OBJECTIVE: CRYPTO-CLOUD COMPUTING
REFRENCES:
HARDWARE AND SOFTWARE REQUIREMENT
HARDWARE REQUIREMENTS
1. www.wikipedia.org
2. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.187.4609&rep=rep1&type=pdf
3. www.webopedia.com/TERM/C/cloud_computing.html
4. http://www.asp.net/
5. http://www.ijarcsse.com/docs/papers/Volume_3/3_March2013/V3I3-0236.pdfv
SOFTWARE REQUIREMENTS:
Processor : Any Pentium IV or Equivalent Machine
RAM : 512 MB
HDD : 40 GB
FDD : 1.44 MB
CD-ROM : 52X
15 inches Color Monitor1
104 Keys Keyboards
Printer : DeskJet 670 C
Operating System : Windows 2000/XP
Front End : Visual Studio 2008
Database : SQL SERVER 2000/2005
project scope
THANKYOU
INTENDED AUDIENCE:
- Study on Cloud Computing, its Security issues.
- Study and Research will be done on a few latest Cryptography Algorithms .
- Comparison after implementation of selected Algorithms and thus finding the Best way for effective and efficient Security of Cloud.
- work on security of data send between the users in a LAN.
CRYPTOGRAPHY
- practice and study of techniques for secure communication in the presence of third parties
- includes Encryption, i.e. process of converting ordinary information (plaintext) into unintelligible text (cipher text) and Decryption, i.e. opposite of Encryption.
CRYPTOSYSTEM SERVICES
- Confidentiality
- Integrity
- Authenticity
- Nonrepudiation
- Access Control
CRYPTOGRAPHIC METHODS
Same key for encryption and decryption
Key distribution problem
Mathematically related key pairs for encryption and decryption
Public and private keys
Combines strengths of both methods
WHAT IS CLOUD COMPUTING?
SOME CRYPTOGRAPHY ALGORITHMS:
Cloud computing is an emerging computing technology that uses the internet and central remote servers to maintain data and applications.
INTRODUCTION TO PROJECT
Advantages and Disadvantages of cloud storage
Disadvantages:
Advantages:
Major Problem : Security Issues
- Security data at rest
- Cloud Legal and Regulatory Issues
- Open Environment
- attractive thing for hackers
- can't rely on third party while transmitting sensitive data.
- various risks and issues are identified regarding Privacy.
I) ubiquitous access: anywhere, anyhow, anytime access to your data
ii) easy and simple
iii) resilience
iv) scalability
v) cost efficiency
- cloud data security is the most worrying issue of cloud technology.
- This Project will aim at combining Cryptography with cloud computing in an innovative way so as to improve the security of the whole system.
- The project will involve study of various issues associated with Security.
- Research will focus mainly on the data security and methods of providing security by data encryption in more efficient as well as effective and Secure way.
Cloud Service acronyms
- Infrastructure as a Service (IaaS) .
- Platform as a Service (Paas).
- Software as a service (SaaS).
- Monitoring as a Service (MaaS).
- Communication as a Service (CaaS).
- Anything as a service (XaaS).
Research will be focused on MaaS , CaaS , Xaas.
CRYPTOGRAPHY
IN
CLOUD COMPUTING