Securing Data In The Cloud Through Data Partitioning And Encryption. By: Rania Salameh & Shahd Mobarak Supervised By: D. Adnan Slaman What is cloud computing? 2 Type of internet-based technologies, which allows users to share data and resources among different cloud service providers and cloud vendors. Cloud components: 1- Clients 2- Distributed servers 3-Datacenters 3 Why cloud computing? 4 1- Data theft 2- Integrity of data 3- Privacy problems 4- Loss of data Security Problems Faced By Cloud: 5 Idea User’s original data cannot be directly reached by cloud operators 6 Previous work SA-EDS model mainly consists of two components: 1- Deterministic Process (DP) 2- Data Distributed Storage Process (D2SP) Algorithms used to design the model (SA-EDS): 1- Alternative Data Distribution (AD2) 2-Secure Efficient Data Distributions (SED2) 3-Efficient Data Conflation (ED- Con) 7 SA-EDS Security-Aware Efficient Distributed Storage (SA-EDS) Model.[1] [1]Yibin Li, Keke Gai, Longfei Qiu, Meikang Qiu, Hui Zhao [2017] 8 SA-EDS 9 Example: 10 SOFTWARE : C/C++ JAVA DropBox API with java 11 12 System Architecture Result for Encryption 13 Result for Decryption 14 THANKS! 15 image1.png image2.png image3.png image4.png image5.jpeg image6.png image7.png image8.png image9.png image10.png image11.png image12.png