SlideShare a Scribd company logo
1 of 19
Digital Spectacles byDigital Spectacles by
usingusing
cloud Computing.cloud Computing.
Third Year Of Computer EngineeringThird Year Of Computer Engineering..
Imperial college of engineering and Research, Wagholi, Nagar Road. ,Pune-421207.Imperial college of engineering and Research, Wagholi, Nagar Road. ,Pune-421207.
Submitted by...Submitted by...
Mr. Mandar pathrikar.Mr. Mandar pathrikar.
Digital spectaclesDigital spectacles
 Digital spectacles is the newDigital spectacles is the new
invention in the science ,this isinvention in the science ,this is
beneficial for all cops.beneficial for all cops.
 A small camera fitted to theA small camera fitted to the
glasses can capture 400 facialglasses can capture 400 facial
images per second and sendimages per second and send
them to a central computerthem to a central computer
database storing up to 13database storing up to 13
million faces.million faces.
 The system can compareThe system can compare
biometric data at 46,000 pointsbiometric data at 46,000 points
on a face and will immediatelyon a face and will immediately
signal any matches to knownsignal any matches to known
criminals or people wanted bycriminals or people wanted by
Criminal Information
present at Different
location
Encryption of data
Cloud
Decryption of data
Mobile
What is Cloud ComputingWhat is Cloud Computing
 ““Cloud” is a collective term forCloud” is a collective term for
a large number of developmentsa large number of developments
and possibilities. It is not anand possibilities. It is not an
invention, but more of ainvention, but more of a
“practical innovation”.“practical innovation”.
 Dynamically scalable sharedDynamically scalable shared
resourcesresources
 accessed over a networkaccessed over a network
 Only pay for what you useOnly pay for what you use
 Shared internally or with otherShared internally or with other
customerscustomers
 Resources = Storage,Resources = Storage,
computing, services, etc.computing, services, etc.
 Internal network or InternetInternal network or Internet
5
ArchitectureArchitecture
Deployment ModelsDeployment Models
 ••PublicPublic
Cloud infrastructure isCloud infrastructure is available to the generalavailable to the general
publicpublic, owned by org selling cloud services, owned by org selling cloud services
 ••PrivatePrivate
Cloud infrastructureCloud infrastructure for single org onlyfor single org only, may be, may be
managed by the org or a 3managed by the org or a 3rdrd
party, on or offparty, on or off
premisepremise
How Can I Create personal CloudHow Can I Create personal Cloud
 Iomega Personal Cloud is a new technology that createsIomega Personal Cloud is a new technology that creates
your own Internet connected “cloud” network of Storyour own Internet connected “cloud” network of Stor
Center storage devices, personal computers andCenter storage devices, personal computers and
handheld mobile devices, which allows you to connect,handheld mobile devices, which allows you to connect,
share, copy and protect your files within your network.share, copy and protect your files within your network.
 Installing this software in our devices and connectingInstalling this software in our devices and connecting
through internet ,we can create our own cloud.through internet ,we can create our own cloud.
Working of cloud spectsWorking of cloud spects
Lumus LOE technologyLumus LOE technology
Lumus LOE technologyLumus LOE technology
 Lumus has developed a unique technology it calls Light-Lumus has developed a unique technology it calls Light-
guide Optical Element (LOE). The Lumus video-glassesguide Optical Element (LOE). The Lumus video-glasses
are connected either wired or wirelessly to a mediaare connected either wired or wirelessly to a media
source, such as a cell phone, which transfers the videosource, such as a cell phone, which transfers the video
image into a micro projector embedded in the temple ofimage into a micro projector embedded in the temple of
the eyeglasses.the eyeglasses.
 The image travels through the lens by way of TotalThe image travels through the lens by way of Total
Internal Reflection (TIR).Internal Reflection (TIR).
 TIR is an optical phenomenon that occurs when lightTIR is an optical phenomenon that occurs when light
strikes a medium boundary at a steep angle. If thestrikes a medium boundary at a steep angle. If the
refractive index is lower on the other side of therefractive index is lower on the other side of the
boundary, no light can pass through, effectively reflectingboundary, no light can pass through, effectively reflecting
all of the light.all of the light.
Head-Mounted display-:Head-Mounted display-:
((Sight of death)Sight of death)
 This Technology used in the Fighter planes for targetingThis Technology used in the Fighter planes for targeting
their targets.their targets.
 The idea of a pilot directing a missile to its target byThe idea of a pilot directing a missile to its target by
simply looking at it .simply looking at it .
 You want the image to be large, the device has to beYou want the image to be large, the device has to be
large; if you want the device to be small, the image willlarge; if you want the device to be small, the image will
be small.be small.
Security of CloudSecurity of Cloud
Security of cloudSecurity of cloud
 Security of cloud is the main feature of thisSecurity of cloud is the main feature of this
technology. Data which contain in the cloud istechnology. Data which contain in the cloud is
very precocious that's why we have to use it invery precocious that's why we have to use it in
encryption form.encryption form.
 ““Nessus vulnerability scannerNessus vulnerability scanner “ it is the“ it is the
technology which is used in the Multi nationaltechnology which is used in the Multi national
companies for sending data from one place tocompanies for sending data from one place to
another .Data is totally in encryption form soanother .Data is totally in encryption form so
that it is most secure in form.that it is most secure in form.
Nessus vulnerability scannerNessus vulnerability scanner
Nessus vulnerability scannerNessus vulnerability scanner
 This is the most secure technology which isThis is the most secure technology which is
mostly used in the Multinational companies formostly used in the Multinational companies for
sending data from one state to another .sending data from one state to another .
 Nessus scanner when send the data it is in theNessus scanner when send the data it is in the
encryption form so that it is difficult to predict ifencryption form so that it is difficult to predict if
any one try to do that then whole algorithmany one try to do that then whole algorithm
change within 5min. And data sending againchange within 5min. And data sending again
started.started.
Radar PageRadar Page
Radar PageRadar Page
 The Radar Page was designed and built to caterThe Radar Page was designed and built to cater
for the demands of Government and Militaryfor the demands of Government and Military
networks requiring near real time information onnetworks requiring near real time information on
new and emerging cyber threats.new and emerging cyber threats.
 The page auto updates every 20 minutes drawingThe page auto updates every 20 minutes drawing
information from multiple sources.information from multiple sources.
 If any threats or illegal access is found than theIf any threats or illegal access is found than the
scanner note down the IP Address and put itscanner note down the IP Address and put it
into list and appropriate action we can easilyinto list and appropriate action we can easily
take.take.
ConclusionConclusion
 Digital spectacles are the latest technology in case ofDigital spectacles are the latest technology in case of
security purpose. Many social problems we can sort usingsecurity purpose. Many social problems we can sort using
it.it.
 Many Disasters we can avoid by using this technology.Many Disasters we can avoid by using this technology.
 Cloud security is very up coming future technology.Cloud security is very up coming future technology.
 With the help of Cloud Security and digital spectacles weWith the help of Cloud Security and digital spectacles we
can stop Crimes in the society And Find out the Missingcan stop Crimes in the society And Find out the Missing
personal.personal.
 Increases business responsiveness.Increases business responsiveness.
 Uses IT resources efficiently via sharing and higher systemUses IT resources efficiently via sharing and higher system
utilization Cultivates skills for next generation workforce.utilization Cultivates skills for next generation workforce.
Digital Spectacles Using Cloud Computing for Security

More Related Content

What's hot

Honeypot and Steganography
Honeypot and SteganographyHoneypot and Steganography
Honeypot and SteganographyPreeti Yadav
 
fog computing ppt
fog computing ppt fog computing ppt
fog computing ppt sravya raju
 
Eplq efficient privacy preserving location-based query over outsourced encryp...
Eplq efficient privacy preserving location-based query over outsourced encryp...Eplq efficient privacy preserving location-based query over outsourced encryp...
Eplq efficient privacy preserving location-based query over outsourced encryp...LeMeniz Infotech
 
Eplq efficient privacy preserving location-based query over outsourced encryp...
Eplq efficient privacy preserving location-based query over outsourced encryp...Eplq efficient privacy preserving location-based query over outsourced encryp...
Eplq efficient privacy preserving location-based query over outsourced encryp...LeMeniz Infotech
 
Honeypot-A Brief Overview
Honeypot-A Brief OverviewHoneypot-A Brief Overview
Honeypot-A Brief OverviewSILPI ROSAN
 
Security challenges for IoT
Security challenges for IoTSecurity challenges for IoT
Security challenges for IoTWSO2
 
Smau Bologna 2013 Stefano Zanero
Smau Bologna 2013 Stefano ZaneroSmau Bologna 2013 Stefano Zanero
Smau Bologna 2013 Stefano ZaneroSMAU
 
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Ravindra Dastikop
 
Privacy and security in IoT
Privacy and security in IoTPrivacy and security in IoT
Privacy and security in IoTVasco Veloso
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesPierluigi Paganini
 
Practical IoT Security in the Enterprise
Practical IoT Security in the EnterprisePractical IoT Security in the Enterprise
Practical IoT Security in the EnterpriseDaniel Miessler
 
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FIIMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FIIJNSA Journal
 
IRJET- Securing IP Surveillance Cameras using Adaptive Security Appliance...
IRJET-  	  Securing IP Surveillance Cameras using Adaptive Security Appliance...IRJET-  	  Securing IP Surveillance Cameras using Adaptive Security Appliance...
IRJET- Securing IP Surveillance Cameras using Adaptive Security Appliance...IRJET Journal
 
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoTIRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoTIRJET Journal
 
Security issues and solutions : IoT
Security issues and solutions : IoTSecurity issues and solutions : IoT
Security issues and solutions : IoTJinia Bhowmik
 
Seminar Report on Honeypot
Seminar Report on HoneypotSeminar Report on Honeypot
Seminar Report on HoneypotAmit Poonia
 

What's hot (20)

Resource Guid
Resource GuidResource Guid
Resource Guid
 
Honeypot and Steganography
Honeypot and SteganographyHoneypot and Steganography
Honeypot and Steganography
 
fog computing ppt
fog computing ppt fog computing ppt
fog computing ppt
 
Eplq efficient privacy preserving location-based query over outsourced encryp...
Eplq efficient privacy preserving location-based query over outsourced encryp...Eplq efficient privacy preserving location-based query over outsourced encryp...
Eplq efficient privacy preserving location-based query over outsourced encryp...
 
35 38
35 3835 38
35 38
 
Eplq efficient privacy preserving location-based query over outsourced encryp...
Eplq efficient privacy preserving location-based query over outsourced encryp...Eplq efficient privacy preserving location-based query over outsourced encryp...
Eplq efficient privacy preserving location-based query over outsourced encryp...
 
Honeypot-A Brief Overview
Honeypot-A Brief OverviewHoneypot-A Brief Overview
Honeypot-A Brief Overview
 
Security challenges for IoT
Security challenges for IoTSecurity challenges for IoT
Security challenges for IoT
 
Smau Bologna 2013 Stefano Zanero
Smau Bologna 2013 Stefano ZaneroSmau Bologna 2013 Stefano Zanero
Smau Bologna 2013 Stefano Zanero
 
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough?
 
Privacy and security in IoT
Privacy and security in IoTPrivacy and security in IoT
Privacy and security in IoT
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issues
 
Practical IoT Security in the Enterprise
Practical IoT Security in the EnterprisePractical IoT Security in the Enterprise
Practical IoT Security in the Enterprise
 
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FIIMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
 
IRJET- Securing IP Surveillance Cameras using Adaptive Security Appliance...
IRJET-  	  Securing IP Surveillance Cameras using Adaptive Security Appliance...IRJET-  	  Securing IP Surveillance Cameras using Adaptive Security Appliance...
IRJET- Securing IP Surveillance Cameras using Adaptive Security Appliance...
 
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoTIRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
 
Security issues and solutions : IoT
Security issues and solutions : IoTSecurity issues and solutions : IoT
Security issues and solutions : IoT
 
Honeypots (Ravindra Singh Rathore)
Honeypots (Ravindra Singh Rathore)Honeypots (Ravindra Singh Rathore)
Honeypots (Ravindra Singh Rathore)
 
Seminar Report on Honeypot
Seminar Report on HoneypotSeminar Report on Honeypot
Seminar Report on Honeypot
 
Honeypot ss
Honeypot ssHoneypot ss
Honeypot ss
 

Viewers also liked

Microsoft hololens final ppt
Microsoft hololens final pptMicrosoft hololens final ppt
Microsoft hololens final pptrekhameenacs
 
Calgary azure dev camp - Service Bus
Calgary azure dev camp - Service BusCalgary azure dev camp - Service Bus
Calgary azure dev camp - Service Buswearsy
 
Service Oriented Architecture and Business Process Modeling Overview
Service Oriented Architecture and Business Process Modeling OverviewService Oriented Architecture and Business Process Modeling Overview
Service Oriented Architecture and Business Process Modeling OverviewJean Ferguson
 
Intro To webOS
Intro To webOSIntro To webOS
Intro To webOSfpatton
 
Web Operating System Overview
Web Operating System OverviewWeb Operating System Overview
Web Operating System OverviewMadhu Bala
 
4 Essential Lessons for Adopting Predictive Analytics in Healthcare
4 Essential Lessons for Adopting Predictive Analytics in Healthcare4 Essential Lessons for Adopting Predictive Analytics in Healthcare
4 Essential Lessons for Adopting Predictive Analytics in HealthcareHealth Catalyst
 
Raspberry pi : an introduction
Raspberry pi : an introductionRaspberry pi : an introduction
Raspberry pi : an introductionLTG Oxford
 
Service Oriented Architecture
Service Oriented ArchitectureService Oriented Architecture
Service Oriented ArchitectureRobert Sim
 
Predictive Analytics - An Overview
Predictive Analytics - An OverviewPredictive Analytics - An Overview
Predictive Analytics - An OverviewMachinePulse
 
Data Mining in Healthcare: How Health Systems Can Improve Quality and Reduce...
Data Mining in Healthcare:  How Health Systems Can Improve Quality and Reduce...Data Mining in Healthcare:  How Health Systems Can Improve Quality and Reduce...
Data Mining in Healthcare: How Health Systems Can Improve Quality and Reduce...Health Catalyst
 
Microsoft Azure a cloud computing platform
Microsoft Azure a cloud computing platformMicrosoft Azure a cloud computing platform
Microsoft Azure a cloud computing platformAayush Mohanka
 
Seminar Presentation Hadoop
Seminar Presentation HadoopSeminar Presentation Hadoop
Seminar Presentation HadoopVarun Narang
 
Microsoft Cloud Computing - Windows Azure Platform
Microsoft Cloud Computing - Windows Azure PlatformMicrosoft Cloud Computing - Windows Azure Platform
Microsoft Cloud Computing - Windows Azure PlatformDavid Chou
 
Hadoop introduction , Why and What is Hadoop ?
Hadoop introduction , Why and What is  Hadoop ?Hadoop introduction , Why and What is  Hadoop ?
Hadoop introduction , Why and What is Hadoop ?sudhakara st
 

Viewers also liked (19)

Microsoft hololens final ppt
Microsoft hololens final pptMicrosoft hololens final ppt
Microsoft hololens final ppt
 
Calgary azure dev camp - Service Bus
Calgary azure dev camp - Service BusCalgary azure dev camp - Service Bus
Calgary azure dev camp - Service Bus
 
Service Oriented Architecture and Business Process Modeling Overview
Service Oriented Architecture and Business Process Modeling OverviewService Oriented Architecture and Business Process Modeling Overview
Service Oriented Architecture and Business Process Modeling Overview
 
Intro To webOS
Intro To webOSIntro To webOS
Intro To webOS
 
Web Operating System Overview
Web Operating System OverviewWeb Operating System Overview
Web Operating System Overview
 
Windows Azure Platform Overview
Windows Azure Platform OverviewWindows Azure Platform Overview
Windows Azure Platform Overview
 
4 Essential Lessons for Adopting Predictive Analytics in Healthcare
4 Essential Lessons for Adopting Predictive Analytics in Healthcare4 Essential Lessons for Adopting Predictive Analytics in Healthcare
4 Essential Lessons for Adopting Predictive Analytics in Healthcare
 
Raspberry pi : an introduction
Raspberry pi : an introductionRaspberry pi : an introduction
Raspberry pi : an introduction
 
Service Oriented Architecture
Service Oriented ArchitectureService Oriented Architecture
Service Oriented Architecture
 
Predictive Analytics - An Overview
Predictive Analytics - An OverviewPredictive Analytics - An Overview
Predictive Analytics - An Overview
 
Raspberry pi
Raspberry pi Raspberry pi
Raspberry pi
 
Data Mining in Healthcare: How Health Systems Can Improve Quality and Reduce...
Data Mining in Healthcare:  How Health Systems Can Improve Quality and Reduce...Data Mining in Healthcare:  How Health Systems Can Improve Quality and Reduce...
Data Mining in Healthcare: How Health Systems Can Improve Quality and Reduce...
 
Barcode technology
Barcode technologyBarcode technology
Barcode technology
 
Microsoft Azure a cloud computing platform
Microsoft Azure a cloud computing platformMicrosoft Azure a cloud computing platform
Microsoft Azure a cloud computing platform
 
Seminar Presentation Hadoop
Seminar Presentation HadoopSeminar Presentation Hadoop
Seminar Presentation Hadoop
 
Microsoft Cloud Computing - Windows Azure Platform
Microsoft Cloud Computing - Windows Azure PlatformMicrosoft Cloud Computing - Windows Azure Platform
Microsoft Cloud Computing - Windows Azure Platform
 
Hadoop introduction , Why and What is Hadoop ?
Hadoop introduction , Why and What is  Hadoop ?Hadoop introduction , Why and What is  Hadoop ?
Hadoop introduction , Why and What is Hadoop ?
 
Big data and Hadoop
Big data and HadoopBig data and Hadoop
Big data and Hadoop
 
Big data ppt
Big  data pptBig  data ppt
Big data ppt
 

Similar to Digital Spectacles Using Cloud Computing for Security

The Role of Threat Intelligence and Layered Securiy for Intrusion Prevention ...
The Role of Threat Intelligence and Layered Securiy for Intrusion Prevention ...The Role of Threat Intelligence and Layered Securiy for Intrusion Prevention ...
The Role of Threat Intelligence and Layered Securiy for Intrusion Prevention ...JoAnna Cheshire
 
BriefingsDirect Transcript--How security leverages virtualization to counter ...
BriefingsDirect Transcript--How security leverages virtualization to counter ...BriefingsDirect Transcript--How security leverages virtualization to counter ...
BriefingsDirect Transcript--How security leverages virtualization to counter ...Dana Gardner
 
Cloud Based intrusion Detection System
Cloud Based intrusion Detection SystemCloud Based intrusion Detection System
Cloud Based intrusion Detection SystemIJMTST Journal
 
Avoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha SeltzerAvoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha SeltzerProduct of Things
 
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptxDomain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptxInfosectrain3
 
Internet of things (IoT) Architecture Security Analysis
Internet of things (IoT) Architecture Security AnalysisInternet of things (IoT) Architecture Security Analysis
Internet of things (IoT) Architecture Security AnalysisDaksh Raj Chopra
 
Car Security System #CSALS
Car Security System #CSALSCar Security System #CSALS
Car Security System #CSALSAlex Vishwa
 
Mobile Day - App (In)security
Mobile Day - App (In)securityMobile Day - App (In)security
Mobile Day - App (In)securitySoftware Guru
 
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...North Texas Chapter of the ISSA
 
Crypto Vision Bot Using RSA Algorithm
Crypto Vision Bot Using RSA AlgorithmCrypto Vision Bot Using RSA Algorithm
Crypto Vision Bot Using RSA AlgorithmIRJET Journal
 
Sixth Sense Technology
Sixth Sense TechnologySixth Sense Technology
Sixth Sense TechnologyIRJET Journal
 
Massive Data Collection
Massive Data CollectionMassive Data Collection
Massive Data CollectionLeandro Agro'
 
Fog computing
Fog computingFog computing
Fog computingAnkit_ap
 
Ingrid Moerman, iMinds - UGent, iMinds The Conference 2013
Ingrid Moerman, iMinds - UGent, iMinds The Conference 2013Ingrid Moerman, iMinds - UGent, iMinds The Conference 2013
Ingrid Moerman, iMinds - UGent, iMinds The Conference 2013imec
 
Sw assignment week12
Sw assignment week12Sw assignment week12
Sw assignment week12you-ly05
 
OmniSpotlight 05-2014
OmniSpotlight 05-2014OmniSpotlight 05-2014
OmniSpotlight 05-2014Anita Lösch
 
Rajarshi Gupta at AI Frontiers : Security is AI’s biggest challenge, AI is Se...
Rajarshi Gupta at AI Frontiers : Security is AI’s biggest challenge, AI is Se...Rajarshi Gupta at AI Frontiers : Security is AI’s biggest challenge, AI is Se...
Rajarshi Gupta at AI Frontiers : Security is AI’s biggest challenge, AI is Se...AI Frontiers
 

Similar to Digital Spectacles Using Cloud Computing for Security (20)

The Role of Threat Intelligence and Layered Securiy for Intrusion Prevention ...
The Role of Threat Intelligence and Layered Securiy for Intrusion Prevention ...The Role of Threat Intelligence and Layered Securiy for Intrusion Prevention ...
The Role of Threat Intelligence and Layered Securiy for Intrusion Prevention ...
 
Cyber ppt
Cyber pptCyber ppt
Cyber ppt
 
BriefingsDirect Transcript--How security leverages virtualization to counter ...
BriefingsDirect Transcript--How security leverages virtualization to counter ...BriefingsDirect Transcript--How security leverages virtualization to counter ...
BriefingsDirect Transcript--How security leverages virtualization to counter ...
 
Cloud Based intrusion Detection System
Cloud Based intrusion Detection SystemCloud Based intrusion Detection System
Cloud Based intrusion Detection System
 
Avoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha SeltzerAvoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha Seltzer
 
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptxDomain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
 
Internet of things (IoT) Architecture Security Analysis
Internet of things (IoT) Architecture Security AnalysisInternet of things (IoT) Architecture Security Analysis
Internet of things (IoT) Architecture Security Analysis
 
Car Security System #CSALS
Car Security System #CSALSCar Security System #CSALS
Car Security System #CSALS
 
Mobile Day - App (In)security
Mobile Day - App (In)securityMobile Day - App (In)security
Mobile Day - App (In)security
 
Meletis Belsis -CSIRTs
Meletis Belsis -CSIRTsMeletis Belsis -CSIRTs
Meletis Belsis -CSIRTs
 
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
 
Crypto Vision Bot Using RSA Algorithm
Crypto Vision Bot Using RSA AlgorithmCrypto Vision Bot Using RSA Algorithm
Crypto Vision Bot Using RSA Algorithm
 
Sixth Sense Technology
Sixth Sense TechnologySixth Sense Technology
Sixth Sense Technology
 
Leandro Agrò
Leandro AgròLeandro Agrò
Leandro Agrò
 
Massive Data Collection
Massive Data CollectionMassive Data Collection
Massive Data Collection
 
Fog computing
Fog computingFog computing
Fog computing
 
Ingrid Moerman, iMinds - UGent, iMinds The Conference 2013
Ingrid Moerman, iMinds - UGent, iMinds The Conference 2013Ingrid Moerman, iMinds - UGent, iMinds The Conference 2013
Ingrid Moerman, iMinds - UGent, iMinds The Conference 2013
 
Sw assignment week12
Sw assignment week12Sw assignment week12
Sw assignment week12
 
OmniSpotlight 05-2014
OmniSpotlight 05-2014OmniSpotlight 05-2014
OmniSpotlight 05-2014
 
Rajarshi Gupta at AI Frontiers : Security is AI’s biggest challenge, AI is Se...
Rajarshi Gupta at AI Frontiers : Security is AI’s biggest challenge, AI is Se...Rajarshi Gupta at AI Frontiers : Security is AI’s biggest challenge, AI is Se...
Rajarshi Gupta at AI Frontiers : Security is AI’s biggest challenge, AI is Se...
 

More from Mandar Pathrikar

Service oriented cloud computing
Service oriented cloud computingService oriented cloud computing
Service oriented cloud computingMandar Pathrikar
 
Service oriented cloud computing
Service oriented cloud computingService oriented cloud computing
Service oriented cloud computingMandar Pathrikar
 
Smart security system for sensitive area by using image processing
Smart security system for sensitive area by using   image processingSmart security system for sensitive area by using   image processing
Smart security system for sensitive area by using image processingMandar Pathrikar
 
Enhancement in Laser Tchnology
Enhancement in Laser TchnologyEnhancement in Laser Tchnology
Enhancement in Laser TchnologyMandar Pathrikar
 

More from Mandar Pathrikar (6)

Service oriented cloud computing
Service oriented cloud computingService oriented cloud computing
Service oriented cloud computing
 
Mission mumbai
Mission mumbaiMission mumbai
Mission mumbai
 
Service oriented cloud computing
Service oriented cloud computingService oriented cloud computing
Service oriented cloud computing
 
Smart security system for sensitive area by using image processing
Smart security system for sensitive area by using   image processingSmart security system for sensitive area by using   image processing
Smart security system for sensitive area by using image processing
 
Enhancement in Laser Tchnology
Enhancement in Laser TchnologyEnhancement in Laser Tchnology
Enhancement in Laser Tchnology
 
New world of Wireless
New world of WirelessNew world of Wireless
New world of Wireless
 

Recently uploaded

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 

Recently uploaded (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

Digital Spectacles Using Cloud Computing for Security

  • 1. Digital Spectacles byDigital Spectacles by usingusing cloud Computing.cloud Computing. Third Year Of Computer EngineeringThird Year Of Computer Engineering.. Imperial college of engineering and Research, Wagholi, Nagar Road. ,Pune-421207.Imperial college of engineering and Research, Wagholi, Nagar Road. ,Pune-421207. Submitted by...Submitted by... Mr. Mandar pathrikar.Mr. Mandar pathrikar.
  • 2. Digital spectaclesDigital spectacles  Digital spectacles is the newDigital spectacles is the new invention in the science ,this isinvention in the science ,this is beneficial for all cops.beneficial for all cops.  A small camera fitted to theA small camera fitted to the glasses can capture 400 facialglasses can capture 400 facial images per second and sendimages per second and send them to a central computerthem to a central computer database storing up to 13database storing up to 13 million faces.million faces.  The system can compareThe system can compare biometric data at 46,000 pointsbiometric data at 46,000 points on a face and will immediatelyon a face and will immediately signal any matches to knownsignal any matches to known criminals or people wanted bycriminals or people wanted by
  • 3. Criminal Information present at Different location Encryption of data Cloud Decryption of data Mobile
  • 4. What is Cloud ComputingWhat is Cloud Computing  ““Cloud” is a collective term forCloud” is a collective term for a large number of developmentsa large number of developments and possibilities. It is not anand possibilities. It is not an invention, but more of ainvention, but more of a “practical innovation”.“practical innovation”.  Dynamically scalable sharedDynamically scalable shared resourcesresources  accessed over a networkaccessed over a network  Only pay for what you useOnly pay for what you use  Shared internally or with otherShared internally or with other customerscustomers  Resources = Storage,Resources = Storage, computing, services, etc.computing, services, etc.  Internal network or InternetInternal network or Internet
  • 6. Deployment ModelsDeployment Models  ••PublicPublic Cloud infrastructure isCloud infrastructure is available to the generalavailable to the general publicpublic, owned by org selling cloud services, owned by org selling cloud services  ••PrivatePrivate Cloud infrastructureCloud infrastructure for single org onlyfor single org only, may be, may be managed by the org or a 3managed by the org or a 3rdrd party, on or offparty, on or off premisepremise
  • 7. How Can I Create personal CloudHow Can I Create personal Cloud  Iomega Personal Cloud is a new technology that createsIomega Personal Cloud is a new technology that creates your own Internet connected “cloud” network of Storyour own Internet connected “cloud” network of Stor Center storage devices, personal computers andCenter storage devices, personal computers and handheld mobile devices, which allows you to connect,handheld mobile devices, which allows you to connect, share, copy and protect your files within your network.share, copy and protect your files within your network.  Installing this software in our devices and connectingInstalling this software in our devices and connecting through internet ,we can create our own cloud.through internet ,we can create our own cloud.
  • 8. Working of cloud spectsWorking of cloud spects
  • 9. Lumus LOE technologyLumus LOE technology
  • 10. Lumus LOE technologyLumus LOE technology  Lumus has developed a unique technology it calls Light-Lumus has developed a unique technology it calls Light- guide Optical Element (LOE). The Lumus video-glassesguide Optical Element (LOE). The Lumus video-glasses are connected either wired or wirelessly to a mediaare connected either wired or wirelessly to a media source, such as a cell phone, which transfers the videosource, such as a cell phone, which transfers the video image into a micro projector embedded in the temple ofimage into a micro projector embedded in the temple of the eyeglasses.the eyeglasses.  The image travels through the lens by way of TotalThe image travels through the lens by way of Total Internal Reflection (TIR).Internal Reflection (TIR).  TIR is an optical phenomenon that occurs when lightTIR is an optical phenomenon that occurs when light strikes a medium boundary at a steep angle. If thestrikes a medium boundary at a steep angle. If the refractive index is lower on the other side of therefractive index is lower on the other side of the boundary, no light can pass through, effectively reflectingboundary, no light can pass through, effectively reflecting all of the light.all of the light.
  • 11. Head-Mounted display-:Head-Mounted display-: ((Sight of death)Sight of death)  This Technology used in the Fighter planes for targetingThis Technology used in the Fighter planes for targeting their targets.their targets.  The idea of a pilot directing a missile to its target byThe idea of a pilot directing a missile to its target by simply looking at it .simply looking at it .  You want the image to be large, the device has to beYou want the image to be large, the device has to be large; if you want the device to be small, the image willlarge; if you want the device to be small, the image will be small.be small.
  • 13. Security of cloudSecurity of cloud  Security of cloud is the main feature of thisSecurity of cloud is the main feature of this technology. Data which contain in the cloud istechnology. Data which contain in the cloud is very precocious that's why we have to use it invery precocious that's why we have to use it in encryption form.encryption form.  ““Nessus vulnerability scannerNessus vulnerability scanner “ it is the“ it is the technology which is used in the Multi nationaltechnology which is used in the Multi national companies for sending data from one place tocompanies for sending data from one place to another .Data is totally in encryption form soanother .Data is totally in encryption form so that it is most secure in form.that it is most secure in form.
  • 14. Nessus vulnerability scannerNessus vulnerability scanner
  • 15. Nessus vulnerability scannerNessus vulnerability scanner  This is the most secure technology which isThis is the most secure technology which is mostly used in the Multinational companies formostly used in the Multinational companies for sending data from one state to another .sending data from one state to another .  Nessus scanner when send the data it is in theNessus scanner when send the data it is in the encryption form so that it is difficult to predict ifencryption form so that it is difficult to predict if any one try to do that then whole algorithmany one try to do that then whole algorithm change within 5min. And data sending againchange within 5min. And data sending again started.started.
  • 17. Radar PageRadar Page  The Radar Page was designed and built to caterThe Radar Page was designed and built to cater for the demands of Government and Militaryfor the demands of Government and Military networks requiring near real time information onnetworks requiring near real time information on new and emerging cyber threats.new and emerging cyber threats.  The page auto updates every 20 minutes drawingThe page auto updates every 20 minutes drawing information from multiple sources.information from multiple sources.  If any threats or illegal access is found than theIf any threats or illegal access is found than the scanner note down the IP Address and put itscanner note down the IP Address and put it into list and appropriate action we can easilyinto list and appropriate action we can easily take.take.
  • 18. ConclusionConclusion  Digital spectacles are the latest technology in case ofDigital spectacles are the latest technology in case of security purpose. Many social problems we can sort usingsecurity purpose. Many social problems we can sort using it.it.  Many Disasters we can avoid by using this technology.Many Disasters we can avoid by using this technology.  Cloud security is very up coming future technology.Cloud security is very up coming future technology.  With the help of Cloud Security and digital spectacles weWith the help of Cloud Security and digital spectacles we can stop Crimes in the society And Find out the Missingcan stop Crimes in the society And Find out the Missing personal.personal.  Increases business responsiveness.Increases business responsiveness.  Uses IT resources efficiently via sharing and higher systemUses IT resources efficiently via sharing and higher system utilization Cultivates skills for next generation workforce.utilization Cultivates skills for next generation workforce.