SlideShare a Scribd company logo
Acropolis Institute of Technology and
Research
Submitted To Submitted By
Mrs. Pushpa Pathak Neha Jaiswal
Cloud Computing Security
Content
 Cloud Computing
 Cloud Security
 Cloud Security Importance
 Security Issues Associated with the Cloud
 Cloud security challenges
 Security architecture
 Techniques for Cloud Security
 Cloud security alliances
Cloud Computing
Cloud computing means storing and accessing data and programs
over the Internet instead of your computer's hard drive. Everything
you need is physically close to you.
Meaning of Cloud – :
Common implies multi-tenancy, not
single or isolated tenancy
Location-independent
Online
Utility implies pay-for-use pricing
Demand implies
infinite,immediate,invisible
scalability
Cloud computing
What is Cloud Security
 Cloud Security is security principle applied to protect
data, applications and infrastructure associated within the
cloud computing technology.
Why is Cloud Security Important?
 Increasing usages of cloud security in non-traditional
sectors.
 To protect confidential data of its customers
 Growing adoption of cloud security in government
departments.
 Growing usages of cloud services for critical data
storage.
Security issues associated with the cloud
 Cloud in a variety of different service models and
deployment models.
 Concerns associated with cloud computing.
Cloud Provider
‱ Person those provided cloud services
Customer’s
‱ Person who use cloud services
Cloud Security Challenges
 It is clear the security issue has played the most important role
in hindering cloud computing acceptance.
 Well known security issues such ass data loss,phishing,botnet
pose serious threat to organization’s data and software.
 Multi-tenancy model and the pooled computing resources in
cloud computing has introduced new security challenges that
requires novel techniques to tackle with.
 Insider threats.
Security Architecture
Techniques for cloud security
 Data Integrity
 Data Confidentiality
Homomorphic Encryption(RSA Algorithm’s)
Encrypted Search and Database(TSFS Algorithm’s)
Distributive Storage(Chunk’s & Shamir’s Algorithm’s)
Deletion Confirmation(FADE System)
Data Concealment(Watermarking Method)
Hybrid Technique(RSA Public key Algorithm)
 Data Availability
 Data Privacy(ORAM Algorithm)
Cloud Security Alliances
Cloud computing
Cloud computing

More Related Content

DOCX
2014 IEEE JAVA CLOUD COMPUTING PROJECT A secure client side deduplication sch...
PPTX
cloud abstract
PPTX
Fog computing
PDF
Sustainability and fog computing applications, advantages and challenges
PPT
Cloud Computing and Distance Education
PPTX
Fog Computing
PDF
A Study on Cloud and Fog Computing Security Issues and Solutions
PPTX
Impact of cloud computing in education, e governance
2014 IEEE JAVA CLOUD COMPUTING PROJECT A secure client side deduplication sch...
cloud abstract
Fog computing
Sustainability and fog computing applications, advantages and challenges
Cloud Computing and Distance Education
Fog Computing
A Study on Cloud and Fog Computing Security Issues and Solutions
Impact of cloud computing in education, e governance

What's hot (16)

PDF
Security Issues of IoT with Fog
PPTX
Fog computing
PPT
Fog computing provide security to data in cloud ppt
PDF
Networking Issues and Challenges In Cloud Computing
PPTX
Fog computing technology
PPTX
Cloud.ppt
PDF
From data centers to fog computing: the evaporating cloud
DOCX
What is fog computing
PPTX
Fog computing
PPTX
fog computing ppt
PDF
Fog computing
PPTX
Introduction to Fog Computing
PDF
Fog Computing with VORTEX
PPTX
Fog Computing
DOCX
Fog computing document
PDF
CloudWALL Profile ENG
Security Issues of IoT with Fog
Fog computing
Fog computing provide security to data in cloud ppt
Networking Issues and Challenges In Cloud Computing
Fog computing technology
Cloud.ppt
From data centers to fog computing: the evaporating cloud
What is fog computing
Fog computing
fog computing ppt
Fog computing
Introduction to Fog Computing
Fog Computing with VORTEX
Fog Computing
Fog computing document
CloudWALL Profile ENG
Ad

Similar to Cloud computing (20)

PPTX
Cloud security
PDF
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
PPTX
Ph d abstract
PDF
Eb31854857
DOCX
Challenges faced in cloud
PPT
Effectively and Securely Using the Cloud Computing Paradigm
PPTX
Introduction-to-basics of Cloud-Computing.pptx
PDF
Investigative analysis of security issues and challenges in cloud computing a...
PDF
Ad4502189193
PDF
SECURE CLOUD ARCHITECTURE
PDF
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
PDF
B018211016
PPTX
Security in cloud computing
PDF
B1802041217
PDF
Security of Data in Cloud Environment Using DPaaS
 
DOCX
Why Cloud Security Matters in Today's Business World
 
PDF
Solutions of cloud computing security issues
PDF
PPTX
Benefits of cloud computing key points 👉
PPTX
Reasons to choose cloud security
Cloud security
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Ph d abstract
Eb31854857
Challenges faced in cloud
Effectively and Securely Using the Cloud Computing Paradigm
Introduction-to-basics of Cloud-Computing.pptx
Investigative analysis of security issues and challenges in cloud computing a...
Ad4502189193
SECURE CLOUD ARCHITECTURE
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
B018211016
Security in cloud computing
B1802041217
Security of Data in Cloud Environment Using DPaaS
 
Why Cloud Security Matters in Today's Business World
 
Solutions of cloud computing security issues
Benefits of cloud computing key points 👉
Reasons to choose cloud security
Ad

Recently uploaded (20)

PDF
Introduction to Data Science and Data Analysis
PPTX
Market Analysis -202507- Wind-Solar+Hybrid+Street+Lights+for+the+North+Amer...
PPTX
A Complete Guide to Streamlining Business Processes
PPTX
Pilar Kemerdekaan dan Identi Bangsa.pptx
PDF
Data Engineering Interview Questions & Answers Cloud Data Stacks (AWS, Azure,...
PDF
Votre score augmente si vous choisissez une catégorie et que vous rédigez une...
PPTX
QUANTUM_COMPUTING_AND_ITS_POTENTIAL_APPLICATIONS[2].pptx
PPTX
Topic 5 Presentation 5 Lesson 5 Corporate Fin
PPTX
modul_python (1).pptx for professional and student
PPTX
DS-40-Pre-Engagement and Kickoff deck - v8.0.pptx
PPTX
SAP 2 completion done . PRESENTATION.pptx
PPTX
Qualitative Qantitative and Mixed Methods.pptx
PDF
Business Analytics and business intelligence.pdf
PDF
[EN] Industrial Machine Downtime Prediction
PPT
lectureusjsjdhdsjjshdshshddhdhddhhd1.ppt
 
PDF
OneRead_20250728_1808.pdfhdhddhshahwhwwjjaaja
PDF
Systems Analysis and Design, 12th Edition by Scott Tilley Test Bank.pdf
PPTX
retention in jsjsksksksnbsndjddjdnFPD.pptx
PPTX
(Ali Hamza) Roll No: (F24-BSCS-1103).pptx
PDF
REAL ILLUMINATI AGENT IN KAMPALA UGANDA CALL ON+256765750853/0705037305
Introduction to Data Science and Data Analysis
Market Analysis -202507- Wind-Solar+Hybrid+Street+Lights+for+the+North+Amer...
A Complete Guide to Streamlining Business Processes
Pilar Kemerdekaan dan Identi Bangsa.pptx
Data Engineering Interview Questions & Answers Cloud Data Stacks (AWS, Azure,...
Votre score augmente si vous choisissez une catégorie et que vous rédigez une...
QUANTUM_COMPUTING_AND_ITS_POTENTIAL_APPLICATIONS[2].pptx
Topic 5 Presentation 5 Lesson 5 Corporate Fin
modul_python (1).pptx for professional and student
DS-40-Pre-Engagement and Kickoff deck - v8.0.pptx
SAP 2 completion done . PRESENTATION.pptx
Qualitative Qantitative and Mixed Methods.pptx
Business Analytics and business intelligence.pdf
[EN] Industrial Machine Downtime Prediction
lectureusjsjdhdsjjshdshshddhdhddhhd1.ppt
 
OneRead_20250728_1808.pdfhdhddhshahwhwwjjaaja
Systems Analysis and Design, 12th Edition by Scott Tilley Test Bank.pdf
retention in jsjsksksksnbsndjddjdnFPD.pptx
(Ali Hamza) Roll No: (F24-BSCS-1103).pptx
REAL ILLUMINATI AGENT IN KAMPALA UGANDA CALL ON+256765750853/0705037305

Cloud computing

  • 1. Acropolis Institute of Technology and Research Submitted To Submitted By Mrs. Pushpa Pathak Neha Jaiswal Cloud Computing Security
  • 2. Content  Cloud Computing  Cloud Security  Cloud Security Importance  Security Issues Associated with the Cloud  Cloud security challenges  Security architecture  Techniques for Cloud Security  Cloud security alliances
  • 3. Cloud Computing Cloud computing means storing and accessing data and programs over the Internet instead of your computer's hard drive. Everything you need is physically close to you. Meaning of Cloud – : Common implies multi-tenancy, not single or isolated tenancy Location-independent Online Utility implies pay-for-use pricing Demand implies infinite,immediate,invisible scalability
  • 5. What is Cloud Security  Cloud Security is security principle applied to protect data, applications and infrastructure associated within the cloud computing technology. Why is Cloud Security Important?  Increasing usages of cloud security in non-traditional sectors.  To protect confidential data of its customers  Growing adoption of cloud security in government departments.  Growing usages of cloud services for critical data storage.
  • 6. Security issues associated with the cloud  Cloud in a variety of different service models and deployment models.  Concerns associated with cloud computing. Cloud Provider ‱ Person those provided cloud services Customer’s ‱ Person who use cloud services
  • 7. Cloud Security Challenges  It is clear the security issue has played the most important role in hindering cloud computing acceptance.  Well known security issues such ass data loss,phishing,botnet pose serious threat to organization’s data and software.  Multi-tenancy model and the pooled computing resources in cloud computing has introduced new security challenges that requires novel techniques to tackle with.  Insider threats.
  • 9. Techniques for cloud security  Data Integrity  Data Confidentiality Homomorphic Encryption(RSA Algorithm’s) Encrypted Search and Database(TSFS Algorithm’s) Distributive Storage(Chunk’s & Shamir’s Algorithm’s) Deletion Confirmation(FADE System) Data Concealment(Watermarking Method) Hybrid Technique(RSA Public key Algorithm)  Data Availability  Data Privacy(ORAM Algorithm)