networks,
computer processing power, and specialized corporate and user applications.
A quick overview of the possible business models of the cloud computing companies. Done for Tampere University of Technology seminar course about cloud computing ( http://www.cs.tut.fi/~tsysta/Pilvilaskenta.html ).
The practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer.
AWS의 CDN 서비스인 CloudFront의 가속 및 DDoS 방어 소개
# CloudFront 장점
- 수퍼 PoP: AWS 클라우드 구축/운영 Know-How 가 담긴 고성능/대용량 아키텍쳐
* 국내 최대 Capacity / 가장 빠르게 성장하는 글로벌 CDN 서비스
- Single-Service: (캐싱, 다이나믹 가속, HTTPS, AWS Shield Standard 등) 동일 가격 체계로 제공
- AWS Backbone 전용망: Edge <=> Origin 가속
- 인라인 DDoS 방어: Shield Standard & Advance
- AWS 서비스 연동성
On Premise vs Cloud Computing | Cloud Certification Training | EdurekaEdureka!
**Cloud Masters Certification Training: https://www.edureka.co/masters-program/cloud-architect-training **
This Edureka PPT on "On Premise vs Cloud Computing” will help you understand both On Premise and Cloud Computing approaches, thus easing up the process of choosing one for your business.
Following are the offerings of this PPT:
On Premise Approach
Cloud Computing Approach
Cost
Security
Control
Flexibility
Other Factors
Check out our Playlist: https://goo.gl/NRbdju
Blog Series: https://goo.gl/8S5WFJ
Instagram: https://www.instagram.com/edureka_lea...
Facebook: https://www.facebook.com/edurekaIN/
Twitter: https://twitter.com/edurekain
LinkedIn: https://www.linkedin.com/company/edureka
Disaster Recovery, Continuity of Operations, Backup, and Archive on AWS | AWS...Amazon Web Services
Traditional disaster recovery (DR) has had a spotty record for enterprises. This session compares conventional approaches to DR to those using the AWS cloud and talks about the four ascending levels of AWS DR options and the benefits and tradeoffs among them. The session goes on to discuss backup and restore architectures both using partner products and solutions that assist in backup, recovery, DR, and continuity of operations (COOP).
Infrastructure as a Service ( IaaS) is one of the three fundamental services in cloud computing. IaaS provides access to basic computing resources such as hardware- processor, storage , network cards and more
In part one you will learn about benefits of moving Oracle Database Workloads to AWS, licensing and key aspects to consider. Part two is about understanding how to execute migrations, key success factors, and demonstration.
Amazon WorkSpaces provides a virtual desktop experience in the cloud. It replaces traditional computer lab approaches through mobile desktop environments that can be accessed from the classroom or at home. WorkSpaces’ device agnostic technology also pairs well with one-to-one initiatives across geographies on almost every tablet and/or computer in the market – all while enforcing security policies across the fleet. WorkSpaces also helps educational institutions quickly provision multiple desktops where users can access their applications, documents, and intranet resources that they need from a centralized location. Attend this webinar to discover alternatives to traditional Virtual Desktop Infrastructure (VDI) and learn how to centralize management of student IT resources quickly, efficiently and at the lowest cost possible.
This presentation will give complete information regarding security issues related to cloud computing. To learn cloud computing fill up a simple form.
http://bit.ly/aDegGN
App sec in the time of docker containersAkash Mahajan
A look at how application security needs to evolve to keep up with applications that are containerised. Delivered first at c0c0n 2016, the audience got a ready checklist to go with the talk.
Analysis of-security-algorithms-in-cloud-computing [autosaved]Md. Fazla Rabbi
Security system in cloud for storing data is not safe enough. When data is valuable specially in the cloud computing, it's security considered to be the key requirement. Also it is get more important when it is hard to make it safe. It becomes hard to keep data safe due to lack of strong data encryption system. Cloud possesses the security problem in Data segregation, Data theft, unauthorized access, Uncleaned Owner and responsibility of Data Protection, Data Loss conditions.
Security in the cloud Workshop HSTC 2014Akash Mahajan
A broad overview of what it takes to be secure. This is more of an introduction where we introduce the basic terms around Cloud Computing and how do we go about securing our information assets(Data, Applications and Infrastructure)
The workshop was fun because all the slides were paired with real world examples of security breaches and attacks.
Cloud here means data and encryption means to secure the data. In this ppt you can get to know about various encryption algorithms which are used to secure the data.
Cloudarmor supporting reputation based trust management for cloud servicesShakas Technologies
Trust management is one of the most challenging issues for the adoption and growth of cloud computing. The highly dynamic, distributed, and non-transparent nature of cloud services introduces several challenging issues such as privacy, security, and availability.
Classification of secure encrypted relationaldata in cloud computingeSAT Journals
Abstract Due to the increasing popularity of cloud computing, organisations have the choice to outsource their large encrypted data
content along as well as data mining operations to cloud the environment. Outsourcing data to such a third party cloud
environment can compromise the data security as cloud operations and data mining tasks cannot carry out computations without
decrypting the data. Hence, already present privacy-preserving data mining techniques are not efficient to address the security
and confidentiality problems. In the base paper, a k-NN classification algorithm over secure data under a semi-honest model was
developed using a Paillier cryptosystem for public key encryption. The usage of public key cryptosystems has security issues
during data transfer in the cloud. In this proposed work, we focus on solving the k-NN problem over secure encrypted data by
proposing a privacy preserving k-nearest neighbour classification on encrypted information in the cloud using private key for
encryption and decryption based on the symmetric AES cryptographic algorithm under the secure multiparty computations for
creating a complete homomorphic encryption (CHE) scheme which results in the reduction of space requirement and processing
time. Also, we aim to apply the same PPk-NN classification over encrypted images. The proposed protocol hides the input query
and data access patterns of the users and also preserves the confidentiality of text and image data.Finally, we present a practical
analysis of the efficiency and security performance of our proposed protocol for application in a Life insurance firm where the
clients are classified according to their risk-level.
Keywords: Data Mining, PPk-NN, Semi-Honest Model , Individual Key, Symmetric Homomorphic Encryption, AES
Algorithm,CHE, Less Space and Time
Secure Computing in Enterprise Cloud EnvironmentsShaun Thomas
A look at how your business should approach computing in the cloud. This ebook highlights issues like data sovereignty, public and private cloud security issues as well as many of the myths that surround cloud computing.
Cloud architecture, conception and computing PPTNangVictorin
These platforms hide the complexity and details of the underlying infrastructure from users and applications by providing very simple graphical interface or API (Applications Programming Interface). Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.
Cloud computing is the collection of various hardware and software that work together to provide different spheres of computing to the end-user as an online service.It provides the centralization of data.
This Presentation is on a very popular technology related topic, Cloud Computing. It is in our basic daily technology need like gmail i.e. also based on Cloud Computing. And also it has also very good source of job in it. Hope it would be helpful for your School or College project.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
2. What is Cloud Computing ?
• Cloud computing means ability to run a program or
application on many connected computer at the same time.
• NETWORK BASED SERVICES provided by VIRTUAL
SERVERS, server which do not actually exits and which are
actually stimulated by software running on real machines.
• NOTE: as virtual server do not actually exist physically, they
can be scaled up, moved from place to place just like
CLOUD.
• “Cloud” is basically a metaphor for “internet”.
3. How does this happen:
• The seller actually purchases the energy consuming server and host
the product and services from the remote location so that the user
don’t have to , they can simply logon into network without install
anything.
• GOOGLE, AMAZON, MICROSOFT AZURE are some of the
suppliers.
4. CLOUD COMPUTING SERVICES:
• Software as a service SAAS : End user
• Platform as a services PAAS : Application Developer
• Infrastructure as a service IAAS : Network Architect
6. Service Models
• IAAS: It provides computer – physical, virtual machines .
• The service can be scaled up and down according to consumer needs
software bundles , firewalls , cost reflects the amount of resources
allocated and consumed.
• PAAS: It provides the operating system , application platform
development environment, web servers , data base etc,
• The resource automatically scales up (modify) the resources so that the
user does not have to manually allocate resource.
• SAAS: In SAAS the user is provided application to software and database
and cloud provider manages the infrastructure and platform.
• It is usually the on demand software which the user pay on the pay – per –
use basis.
• Scalability: the application software can use vary no. of users.
• Load Distributer : It distributes the work load over machines.
7. Deployment Models
Public Cloud
• Computing infrastructure is shared by various organizations.
• E.g. : Amazon, Google, Microsoft
Private Cloud
• The computing infrastructure is dedicated to a particular
organization and not shared with other organizations.
• more expensive and more secure when compare to public cloud.
• E.g. : HP data center, IBM, Oracle
Hybrid Cloud
• Organizations may host critical applications on private clouds.
• where as application which requires relatively less security
concerns on public cloud.
• usage of both public and private together is called hybrid cloud.
8. Security :
• Although cloud computing has achieve a huge success in various
industries but there is a huge a concern in the field of information
system and security. Various issues has been raised regarding
the security of data being saved on the provider‟s cloud and
security when the data is being transmitted.
• To make the data secure from various attack, encryption of data is
needed to before it is stored and transmitted.
9. Encryption Techniques: Blowfish Algorithm
• Blowfish is a symmetric block cipher encryption algorithm meaning
that it uses the same secret key to both encrypt and decrypt messages
• It Divides a message up into fixed length blocks during encryption
and decryption.
• The block length for Blowfish is 64 bits; messages that aren't
multiple of eight bytes in size must be padded.
• It takes a variable-length key, from 32 bits to 448 bits, making it
ideal for securing data.
• It is suitable for applications where the key does not change often,
like a communications link or an automatic file encryptor. It is
significantly faster than most encryption algorithms
10. Blowfish Algorithm : Working
• Split each block into halves
• Right half becomes new left half
• New right half is the final result when the left half is XOR„d with the
result of applying f to the right half and the key.
11. AES Algorithm ( Advenced Encryption
Algorithem )
• AES is a symmetric block cipher. This means that it uses the
same key for both encryption and decryption.
• Accept a block size of 128 bits;
• A choice of three keys - 128, 192, 256 bits.
• Depending on version of key used, the name of the standard is
modified to AES-128, AES-192 or AES- 256 respectively.
• 10 rounds -128-bit keys,
12 rounds -192-bit keys,
14 rounds - 256-bit keys.
Note : Except for the last round in each case, all other rounds are
identical
12. RSA Algorithm ( Revist-Shamir-
Aldeman
• Most commonly used encryption and authentication algorithm
• It is included as part of the Web browsers from Microsoft and
Netscape.
• It involves a public key and a private key. The public key can be
known to everyone and is used for encrypting messages.
• The basic steps of RSA algorithm are:
• Key Generation
• Encryption and
• Decryption
14. RSA Algorithem : Working ( cont.)
• Multiplying two large prime no. and do some
processing on it .
• Key created : Public and private key
• The private key is used to decrypt text that has
been encrypted with the public key.
15. Summery
• Cloud computing is revolutionizing the way business is
carried out in various industries (Government, Healthcare,
Software etc.), use of information technology resources and
services, but the revolution always comes with new problem.
• One of the major problems associated with Cloud computing
is Security.
• Various Security issues and Algorithms to deal with data
security issues are discussed .
• Discussed the advantages, services of the cloud and the
different deployment models.
• In future, security algorithms will be implemented producing
results to justify the concepts of security for cloud computing
and comparing them to find out which is the most efficient
one.