SlideShare ist ein Scribd-Unternehmen logo
1 von 10
SCUDE
Name: AmaliGlorya
E-mail: zianacorps18@gmail.com
University: Pondicherry
Year/Semester: III year/ VI
Branch: Information Technology
Introduction
o Social media has provided businesses with new ways to
reach and interact with customers, while mobile
technologies have changed the way people
communicate, shop and work. Analytics allow
businesses to understand how, when and where people
consume certain goods and services and cloud
computing provides a new way to access technology
and the data a business needs to quickly respond to
changing markets and solve business problems .One of
the most emerging technology is cloud computing.
Many Multinational Companies started to move on to
the cloud. Unfortunately the big threat that scares all is
DATA INSECURITY in cloud. Data breach and data loss is
the popular problems faced by cloud technology.
 To resolve this problem our project is trying to give a solution
by using a technology called DYNAMIC ENCRYPTION. With
this we can prevent the hackers in decrypting the data
present in the cloud. In this document we tried to
overcome the security issue faced by cloud during file
transfer. Despite of vast researches made to overcome
these issues, there is no perfect solution till determined. We
took this as a problem and proposed a simple solution to
overcome the issues through DYNAMIC ENCRYPTION
algorithms. Here we use two algorithms namely:
1. AES(Advanced Encryption
Standard)
2. RSA(Rivest Shamir Adleman)
Problem definition
 The topic SCUDE briefly explains Storing and transferring
data in Cloud securely Using Dynamic Encryption. The
encrypted data in cloud server is again dynamically
encrypted with respect to time.
 Symmetric key algorithms are used to encrypt the data
which rest on cloud, while transferring the data
asymmetric key algorithms are used.
Trends
 Cloud computing has experienced exponential growth
over the last few years . The latest trends are listed
below .
 Hybrid clouds
 BYOD
 Platform-as-a-Service (PaaS)
 Big data analytics
 Graphics as a service
 Identity management and protection
 Web-powered apps
 The two trends that has an impact in next five years are
identity management and protection and web-
powered apps . Security has always been a major
concern with cloud computing. As more businesses
move more information and data into cloud servers, this
concern is more important than ever. It is anticipated
that over the next year, there will be identity
management solutions based on new cloud based
security paradigms. As efficiency and scalability are
among the primary benefits of cloud computing, then it
only makes sense to start developing cloud-based
applications that are compatible with multiple
platforms.
Solution
 With help of RSA algorithm the data is encrypted first in
client side and sent to the cloud server.
 Here the private key is held by user and public key is
held by cloud vendor.
 The encrypted data present in the cloud server is again
dynamically encrypted with respect to time.
 The user again decrypts the primary encrypted data
and gets the actual data.
Interest Areas
 My interest area in cloud computing technology is
cloud security .
 Cloud security is an evolving sub-domain of computer
security, network security, and, more broadly,
information security.
 It refers to a broad set of policies, technologies, and
controls deployed to protect data, applications, and
the associated infrastructure of cloud computing.
 Cloud computing security is the set of control-based
technologies and policies designed to adhere to
regulatory compliance rules and protect information,
data applications and infrastructure associated with
cloud computing use .
Impacts
 The main advantage is preventing hacking and
cracking of data from unauthorized source.
 Reliability and scalability can be improved.
 This algorithm provides high security with firewalls.
 Data breach and data loss is the major drawback in
the existing system which has been overcome in
SCUDE.
Thank you

Weitere ähnliche Inhalte

Was ist angesagt?

Fog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptFog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud ppt
priyanka reddy
 
FOG COMPUTING- Presentation
FOG COMPUTING- Presentation FOG COMPUTING- Presentation
FOG COMPUTING- Presentation
Anjana Shivangi
 

Was ist angesagt? (19)

2014-11-19 fog computing expo
2014-11-19 fog computing expo2014-11-19 fog computing expo
2014-11-19 fog computing expo
 
Fog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptFog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud ppt
 
Fog computing : The new age Technology
Fog computing : The new age TechnologyFog computing : The new age Technology
Fog computing : The new age Technology
 
Analysis of classical encryption techniques in cloud computing
Analysis of classical encryption techniques in cloud computingAnalysis of classical encryption techniques in cloud computing
Analysis of classical encryption techniques in cloud computing
 
FOG COMPUTING
FOG COMPUTINGFOG COMPUTING
FOG COMPUTING
 
Seminar ppt fog comp
Seminar ppt fog compSeminar ppt fog comp
Seminar ppt fog comp
 
Security and Privacy in Cloud Computing - a High-level view
Security and Privacy in Cloud Computing - a High-level viewSecurity and Privacy in Cloud Computing - a High-level view
Security and Privacy in Cloud Computing - a High-level view
 
Fog computing document
Fog computing documentFog computing document
Fog computing document
 
Review of implementing fog computing
Review of implementing fog computingReview of implementing fog computing
Review of implementing fog computing
 
Fog computing ( foggy cloud)
Fog computing  ( foggy cloud)Fog computing  ( foggy cloud)
Fog computing ( foggy cloud)
 
Privacy and security in the cloud Challenges and solutions for our future inf...
Privacy and security in the cloud Challenges and solutions for our future inf...Privacy and security in the cloud Challenges and solutions for our future inf...
Privacy and security in the cloud Challenges and solutions for our future inf...
 
Fog computing
Fog computingFog computing
Fog computing
 
Research proposal on Computing Security and Reliability - Phdassistance.com
Research proposal on Computing Security and Reliability - Phdassistance.comResearch proposal on Computing Security and Reliability - Phdassistance.com
Research proposal on Computing Security and Reliability - Phdassistance.com
 
Fog Computing and Cloud Computing
Fog Computing and Cloud ComputingFog Computing and Cloud Computing
Fog Computing and Cloud Computing
 
FOG COMPUTING- Presentation
FOG COMPUTING- Presentation FOG COMPUTING- Presentation
FOG COMPUTING- Presentation
 
Michael Enescu - Cloud + IoT at IEEE
Michael Enescu - Cloud + IoT at IEEEMichael Enescu - Cloud + IoT at IEEE
Michael Enescu - Cloud + IoT at IEEE
 
Cloud.ppt
Cloud.pptCloud.ppt
Cloud.ppt
 
Data security in cloud compu
Data security in cloud compuData security in cloud compu
Data security in cloud compu
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 

Andere mochten auch

Howard C. Williams good resume
Howard C. Williams good resumeHoward C. Williams good resume
Howard C. Williams good resume
Howard Williams
 
6.24.15
6.24.156.24.15
Sanjay_Saini-Resume
Sanjay_Saini-ResumeSanjay_Saini-Resume
Sanjay_Saini-Resume
Sanjay Saini
 
Biblioteca Escolar Valenzuela
Biblioteca Escolar ValenzuelaBiblioteca Escolar Valenzuela
Biblioteca Escolar Valenzuela
amalba
 
Efectos de las aflatoxinas
Efectos de las aflatoxinasEfectos de las aflatoxinas
Efectos de las aflatoxinas
ESPOL
 
Design and Simulation Triple-DES
Design and Simulation Triple-DESDesign and Simulation Triple-DES
Design and Simulation Triple-DES
chatsiri
 

Andere mochten auch (20)

Howard C. Williams good resume
Howard C. Williams good resumeHoward C. Williams good resume
Howard C. Williams good resume
 
Manos a la obra: Cómo dar grandes pasos en el marketing digital
Manos a la obra: Cómo dar grandes pasos en el marketing digitalManos a la obra: Cómo dar grandes pasos en el marketing digital
Manos a la obra: Cómo dar grandes pasos en el marketing digital
 
Teaching Software Engineering with Open Source Projects
Teaching Software Engineering with Open Source ProjectsTeaching Software Engineering with Open Source Projects
Teaching Software Engineering with Open Source Projects
 
Mobile messaging solutions for online gaming companies
Mobile messaging solutions for online gaming companiesMobile messaging solutions for online gaming companies
Mobile messaging solutions for online gaming companies
 
Educación Vial
Educación VialEducación Vial
Educación Vial
 
Twig Embody - the wearable 3G/GSM/GNSS personal alarm device
Twig Embody - the wearable 3G/GSM/GNSS personal alarm deviceTwig Embody - the wearable 3G/GSM/GNSS personal alarm device
Twig Embody - the wearable 3G/GSM/GNSS personal alarm device
 
Sesiones clinicas basadas en la evidencia 2014 - Sessió de Residents 2013-201...
Sesiones clinicas basadas en la evidencia 2014 - Sessió de Residents 2013-201...Sesiones clinicas basadas en la evidencia 2014 - Sessió de Residents 2013-201...
Sesiones clinicas basadas en la evidencia 2014 - Sessió de Residents 2013-201...
 
6.24.15
6.24.156.24.15
6.24.15
 
BottleGame Presentation
BottleGame PresentationBottleGame Presentation
BottleGame Presentation
 
Los retablos en sevilla 1
Los retablos en sevilla 1Los retablos en sevilla 1
Los retablos en sevilla 1
 
UM ICT Road Map
UM ICT Road MapUM ICT Road Map
UM ICT Road Map
 
Sanjay_Saini-Resume
Sanjay_Saini-ResumeSanjay_Saini-Resume
Sanjay_Saini-Resume
 
Richa Industries Ltd
Richa Industries LtdRicha Industries Ltd
Richa Industries Ltd
 
QualysGuard InfoDay 2012 - QualysGuard Suite 7.0
QualysGuard InfoDay 2012 - QualysGuard Suite 7.0QualysGuard InfoDay 2012 - QualysGuard Suite 7.0
QualysGuard InfoDay 2012 - QualysGuard Suite 7.0
 
Biblioteca Escolar Valenzuela
Biblioteca Escolar ValenzuelaBiblioteca Escolar Valenzuela
Biblioteca Escolar Valenzuela
 
Efectos de las aflatoxinas
Efectos de las aflatoxinasEfectos de las aflatoxinas
Efectos de las aflatoxinas
 
Design and Simulation Triple-DES
Design and Simulation Triple-DESDesign and Simulation Triple-DES
Design and Simulation Triple-DES
 
Primer método de coaching para traders a través de Jose Luis Cases Lozano
Primer método de coaching para traders a través de Jose Luis Cases LozanoPrimer método de coaching para traders a través de Jose Luis Cases Lozano
Primer método de coaching para traders a través de Jose Luis Cases Lozano
 
Anatomía cardiovascular por imagen
Anatomía cardiovascular por  imagenAnatomía cardiovascular por  imagen
Anatomía cardiovascular por imagen
 
GESTIÓN INTEGRADA DE LOS RECURSOS HÍDRICOS - LA GESTIÓN DE LOS ACUÍFEROS
GESTIÓN INTEGRADA DE LOS RECURSOS HÍDRICOS - LA GESTIÓN DE LOS ACUÍFEROSGESTIÓN INTEGRADA DE LOS RECURSOS HÍDRICOS - LA GESTIÓN DE LOS ACUÍFEROS
GESTIÓN INTEGRADA DE LOS RECURSOS HÍDRICOS - LA GESTIÓN DE LOS ACUÍFEROS
 

Ähnlich wie Encryption Algorithms for Cloud

Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409
Editor IJARCET
 

Ähnlich wie Encryption Algorithms for Cloud (20)

SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTINGSECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
 
Ad4502189193
Ad4502189193Ad4502189193
Ad4502189193
 
Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...
 
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar report
 
Kp3419221926
Kp3419221926Kp3419221926
Kp3419221926
 
Why Cloud Security Matters in Today's Business World
Why Cloud Security Matters in Today's Business WorldWhy Cloud Security Matters in Today's Business World
Why Cloud Security Matters in Today's Business World
 
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
 
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
 
B1802041217
B1802041217B1802041217
B1802041217
 
Security and privacy approach of cloud computing
Security and privacy approach of cloud computingSecurity and privacy approach of cloud computing
Security and privacy approach of cloud computing
 
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdfCloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
H017155360
H017155360H017155360
H017155360
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
Major Cloud Security Challenges concerning the Enterprises | Sysfore
Major Cloud Security Challenges concerning the Enterprises | SysforeMajor Cloud Security Challenges concerning the Enterprises | Sysfore
Major Cloud Security Challenges concerning the Enterprises | Sysfore
 
Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409
 
C017421624
C017421624C017421624
C017421624
 
How Deep Observability Powers Strong Cybersecurity and Network Insights Acros...
How Deep Observability Powers Strong Cybersecurity and Network Insights Acros...How Deep Observability Powers Strong Cybersecurity and Network Insights Acros...
How Deep Observability Powers Strong Cybersecurity and Network Insights Acros...
 

Mehr von Mphasis

Mehr von Mphasis (20)

SMAC
SMACSMAC
SMAC
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Automation
AutomationAutomation
Automation
 
IoT
IoTIoT
IoT
 
Home Automation System
Home Automation SystemHome Automation System
Home Automation System
 
IoT
IoTIoT
IoT
 
SMAC
SMACSMAC
SMAC
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Mphasis kushagra
Mphasis kushagraMphasis kushagra
Mphasis kushagra
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
SMAC
SMACSMAC
SMAC
 
Io t 22
Io t 22Io t 22
Io t 22
 
IoT
IoTIoT
IoT
 
IoT
IoTIoT
IoT
 
IoT
IoTIoT
IoT
 
IoT
IoTIoT
IoT
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
SMAC
SMACSMAC
SMAC
 
IoT
IoTIoT
IoT
 
Automation
AutomationAutomation
Automation
 

Kürzlich hochgeladen

introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
VishalKumarJha10
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
Health
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
mohitmore19
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
shinachiaurasa2
 

Kürzlich hochgeladen (20)

The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdf
 
ManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide DeckManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide Deck
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdfThe Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
Pharm-D Biostatistics and Research methodology
Pharm-D Biostatistics and Research methodologyPharm-D Biostatistics and Research methodology
Pharm-D Biostatistics and Research methodology
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
 

Encryption Algorithms for Cloud

  • 1. SCUDE Name: AmaliGlorya E-mail: zianacorps18@gmail.com University: Pondicherry Year/Semester: III year/ VI Branch: Information Technology
  • 2. Introduction o Social media has provided businesses with new ways to reach and interact with customers, while mobile technologies have changed the way people communicate, shop and work. Analytics allow businesses to understand how, when and where people consume certain goods and services and cloud computing provides a new way to access technology and the data a business needs to quickly respond to changing markets and solve business problems .One of the most emerging technology is cloud computing. Many Multinational Companies started to move on to the cloud. Unfortunately the big threat that scares all is DATA INSECURITY in cloud. Data breach and data loss is the popular problems faced by cloud technology.
  • 3.  To resolve this problem our project is trying to give a solution by using a technology called DYNAMIC ENCRYPTION. With this we can prevent the hackers in decrypting the data present in the cloud. In this document we tried to overcome the security issue faced by cloud during file transfer. Despite of vast researches made to overcome these issues, there is no perfect solution till determined. We took this as a problem and proposed a simple solution to overcome the issues through DYNAMIC ENCRYPTION algorithms. Here we use two algorithms namely: 1. AES(Advanced Encryption Standard) 2. RSA(Rivest Shamir Adleman)
  • 4. Problem definition  The topic SCUDE briefly explains Storing and transferring data in Cloud securely Using Dynamic Encryption. The encrypted data in cloud server is again dynamically encrypted with respect to time.  Symmetric key algorithms are used to encrypt the data which rest on cloud, while transferring the data asymmetric key algorithms are used.
  • 5. Trends  Cloud computing has experienced exponential growth over the last few years . The latest trends are listed below .  Hybrid clouds  BYOD  Platform-as-a-Service (PaaS)  Big data analytics  Graphics as a service  Identity management and protection  Web-powered apps
  • 6.  The two trends that has an impact in next five years are identity management and protection and web- powered apps . Security has always been a major concern with cloud computing. As more businesses move more information and data into cloud servers, this concern is more important than ever. It is anticipated that over the next year, there will be identity management solutions based on new cloud based security paradigms. As efficiency and scalability are among the primary benefits of cloud computing, then it only makes sense to start developing cloud-based applications that are compatible with multiple platforms.
  • 7. Solution  With help of RSA algorithm the data is encrypted first in client side and sent to the cloud server.  Here the private key is held by user and public key is held by cloud vendor.  The encrypted data present in the cloud server is again dynamically encrypted with respect to time.  The user again decrypts the primary encrypted data and gets the actual data.
  • 8. Interest Areas  My interest area in cloud computing technology is cloud security .  Cloud security is an evolving sub-domain of computer security, network security, and, more broadly, information security.  It refers to a broad set of policies, technologies, and controls deployed to protect data, applications, and the associated infrastructure of cloud computing.  Cloud computing security is the set of control-based technologies and policies designed to adhere to regulatory compliance rules and protect information, data applications and infrastructure associated with cloud computing use .
  • 9. Impacts  The main advantage is preventing hacking and cracking of data from unauthorized source.  Reliability and scalability can be improved.  This algorithm provides high security with firewalls.  Data breach and data loss is the major drawback in the existing system which has been overcome in SCUDE.