secued cloud
TRANSCRIPT
![Page 1: secued cloud](https://reader036.vdocument.in/reader036/viewer/2022070518/58ec11d01a28ab53368b46b1/html5/thumbnails/1.jpg)
Dr. Panjabrao deshmukh poly.Amt.
Seminar on
Secure Cloud
Presented by :-1.Devyani B. Vaidya.
Guided By:-Prof. G. R.
Gosavi.
![Page 2: secued cloud](https://reader036.vdocument.in/reader036/viewer/2022070518/58ec11d01a28ab53368b46b1/html5/thumbnails/2.jpg)
Contents1. Introduction
![Page 3: secued cloud](https://reader036.vdocument.in/reader036/viewer/2022070518/58ec11d01a28ab53368b46b1/html5/thumbnails/3.jpg)
Introduction Secure Cloud’s simple approach to data
protection safely delivers encryption keys to valid devices without the need to deploy an entire file system and management infrastructure
![Page 4: secued cloud](https://reader036.vdocument.in/reader036/viewer/2022070518/58ec11d01a28ab53368b46b1/html5/thumbnails/4.jpg)
Why Is There A Need For Cloud Computing Backup?
Backup services are also provided by cloud computing and cover such functions like availability of remote data, resiliency of data center, compliance and security, server performance, and data protection which are especially practical and handy for business to business backup.
![Page 5: secued cloud](https://reader036.vdocument.in/reader036/viewer/2022070518/58ec11d01a28ab53368b46b1/html5/thumbnails/5.jpg)
Deployment Models PublicPrivateHybrid
![Page 6: secued cloud](https://reader036.vdocument.in/reader036/viewer/2022070518/58ec11d01a28ab53368b46b1/html5/thumbnails/6.jpg)
Security Issues faced by Cloud computing
1. Data Integrity 2. Data Theft 3. Privacy issues 4. Infected Application 5. Data loss 6. Data Location 7. Security on Vendor level 8. Security on user level
![Page 7: secued cloud](https://reader036.vdocument.in/reader036/viewer/2022070518/58ec11d01a28ab53368b46b1/html5/thumbnails/7.jpg)
Risks of cloud computing
Privacy agreement and service level agreement.
Security and data protection. Location of data.Loss Of Private/Important Data.
![Page 8: secued cloud](https://reader036.vdocument.in/reader036/viewer/2022070518/58ec11d01a28ab53368b46b1/html5/thumbnails/8.jpg)
Why is Cloud Security Important
Increasing Usage of Cloud Services in Non-traditional Sectors
Growing Adoption of Cloud Services in Government Departments
Rise in Cloud Service-specific Attacks Growing Usage of Cloud Services for
Critical Data Storage Rise in Employee Mobility
![Page 9: secued cloud](https://reader036.vdocument.in/reader036/viewer/2022070518/58ec11d01a28ab53368b46b1/html5/thumbnails/9.jpg)
How to Secure Data on the Cloud ?Avoid storing sensitive information in
the cloud. Read the user agreement to find out
how your cloud service storage works.Be serious about passwords. Encryption.
![Page 10: secued cloud](https://reader036.vdocument.in/reader036/viewer/2022070518/58ec11d01a28ab53368b46b1/html5/thumbnails/10.jpg)
Techniques Used To Encrypt Data
The Caesar Cipher.
Vigenere cipher.
Rail Fence cipher.
Steganography.
![Page 11: secued cloud](https://reader036.vdocument.in/reader036/viewer/2022070518/58ec11d01a28ab53368b46b1/html5/thumbnails/11.jpg)
How To Encrypt file1. Choose the File that you want
to Encrypt .
![Page 12: secued cloud](https://reader036.vdocument.in/reader036/viewer/2022070518/58ec11d01a28ab53368b46b1/html5/thumbnails/12.jpg)
Conti….2. choose any one algorithm .
![Page 13: secued cloud](https://reader036.vdocument.in/reader036/viewer/2022070518/58ec11d01a28ab53368b46b1/html5/thumbnails/13.jpg)
Conti…3. choose format of Encryption.
![Page 14: secued cloud](https://reader036.vdocument.in/reader036/viewer/2022070518/58ec11d01a28ab53368b46b1/html5/thumbnails/14.jpg)
Conti..4. Click on Encrypt.
![Page 15: secued cloud](https://reader036.vdocument.in/reader036/viewer/2022070518/58ec11d01a28ab53368b46b1/html5/thumbnails/15.jpg)
Conti..5. After Encryption , Output.
![Page 16: secued cloud](https://reader036.vdocument.in/reader036/viewer/2022070518/58ec11d01a28ab53368b46b1/html5/thumbnails/16.jpg)
Limitation..
Secure Cloud Agent.
Operating System.
Volume Encryption.
Boot Volume Encryption.
![Page 17: secued cloud](https://reader036.vdocument.in/reader036/viewer/2022070518/58ec11d01a28ab53368b46b1/html5/thumbnails/17.jpg)
Conclusion..Thus We are Understand the concept of
cloud security and its encryption technique . We also see that how to encrypt our data before sending it on to cloud.
![Page 18: secued cloud](https://reader036.vdocument.in/reader036/viewer/2022070518/58ec11d01a28ab53368b46b1/html5/thumbnails/18.jpg)
References www.google.comwww.askmi.comwww.wikipedia.comhttp://
cgl.soic.indiana.edu/publications/ReportNarimanMirzaeiJan09.pdf
https://en.wikipedia.org/wiki/Cloud_computing
http://www.ibm.com/cloud-computing/what-is-cloud-computing.html