Introducing 

Prezi AI.

Your new presentation assistant.

Refine, enhance, and tailor your content, source relevant images, and edit visuals quicker than ever before.

Loading…
Transcript

OBJECTIVE: CRYPTO-CLOUD COMPUTING

REFRENCES:

HARDWARE AND SOFTWARE REQUIREMENT

HARDWARE REQUIREMENTS

1. www.wikipedia.org

2. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.187.4609&rep=rep1&type=pdf

3. www.webopedia.com/TERM/C/cloud_computing.html‎

4. http://www.asp.net/

5. http://www.ijarcsse.com/docs/papers/Volume_3/3_March2013/V3I3-0236.pdfv

SOFTWARE REQUIREMENTS:

Processor : Any Pentium IV or Equivalent Machine

RAM : 512 MB

HDD : 40 GB

FDD : 1.44 MB

CD-ROM : 52X

15 inches Color Monitor1

104 Keys Keyboards

Printer : DeskJet 670 C

Operating System : Windows 2000/XP

Front End : Visual Studio 2008

Database : SQL SERVER 2000/2005

project scope

THANKYOU

INTENDED AUDIENCE:

  • Study on Cloud Computing, its Security issues.
  • Study and Research will be done on a few latest Cryptography Algorithms .
  • Comparison after implementation of selected Algorithms and thus finding the Best way for effective and efficient Security of Cloud.
  • work on security of data send between the users in a LAN.

CRYPTOGRAPHY

  • practice and study of techniques for secure communication in the presence of third parties
  • includes Encryption, i.e. process of converting ordinary information (plaintext) into unintelligible text (cipher text) and Decryption, i.e. opposite of Encryption.

CRYPTOSYSTEM SERVICES

  • Confidentiality
  •  Integrity
  •  Authenticity
  •  Nonrepudiation
  •  Access Control

CRYPTOGRAPHIC METHODS

  • Symmetric

 Same key for encryption and decryption

 Key distribution problem

  •  Asymmetric

 Mathematically related key pairs for encryption and decryption

 Public and private keys

  • Hybrid

 Combines strengths of both methods

WHAT IS CLOUD COMPUTING?

SOME CRYPTOGRAPHY ALGORITHMS:

Cloud computing is an emerging computing technology that uses the internet and central remote servers to maintain data and applications.

INTRODUCTION TO PROJECT

Advantages and Disadvantages of cloud storage

Disadvantages:

Advantages:

Major Problem : Security Issues

  • Security data at rest
  • Cloud Legal and Regulatory Issues
  • Open Environment
  • attractive thing for hackers
  • can't rely on third party while transmitting sensitive data.
  • various risks and issues are identified regarding Privacy.

I) ubiquitous access: anywhere, anyhow, anytime access to your data

ii) easy and simple

iii) resilience

iv) scalability

v) cost efficiency

  • cloud data security is the most worrying issue of cloud technology.
  • This Project will aim at combining Cryptography with cloud computing in an innovative way so as to improve the security of the whole system.
  • The project will involve study of various issues associated with Security.
  • Research will focus mainly on the data security and methods of providing security by data encryption in more efficient as well as effective and Secure way.

Cloud Service acronyms

  • Infrastructure as a Service (IaaS) .
  • Platform as a Service (Paas).
  • Software as a service (SaaS). 
  • Monitoring as a Service (MaaS).
  • Communication as a Service (CaaS).
  • Anything as a service (XaaS).

Research will be focused on MaaS , CaaS , Xaas.

CRYPTOGRAPHY

IN

CLOUD COMPUTING

Learn more about creating dynamic, engaging presentations with Prezi