12-09-2014, 01:07 PM
A-CRM-Based-Cryptography-Service-for-Ensuring-Security-in-Cloud-Computing Project Report
A-CRM-Based.pptx (Size: 1.16 MB / Downloads: 15)
MOTIVATION
Since there are many people trying to devise clever ways of attacking such systems ,one should apply Security mechanisms to ensure security. We all have accounts like cloud storage ,Email that can be vulnerable to threats , which forced me to give a presentation about ensuring security
What is Cloud Storage?
Cloud storage is a technology in which pools of storage are used to store data. People who require their data to be stored can buy or lease storage.
The storage can be located on multiple servers or different locations ,hosted by third parties.
The security of the data depends on the hosting companies and the application through API.
Security Concerns
Cloud computing just like any other web service which using the internet network and, of course, it is away for hijacker to hijack, control or stop the server. Fortunately, companies which render cloud services give every user a username and password to access their files, and they usually encrypt information between them and their customer
Social Problems
Social problems, legal and security have the same worries. While cloud storage users use the internet to access their file, they are susceptible for hacking and losing their important files. Bowers thinks that adversary can control the servers for storage services.
(Bowers, 2009)
Legal and Ethical Issues
Telecommunications Act of 1996 is a part of universal access ,according to which the company or government can access the files for security measures.
Google complies with the Digital Millennium Copyright Act (DMCA) and other applicable copyright laws, and promptly remove infringing content when properly notified.
What is Cryptography?
Cryptography means hidden .It is associated with plain text also referred to as clear text.
It uses a mechanism called encryption and converts it into cipher text then back again into plain text using decryption.
Pairing-Based Cryptography
Pairing based cryptography uses identity based encryption.
In particular, identity-based encryption (IBE) is a pairing-based scheme that has received considerable attention. IBE uses some form of a person (or entity’s) identification to generate a public key. This could be an email address, for instance.
Abstract
Cloud computing is a combination of technology, a platform , a hosting provider, an application hosted as a service, storage services on the Internet.
Cloud computing allows consumers and businesses to use applications without installation and access their personal files at any computer with internet access.
General Terms and Introduction
Private Key, Public Key, SaaS, PaaS, IaaS, Authentication ID, cipher text.
Cloud computing represents the new understanding of computing power as a service, not as a product.
Most people do not use their computers 24 hours a day, 7 days a week, as well as the vast majority of servers are not fully employed all the time Consequently, a good portion of computing resources goes unused. Cloud computing uses those resources
Introduction
Cloud infrastructures can be roughly categorized as either private or public.
In a private cloud, the infrastructure is managed and owned by the customer.
In a public cloud the infrastructure is owned and managed by a cloud service provider .
Benefits of a Cryptographic Storage Service
Since organizations are often held responsible for the actions of their contractors the use of a public cloud storage service can involve significant legal risks.
In a cryptographic storage service, the data is encrypted on-premise by the data processor(s). This way, customers can be assured that the confidentiality of their data is preserved irrespective of the actions of the cloud storage provider. This greatly reduces any legal exposure for both the customer and the provider.
Conclusion
Cloud storage naturally is a huge service allows the users to access their files anywhere, such as computers, laptops, tablets and smartphones and this gives users to be unwary about losing their files. It makes our lives easier to edit, add and share any file anywhere in any device that can access cloud storage service. In the other hand, users still have a concern about hacking their files while they are using the internet.