This document summarizes a seminar on secure cloud computing presented by Devyani B. Vaidya and guided by Prof. G. R. Gosavi. It discusses the need for cloud computing backup services and deployment models. It outlines security issues for cloud computing like data integrity, theft, and location. It also discusses risks, importance of security, techniques for encrypting data, and how to encrypt files before storing them in the cloud. The document provides an introduction to secure cloud computing and encryption techniques to securely store data in the cloud.
3. Introduction
Secure Cloud’s simple approach to data
protection safely delivers encryption keys
to valid devices without the need to
deploy an entire file system and
management infrastructure
4. Why Is There A Need For Cloud
Computing Backup?
Backup services are also provided by cloud
computing and cover such functions like
availability of remote data, resiliency of data
center, compliance and security, server
performance, and data protection which are
especially practical and handy for business to
business backup.
6. Security Issues faced by Cloud
computing
1. Data Integrity
2. Data Theft
3. Privacy issues
4. Infected Application
5. Data loss
6. Data Location
7. Security on Vendor level
8. Security on user level
7. Risks of cloud computing
Privacy agreement and service level
agreement.
Security and data protection.
Location of data.
Loss Of Private/Important Data.
8. Why is Cloud Security Important
Increasing Usage of Cloud Services in
Non-traditional Sectors
Growing Adoption of Cloud Services in
Government Departments
Rise in Cloud Service-specific Attacks
Growing Usage of Cloud Services for
Critical Data Storage
Rise in Employee Mobility
9. How to Secure Data on the Cloud
?
Avoid storing sensitive information in
the cloud.
Read the user agreement to find out
how your cloud service storage works.
Be serious about passwords.
Encryption.
10. Techniques Used To Encrypt Data
The Caesar Cipher.
Vigenere cipher.
Rail Fence cipher.
Steganography.
11. How To Encrypt file
1. Choose the File that you want to
Encrypt .
17. Conclusion..
Thus We are Understand the concept of
cloud security and its encryption
technique . We also see that how to
encrypt our data before sending it on to
cloud.