Digital spectacle by using cloud computing

  • Published on
    11-May-2015

  • View
    310

  • Download
    0

Embed Size (px)

DESCRIPTION

This presentation is completely new idea .In this presentation i explain the security with the help of cloud computing......this will be the new idea in new world...

Transcript

  • 1.Digital Spectacles byDigital Spectacles by usingusing cloud Computing.cloud Computing. Third Year Of Computer EngineeringThird Year Of Computer Engineering.. Imperial college of engineering and Research, Wagholi, Nagar Road. ,Pune-421207.Imperial college of engineering and Research, Wagholi, Nagar Road. ,Pune-421207. Submitted by...Submitted by... Mr. Mandar pathrikar.Mr. Mandar pathrikar.

2. Digital spectaclesDigital spectacles Digital spectacles is the newDigital spectacles is the new invention in the science ,this isinvention in the science ,this is beneficial for all cops.beneficial for all cops. A small camera fitted to theA small camera fitted to the glasses can capture 400 facialglasses can capture 400 facial images per second and sendimages per second and send them to a central computerthem to a central computer database storing up to 13database storing up to 13 million faces.million faces. The system can compareThe system can compare biometric data at 46,000 pointsbiometric data at 46,000 points on a face and will immediatelyon a face and will immediately signal any matches to knownsignal any matches to known criminals or people wanted bycriminals or people wanted by 3. Criminal Information present at Different location Encryption of data Cloud Decryption of data Mobile 4. What is Cloud ComputingWhat is Cloud Computing Cloud is a collective term forCloud is a collective term for a large number of developmentsa large number of developments and possibilities. It is not anand possibilities. It is not an invention, but more of ainvention, but more of a practical innovation.practical innovation. Dynamically scalable sharedDynamically scalable shared resourcesresources accessed over a networkaccessed over a network Only pay for what you useOnly pay for what you use Shared internally or with otherShared internally or with other customerscustomers Resources = Storage,Resources = Storage, computing, services, etc.computing, services, etc. Internal network or InternetInternal network or Internet 5. 5 ArchitectureArchitecture 6. Deployment ModelsDeployment Models PublicPublic Cloud infrastructure isCloud infrastructure is available to the generalavailable to the general publicpublic, owned by org selling cloud services, owned by org selling cloud services PrivatePrivate Cloud infrastructureCloud infrastructure for single org onlyfor single org only, may be, may be managed by the org or a 3managed by the org or a 3rdrd party, on or offparty, on or off premisepremise 7. How Can I Create personal CloudHow Can I Create personal Cloud Iomega Personal Cloud is a new technology that createsIomega Personal Cloud is a new technology that creates your own Internet connected cloud network of Storyour own Internet connected cloud network of Stor Center storage devices, personal computers andCenter storage devices, personal computers and handheld mobile devices, which allows you to connect,handheld mobile devices, which allows you to connect, share, copy and protect your files within your network.share, copy and protect your files within your network. Installing this software in our devices and connectingInstalling this software in our devices and connecting through internet ,we can create our own cloud.through internet ,we can create our own cloud. 8. Working of cloud spectsWorking of cloud spects 9. Lumus LOE technologyLumus LOE technology 10. Lumus LOE technologyLumus LOE technology Lumus has developed a unique technology it calls Light-Lumus has developed a unique technology it calls Light- guide Optical Element (LOE). The Lumus video-glassesguide Optical Element (LOE). The Lumus video-glasses are connected either wired or wirelessly to a mediaare connected either wired or wirelessly to a media source, such as a cell phone, which transfers the videosource, such as a cell phone, which transfers the video image into a micro projector embedded in the temple ofimage into a micro projector embedded in the temple of the eyeglasses.the eyeglasses. The image travels through the lens by way of TotalThe image travels through the lens by way of Total Internal Reflection (TIR).Internal Reflection (TIR). TIR is an optical phenomenon that occurs when lightTIR is an optical phenomenon that occurs when light strikes a medium boundary at a steep angle. If thestrikes a medium boundary at a steep angle. If the refractive index is lower on the other side of therefractive index is lower on the other side of the boundary, no light can pass through, effectively reflectingboundary, no light can pass through, effectively reflecting all of the light.all of the light. 11. Head-Mounted display-:Head-Mounted display-: ((Sight of death)Sight of death) This Technology used in the Fighter planes for targetingThis Technology used in the Fighter planes for targeting their targets.their targets. The idea of a pilot directing a missile to its target byThe idea of a pilot directing a missile to its target by simply looking at it .simply looking at it . You want the image to be large, the device has to beYou want the image to be large, the device has to be large; if you want the device to be small, the image willlarge; if you want the device to be small, the image will be small.be small. 12. Security of CloudSecurity of Cloud 13. Security of cloudSecurity of cloud Security of cloud is the main feature of thisSecurity of cloud is the main feature of this technology. Data which contain in the cloud istechnology. Data which contain in the cloud is very precocious that's why we have to use it invery precocious that's why we have to use it in encryption form.encryption form. Nessus vulnerability scannerNessus vulnerability scanner it is the it is the technology which is used in the Multi nationaltechnology which is used in the Multi national companies for sending data from one place tocompanies for sending data from one place to another .Data is totally in encryption form soanother .Data is totally in encryption form so that it is most secure in form.that it is most secure in form. 14. Nessus vulnerability scannerNessus vulnerability scanner 15. Nessus vulnerability scannerNessus vulnerability scanner This is the most secure technology which isThis is the most secure technology which is mostly used in the Multinational companies formostly used in the Multinational companies for sending data from one state to another .sending data from one state to another . Nessus scanner when send the data it is in theNessus scanner when send the data it is in the encryption form so that it is difficult to predict ifencryption form so that it is difficult to predict if any one try to do that then whole algorithmany one try to do that then whole algorithm change within 5min. And data sending againchange within 5min. And data sending again started.started. 16. Radar PageRadar Page 17. Radar PageRadar Page The Radar Page was designed and built to caterThe Radar Page was designed and built to cater for the demands of Government and Militaryfor the demands of Government and Military networks requiring near real time information onnetworks requiring near real time information on new and emerging cyber threats.new and emerging cyber threats. The page auto updates every 20 minutes drawingThe page auto updates every 20 minutes drawing information from multiple sources.information from multiple sources. If any threats or illegal access is found than theIf any threats or illegal access is found than the scanner note down the IP Address and put itscanner note down the IP Address and put it into list and appropriate action we can easilyinto list and appropriate action we can easily take.take. 18. ConclusionConclusion Digital spectacles are the latest technology in case ofDigital spectacles are the latest technology in case of security purpose. Many social problems we can sort usingsecurity purpose. Many social problems we can sort using it.it. Many Disasters we can avoid by using this technology.Many Disasters we can avoid by using this technology. Cloud security is very up coming future technology.Cloud security is very up coming future technology. With the help of Cloud Security and digital spectacles weWith the help of Cloud Security and digital spectacles we can stop Crimes in the society And Find out the Missingcan stop Crimes in the society And Find out the Missing personal.personal. Increases business responsiveness.Increases business responsiveness. Uses IT resources efficiently via sharing and higher systemUses IT resources efficiently via sharing and higher system utilization Cultivates skills for next generation workforce.utilization Cultivates skills for next generation workforce.

Recommended

View more >