1 / 9

SECURING THE CLOUDS

SECURING THE CLOUDS. Presented By: Dr. Mohammed Imtiaz Ahmed Librarian, Pt. Ravi Shankar Shukla University Raipur (C.G), 492010 Mohammed Bakhtawar Ahmed Columbia Institute of Engineering & Technology Raipur (C.G), 492001 Debojit Das Columbia Institute of Engineering & Technology

davida
Download Presentation

SECURING THE CLOUDS

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. SECURING THE CLOUDS Presented By: Dr. Mohammed Imtiaz Ahmed Librarian, Pt. Ravi Shankar Shukla University Raipur (C.G), 492010 Mohammed Bakhtawar Ahmed Columbia Institute of Engineering & Technology Raipur (C.G), 492001 Debojit Das Columbia Institute of Engineering & Technology Raipur (C.G), 492001

  2. CLOUD SECURITY FUNDAMENTALS Security is a prime concern when entrusting organizations critical information to geographically dispread platform not under the direct control of the organization. Three factors that support information assurance are confidentiality, integrity and availability.

  3. THE TWO THREATS INSIDER THREAT:- unauthorized access by authorized person. OUTSIDER THREAT:- Unauthorized access by unauthorized person.

  4. EXAMPLE Two good examples of commercial secure storage services which encrypt data client-side before transmitting it outside the user's machine (reasonably considered trusted) are: Spideroak GoldKey

  5. To reduce the time required for encryption & decryption, a promising project released under GNU License named Tahoe aims to provide components to build a distributed secure storage system. Besides the encryption mechanism, it also implements an algorithm that splits data in n chunks storing them on different nodes. At retrieval time only m<n nodes are needed to rebuild the original data.

  6. SEARCHABLE ENCRYPTION • Searchable encryption is a broad concept that deals with searches in encrypted data. The goal is to outsource encrypted data and be able to conditionally retrieve or query data without having to decrypt all the data. It makes use of symmetric encryption and provides: • Controlled searching • Hidden queries • These two properties guarantee that the server is not able to learn anything more about the plaintext than the search result.

  7. Another approach for searchable encryption is to use asymmetric encryption. The first scheme for searchable encryption that makes use of public key cryptography is the Public-Key Encryption with keyword Search (PEKS) scheme.

  8. CONCLUSION We have viewed in this presentation, the recent advances in crypto that we foresee will add a new layer of security to network and boost its adoption. As we have discussed in the presentation, most cryptographic primitives are ready to be used. We only need to convince the network based service Providers to implement them or produce efficient implementations that could ease its inclusion in open source network platforms.

  9. Any Questions Please? Comments! THANK YOU

More Related