2. 1. Introduction.
2. Need of cloud computing Backup.
3. Deployment models.
4. Security issues.
5. Risk of cloud .
6. Importance of Cloud.
7. How to Secure Data on the Cloud ?
8. Techniques Used To Encrypt Data.
9. Example of Encryption.
10. Conclusion .
11. References .
CONTENTS.
3.
Secure Cloud’s simple
approach to data protection
safely delivers encryption
keys to valid devices without
the need to deploy an entire
file system and management
infrastructure.
Introduction
4.
Backup services are also provided by cloud
computing and cover such functions like
availability of remote data, resiliency of data
center, compliance and security, server
performance, and data protection which are
especially practical and handy for business to
business backup.
Why Is There A Need For Cloud
Computing Backup?
6.
1. Data Integrity
2. Data Theft
3. Privacy issues
4. Infected Application
5. Data loss
6. Data Location
7. Security on Vendor level
8. Security on user level
Security Issues faced by
Cloud computing
7.
Privacy agreement and service level
agreement.
Security and data protection.
Location of data.
Loss Of Private/Important Data.
Risks of cloud computing
8.
Increasing Usage of Cloud Services in
Non-traditional Sectors
Growing Adoption of Cloud Services in
Government Departments
Rise in Cloud Service-specific Attacks
Growing Usage of Cloud Services for
Critical Data Storage
Rise in Employee Mobility .
Why is Cloud Security
Important
9.
Avoid storing sensitive information in
the cloud.
Be serious about passwords.
Encryption.
How to Secure Data on the
Cloud ?
10.
The Caesar Cipher.
Vigenere cipher.
Rail Fence cipher.
Steganography.
Techniques Used To Encrypt
Data
11. 1. Choose the File that you want to
Encrypt.
How To Encrypt file
16.
Thus We are Understand the concept
of cloud security and its encryption
technique . We also see that how to
encrypt our data before sending it on
to cloud.
Conclusion..