SlideShare a Scribd company logo
Digital Spectacles byDigital Spectacles by
usingusing
cloud Computing.cloud Computing.
Third Year Of Computer EngineeringThird Year Of Computer Engineering..
Imperial college of engineering and Research, Wagholi, Nagar Road. ,Pune-421207.Imperial college of engineering and Research, Wagholi, Nagar Road. ,Pune-421207.
Submitted by...Submitted by...
Mr. Mandar pathrikar.Mr. Mandar pathrikar.
Digital spectaclesDigital spectacles
 Digital spectacles is the newDigital spectacles is the new
invention in the science ,this isinvention in the science ,this is
beneficial for all cops.beneficial for all cops.
 A small camera fitted to theA small camera fitted to the
glasses can capture 400 facialglasses can capture 400 facial
images per second and sendimages per second and send
them to a central computerthem to a central computer
database storing up to 13database storing up to 13
million faces.million faces.
 The system can compareThe system can compare
biometric data at 46,000 pointsbiometric data at 46,000 points
on a face and will immediatelyon a face and will immediately
signal any matches to knownsignal any matches to known
criminals or people wanted bycriminals or people wanted by
Criminal Information
present at Different
location
Encryption of data
Cloud
Decryption of data
Mobile
What is Cloud ComputingWhat is Cloud Computing
 ““Cloud” is a collective term forCloud” is a collective term for
a large number of developmentsa large number of developments
and possibilities. It is not anand possibilities. It is not an
invention, but more of ainvention, but more of a
“practical innovation”.“practical innovation”.
 Dynamically scalable sharedDynamically scalable shared
resourcesresources
 accessed over a networkaccessed over a network
 Only pay for what you useOnly pay for what you use
 Shared internally or with otherShared internally or with other
customerscustomers
 Resources = Storage,Resources = Storage,
computing, services, etc.computing, services, etc.
 Internal network or InternetInternal network or Internet
5
ArchitectureArchitecture
Deployment ModelsDeployment Models
 ••PublicPublic
Cloud infrastructure isCloud infrastructure is available to the generalavailable to the general
publicpublic, owned by org selling cloud services, owned by org selling cloud services
 ••PrivatePrivate
Cloud infrastructureCloud infrastructure for single org onlyfor single org only, may be, may be
managed by the org or a 3managed by the org or a 3rdrd
party, on or offparty, on or off
premisepremise
How Can I Create personal CloudHow Can I Create personal Cloud
 Iomega Personal Cloud is a new technology that createsIomega Personal Cloud is a new technology that creates
your own Internet connected “cloud” network of Storyour own Internet connected “cloud” network of Stor
Center storage devices, personal computers andCenter storage devices, personal computers and
handheld mobile devices, which allows you to connect,handheld mobile devices, which allows you to connect,
share, copy and protect your files within your network.share, copy and protect your files within your network.
 Installing this software in our devices and connectingInstalling this software in our devices and connecting
through internet ,we can create our own cloud.through internet ,we can create our own cloud.
Working of cloud spectsWorking of cloud spects
Lumus LOE technologyLumus LOE technology
Lumus LOE technologyLumus LOE technology
 Lumus has developed a unique technology it calls Light-Lumus has developed a unique technology it calls Light-
guide Optical Element (LOE). The Lumus video-glassesguide Optical Element (LOE). The Lumus video-glasses
are connected either wired or wirelessly to a mediaare connected either wired or wirelessly to a media
source, such as a cell phone, which transfers the videosource, such as a cell phone, which transfers the video
image into a micro projector embedded in the temple ofimage into a micro projector embedded in the temple of
the eyeglasses.the eyeglasses.
 The image travels through the lens by way of TotalThe image travels through the lens by way of Total
Internal Reflection (TIR).Internal Reflection (TIR).
 TIR is an optical phenomenon that occurs when lightTIR is an optical phenomenon that occurs when light
strikes a medium boundary at a steep angle. If thestrikes a medium boundary at a steep angle. If the
refractive index is lower on the other side of therefractive index is lower on the other side of the
boundary, no light can pass through, effectively reflectingboundary, no light can pass through, effectively reflecting
all of the light.all of the light.
Head-Mounted display-:Head-Mounted display-:
((Sight of death)Sight of death)
 This Technology used in the Fighter planes for targetingThis Technology used in the Fighter planes for targeting
their targets.their targets.
 The idea of a pilot directing a missile to its target byThe idea of a pilot directing a missile to its target by
simply looking at it .simply looking at it .
 You want the image to be large, the device has to beYou want the image to be large, the device has to be
large; if you want the device to be small, the image willlarge; if you want the device to be small, the image will
be small.be small.
Security of CloudSecurity of Cloud
Security of cloudSecurity of cloud
 Security of cloud is the main feature of thisSecurity of cloud is the main feature of this
technology. Data which contain in the cloud istechnology. Data which contain in the cloud is
very precocious that's why we have to use it invery precocious that's why we have to use it in
encryption form.encryption form.
 ““Nessus vulnerability scannerNessus vulnerability scanner “ it is the“ it is the
technology which is used in the Multi nationaltechnology which is used in the Multi national
companies for sending data from one place tocompanies for sending data from one place to
another .Data is totally in encryption form soanother .Data is totally in encryption form so
that it is most secure in form.that it is most secure in form.
Nessus vulnerability scannerNessus vulnerability scanner
Nessus vulnerability scannerNessus vulnerability scanner
 This is the most secure technology which isThis is the most secure technology which is
mostly used in the Multinational companies formostly used in the Multinational companies for
sending data from one state to another .sending data from one state to another .
 Nessus scanner when send the data it is in theNessus scanner when send the data it is in the
encryption form so that it is difficult to predict ifencryption form so that it is difficult to predict if
any one try to do that then whole algorithmany one try to do that then whole algorithm
change within 5min. And data sending againchange within 5min. And data sending again
started.started.
Radar PageRadar Page
Radar PageRadar Page
 The Radar Page was designed and built to caterThe Radar Page was designed and built to cater
for the demands of Government and Militaryfor the demands of Government and Military
networks requiring near real time information onnetworks requiring near real time information on
new and emerging cyber threats.new and emerging cyber threats.
 The page auto updates every 20 minutes drawingThe page auto updates every 20 minutes drawing
information from multiple sources.information from multiple sources.
 If any threats or illegal access is found than theIf any threats or illegal access is found than the
scanner note down the IP Address and put itscanner note down the IP Address and put it
into list and appropriate action we can easilyinto list and appropriate action we can easily
take.take.
ConclusionConclusion
 Digital spectacles are the latest technology in case ofDigital spectacles are the latest technology in case of
security purpose. Many social problems we can sort usingsecurity purpose. Many social problems we can sort using
it.it.
 Many Disasters we can avoid by using this technology.Many Disasters we can avoid by using this technology.
 Cloud security is very up coming future technology.Cloud security is very up coming future technology.
 With the help of Cloud Security and digital spectacles weWith the help of Cloud Security and digital spectacles we
can stop Crimes in the society And Find out the Missingcan stop Crimes in the society And Find out the Missing
personal.personal.
 Increases business responsiveness.Increases business responsiveness.
 Uses IT resources efficiently via sharing and higher systemUses IT resources efficiently via sharing and higher system
utilization Cultivates skills for next generation workforce.utilization Cultivates skills for next generation workforce.
Digital spectacle by using cloud computing
Ad

More Related Content

What's hot (20)

Resource Guid
Resource GuidResource Guid
Resource Guid
BiancaPapapietro
 
Honeypot and Steganography
Honeypot and SteganographyHoneypot and Steganography
Honeypot and Steganography
Preeti Yadav
 
fog computing ppt
fog computing ppt fog computing ppt
fog computing ppt
sravya raju
 
Eplq efficient privacy preserving location-based query over outsourced encryp...
Eplq efficient privacy preserving location-based query over outsourced encryp...Eplq efficient privacy preserving location-based query over outsourced encryp...
Eplq efficient privacy preserving location-based query over outsourced encryp...
LeMeniz Infotech
 
35 38
35 3835 38
35 38
Ijarcsee Journal
 
Eplq efficient privacy preserving location-based query over outsourced encryp...
Eplq efficient privacy preserving location-based query over outsourced encryp...Eplq efficient privacy preserving location-based query over outsourced encryp...
Eplq efficient privacy preserving location-based query over outsourced encryp...
LeMeniz Infotech
 
Honeypot-A Brief Overview
Honeypot-A Brief OverviewHoneypot-A Brief Overview
Honeypot-A Brief Overview
SILPI ROSAN
 
Security challenges for IoT
Security challenges for IoTSecurity challenges for IoT
Security challenges for IoT
WSO2
 
Smau Bologna 2013 Stefano Zanero
Smau Bologna 2013 Stefano ZaneroSmau Bologna 2013 Stefano Zanero
Smau Bologna 2013 Stefano Zanero
SMAU
 
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough?
Ravindra Dastikop
 
Privacy and security in IoT
Privacy and security in IoTPrivacy and security in IoT
Privacy and security in IoT
Vasco Veloso
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issues
Pierluigi Paganini
 
Practical IoT Security in the Enterprise
Practical IoT Security in the EnterprisePractical IoT Security in the Enterprise
Practical IoT Security in the Enterprise
Daniel Miessler
 
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FIIMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IJNSA Journal
 
IRJET- Securing IP Surveillance Cameras using Adaptive Security Appliance...
IRJET-  	  Securing IP Surveillance Cameras using Adaptive Security Appliance...IRJET-  	  Securing IP Surveillance Cameras using Adaptive Security Appliance...
IRJET- Securing IP Surveillance Cameras using Adaptive Security Appliance...
IRJET Journal
 
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoTIRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
IRJET Journal
 
Security issues and solutions : IoT
Security issues and solutions : IoTSecurity issues and solutions : IoT
Security issues and solutions : IoT
Jinia Bhowmik
 
Honeypots (Ravindra Singh Rathore)
Honeypots (Ravindra Singh Rathore)Honeypots (Ravindra Singh Rathore)
Honeypots (Ravindra Singh Rathore)
Ravindra Singh Rathore
 
Seminar Report on Honeypot
Seminar Report on HoneypotSeminar Report on Honeypot
Seminar Report on Honeypot
Amit Poonia
 
Honeypot ss
Honeypot ssHoneypot ss
Honeypot ss
Kajal Mittal
 
Honeypot and Steganography
Honeypot and SteganographyHoneypot and Steganography
Honeypot and Steganography
Preeti Yadav
 
fog computing ppt
fog computing ppt fog computing ppt
fog computing ppt
sravya raju
 
Eplq efficient privacy preserving location-based query over outsourced encryp...
Eplq efficient privacy preserving location-based query over outsourced encryp...Eplq efficient privacy preserving location-based query over outsourced encryp...
Eplq efficient privacy preserving location-based query over outsourced encryp...
LeMeniz Infotech
 
Eplq efficient privacy preserving location-based query over outsourced encryp...
Eplq efficient privacy preserving location-based query over outsourced encryp...Eplq efficient privacy preserving location-based query over outsourced encryp...
Eplq efficient privacy preserving location-based query over outsourced encryp...
LeMeniz Infotech
 
Honeypot-A Brief Overview
Honeypot-A Brief OverviewHoneypot-A Brief Overview
Honeypot-A Brief Overview
SILPI ROSAN
 
Security challenges for IoT
Security challenges for IoTSecurity challenges for IoT
Security challenges for IoT
WSO2
 
Smau Bologna 2013 Stefano Zanero
Smau Bologna 2013 Stefano ZaneroSmau Bologna 2013 Stefano Zanero
Smau Bologna 2013 Stefano Zanero
SMAU
 
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough?
Ravindra Dastikop
 
Privacy and security in IoT
Privacy and security in IoTPrivacy and security in IoT
Privacy and security in IoT
Vasco Veloso
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issues
Pierluigi Paganini
 
Practical IoT Security in the Enterprise
Practical IoT Security in the EnterprisePractical IoT Security in the Enterprise
Practical IoT Security in the Enterprise
Daniel Miessler
 
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FIIMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IJNSA Journal
 
IRJET- Securing IP Surveillance Cameras using Adaptive Security Appliance...
IRJET-  	  Securing IP Surveillance Cameras using Adaptive Security Appliance...IRJET-  	  Securing IP Surveillance Cameras using Adaptive Security Appliance...
IRJET- Securing IP Surveillance Cameras using Adaptive Security Appliance...
IRJET Journal
 
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoTIRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
IRJET Journal
 
Security issues and solutions : IoT
Security issues and solutions : IoTSecurity issues and solutions : IoT
Security issues and solutions : IoT
Jinia Bhowmik
 
Seminar Report on Honeypot
Seminar Report on HoneypotSeminar Report on Honeypot
Seminar Report on Honeypot
Amit Poonia
 

Viewers also liked (19)

Microsoft hololens final ppt
Microsoft hololens final pptMicrosoft hololens final ppt
Microsoft hololens final ppt
rekhameenacs
 
Calgary azure dev camp - Service Bus
Calgary azure dev camp - Service BusCalgary azure dev camp - Service Bus
Calgary azure dev camp - Service Bus
wearsy
 
Service Oriented Architecture and Business Process Modeling Overview
Service Oriented Architecture and Business Process Modeling OverviewService Oriented Architecture and Business Process Modeling Overview
Service Oriented Architecture and Business Process Modeling Overview
Jean Ferguson
 
Intro To webOS
Intro To webOSIntro To webOS
Intro To webOS
fpatton
 
Web Operating System Overview
Web Operating System OverviewWeb Operating System Overview
Web Operating System Overview
Madhu Bala
 
Windows Azure Platform Overview
Windows Azure Platform OverviewWindows Azure Platform Overview
Windows Azure Platform Overview
BusinessIntelligenze
 
4 Essential Lessons for Adopting Predictive Analytics in Healthcare
4 Essential Lessons for Adopting Predictive Analytics in Healthcare4 Essential Lessons for Adopting Predictive Analytics in Healthcare
4 Essential Lessons for Adopting Predictive Analytics in Healthcare
Health Catalyst
 
Raspberry pi : an introduction
Raspberry pi : an introductionRaspberry pi : an introduction
Raspberry pi : an introduction
LTG Oxford
 
Service Oriented Architecture
Service Oriented ArchitectureService Oriented Architecture
Service Oriented Architecture
Robert Sim
 
Predictive Analytics - An Overview
Predictive Analytics - An OverviewPredictive Analytics - An Overview
Predictive Analytics - An Overview
MachinePulse
 
Raspberry pi
Raspberry pi Raspberry pi
Raspberry pi
Anija Nair
 
Data Mining in Healthcare: How Health Systems Can Improve Quality and Reduce...
Data Mining in Healthcare:  How Health Systems Can Improve Quality and Reduce...Data Mining in Healthcare:  How Health Systems Can Improve Quality and Reduce...
Data Mining in Healthcare: How Health Systems Can Improve Quality and Reduce...
Health Catalyst
 
Barcode technology
Barcode technologyBarcode technology
Barcode technology
Subhash Vadadoriya
 
Microsoft Azure a cloud computing platform
Microsoft Azure a cloud computing platformMicrosoft Azure a cloud computing platform
Microsoft Azure a cloud computing platform
Aayush Mohanka
 
Seminar Presentation Hadoop
Seminar Presentation HadoopSeminar Presentation Hadoop
Seminar Presentation Hadoop
Varun Narang
 
Microsoft Cloud Computing - Windows Azure Platform
Microsoft Cloud Computing - Windows Azure PlatformMicrosoft Cloud Computing - Windows Azure Platform
Microsoft Cloud Computing - Windows Azure Platform
David Chou
 
Hadoop introduction , Why and What is Hadoop ?
Hadoop introduction , Why and What is  Hadoop ?Hadoop introduction , Why and What is  Hadoop ?
Hadoop introduction , Why and What is Hadoop ?
sudhakara st
 
Big data and Hadoop
Big data and HadoopBig data and Hadoop
Big data and Hadoop
Rahul Agarwal
 
Big data ppt
Big  data pptBig  data ppt
Big data ppt
Nasrin Hussain
 
Microsoft hololens final ppt
Microsoft hololens final pptMicrosoft hololens final ppt
Microsoft hololens final ppt
rekhameenacs
 
Calgary azure dev camp - Service Bus
Calgary azure dev camp - Service BusCalgary azure dev camp - Service Bus
Calgary azure dev camp - Service Bus
wearsy
 
Service Oriented Architecture and Business Process Modeling Overview
Service Oriented Architecture and Business Process Modeling OverviewService Oriented Architecture and Business Process Modeling Overview
Service Oriented Architecture and Business Process Modeling Overview
Jean Ferguson
 
Intro To webOS
Intro To webOSIntro To webOS
Intro To webOS
fpatton
 
Web Operating System Overview
Web Operating System OverviewWeb Operating System Overview
Web Operating System Overview
Madhu Bala
 
4 Essential Lessons for Adopting Predictive Analytics in Healthcare
4 Essential Lessons for Adopting Predictive Analytics in Healthcare4 Essential Lessons for Adopting Predictive Analytics in Healthcare
4 Essential Lessons for Adopting Predictive Analytics in Healthcare
Health Catalyst
 
Raspberry pi : an introduction
Raspberry pi : an introductionRaspberry pi : an introduction
Raspberry pi : an introduction
LTG Oxford
 
Service Oriented Architecture
Service Oriented ArchitectureService Oriented Architecture
Service Oriented Architecture
Robert Sim
 
Predictive Analytics - An Overview
Predictive Analytics - An OverviewPredictive Analytics - An Overview
Predictive Analytics - An Overview
MachinePulse
 
Data Mining in Healthcare: How Health Systems Can Improve Quality and Reduce...
Data Mining in Healthcare:  How Health Systems Can Improve Quality and Reduce...Data Mining in Healthcare:  How Health Systems Can Improve Quality and Reduce...
Data Mining in Healthcare: How Health Systems Can Improve Quality and Reduce...
Health Catalyst
 
Microsoft Azure a cloud computing platform
Microsoft Azure a cloud computing platformMicrosoft Azure a cloud computing platform
Microsoft Azure a cloud computing platform
Aayush Mohanka
 
Seminar Presentation Hadoop
Seminar Presentation HadoopSeminar Presentation Hadoop
Seminar Presentation Hadoop
Varun Narang
 
Microsoft Cloud Computing - Windows Azure Platform
Microsoft Cloud Computing - Windows Azure PlatformMicrosoft Cloud Computing - Windows Azure Platform
Microsoft Cloud Computing - Windows Azure Platform
David Chou
 
Hadoop introduction , Why and What is Hadoop ?
Hadoop introduction , Why and What is  Hadoop ?Hadoop introduction , Why and What is  Hadoop ?
Hadoop introduction , Why and What is Hadoop ?
sudhakara st
 
Ad

Similar to Digital spectacle by using cloud computing (20)

The Role of Threat Intelligence and Layered Securiy for Intrusion Prevention ...
The Role of Threat Intelligence and Layered Securiy for Intrusion Prevention ...The Role of Threat Intelligence and Layered Securiy for Intrusion Prevention ...
The Role of Threat Intelligence and Layered Securiy for Intrusion Prevention ...
JoAnna Cheshire
 
Cyber ppt
Cyber pptCyber ppt
Cyber ppt
Mandar Pathrikar
 
BriefingsDirect Transcript--How security leverages virtualization to counter ...
BriefingsDirect Transcript--How security leverages virtualization to counter ...BriefingsDirect Transcript--How security leverages virtualization to counter ...
BriefingsDirect Transcript--How security leverages virtualization to counter ...
Dana Gardner
 
Cloud Based intrusion Detection System
Cloud Based intrusion Detection SystemCloud Based intrusion Detection System
Cloud Based intrusion Detection System
IJMTST Journal
 
Avoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha SeltzerAvoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha Seltzer
Product of Things
 
New 03A Short Version New Trends in Computer Science.pptx
New 03A Short Version New Trends in Computer Science.pptxNew 03A Short Version New Trends in Computer Science.pptx
New 03A Short Version New Trends in Computer Science.pptx
SamahAdel16
 
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptxDomain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Infosectrain3
 
Internet of things (IoT) Architecture Security Analysis
Internet of things (IoT) Architecture Security AnalysisInternet of things (IoT) Architecture Security Analysis
Internet of things (IoT) Architecture Security Analysis
Daksh Raj Chopra
 
Car Security System #CSALS
Car Security System #CSALSCar Security System #CSALS
Car Security System #CSALS
Alex Vishwa
 
Mobile Day - App (In)security
Mobile Day - App (In)securityMobile Day - App (In)security
Mobile Day - App (In)security
Software Guru
 
Meletis Belsis -CSIRTs
Meletis Belsis -CSIRTsMeletis Belsis -CSIRTs
Meletis Belsis -CSIRTs
Meletis Belsis MPhil/MRes/BSc
 
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
North Texas Chapter of the ISSA
 
Crypto Vision Bot Using RSA Algorithm
Crypto Vision Bot Using RSA AlgorithmCrypto Vision Bot Using RSA Algorithm
Crypto Vision Bot Using RSA Algorithm
IRJET Journal
 
Sixth Sense Technology
Sixth Sense TechnologySixth Sense Technology
Sixth Sense Technology
IRJET Journal
 
Leandro Agrò
Leandro AgròLeandro Agrò
Leandro Agrò
GoWireless
 
Massive Data Collection
Massive Data CollectionMassive Data Collection
Massive Data Collection
Leandro Agro'
 
Fog computing
Fog computingFog computing
Fog computing
Ankit_ap
 
Ingrid Moerman, iMinds - UGent, iMinds The Conference 2013
Ingrid Moerman, iMinds - UGent, iMinds The Conference 2013Ingrid Moerman, iMinds - UGent, iMinds The Conference 2013
Ingrid Moerman, iMinds - UGent, iMinds The Conference 2013
imec
 
Sw assignment week12
Sw assignment week12Sw assignment week12
Sw assignment week12
you-ly05
 
OmniSpotlight 05-2014
OmniSpotlight 05-2014OmniSpotlight 05-2014
OmniSpotlight 05-2014
Anita Lösch
 
The Role of Threat Intelligence and Layered Securiy for Intrusion Prevention ...
The Role of Threat Intelligence and Layered Securiy for Intrusion Prevention ...The Role of Threat Intelligence and Layered Securiy for Intrusion Prevention ...
The Role of Threat Intelligence and Layered Securiy for Intrusion Prevention ...
JoAnna Cheshire
 
BriefingsDirect Transcript--How security leverages virtualization to counter ...
BriefingsDirect Transcript--How security leverages virtualization to counter ...BriefingsDirect Transcript--How security leverages virtualization to counter ...
BriefingsDirect Transcript--How security leverages virtualization to counter ...
Dana Gardner
 
Cloud Based intrusion Detection System
Cloud Based intrusion Detection SystemCloud Based intrusion Detection System
Cloud Based intrusion Detection System
IJMTST Journal
 
Avoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha SeltzerAvoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha Seltzer
Product of Things
 
New 03A Short Version New Trends in Computer Science.pptx
New 03A Short Version New Trends in Computer Science.pptxNew 03A Short Version New Trends in Computer Science.pptx
New 03A Short Version New Trends in Computer Science.pptx
SamahAdel16
 
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptxDomain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Infosectrain3
 
Internet of things (IoT) Architecture Security Analysis
Internet of things (IoT) Architecture Security AnalysisInternet of things (IoT) Architecture Security Analysis
Internet of things (IoT) Architecture Security Analysis
Daksh Raj Chopra
 
Car Security System #CSALS
Car Security System #CSALSCar Security System #CSALS
Car Security System #CSALS
Alex Vishwa
 
Mobile Day - App (In)security
Mobile Day - App (In)securityMobile Day - App (In)security
Mobile Day - App (In)security
Software Guru
 
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
North Texas Chapter of the ISSA
 
Crypto Vision Bot Using RSA Algorithm
Crypto Vision Bot Using RSA AlgorithmCrypto Vision Bot Using RSA Algorithm
Crypto Vision Bot Using RSA Algorithm
IRJET Journal
 
Sixth Sense Technology
Sixth Sense TechnologySixth Sense Technology
Sixth Sense Technology
IRJET Journal
 
Massive Data Collection
Massive Data CollectionMassive Data Collection
Massive Data Collection
Leandro Agro'
 
Fog computing
Fog computingFog computing
Fog computing
Ankit_ap
 
Ingrid Moerman, iMinds - UGent, iMinds The Conference 2013
Ingrid Moerman, iMinds - UGent, iMinds The Conference 2013Ingrid Moerman, iMinds - UGent, iMinds The Conference 2013
Ingrid Moerman, iMinds - UGent, iMinds The Conference 2013
imec
 
Sw assignment week12
Sw assignment week12Sw assignment week12
Sw assignment week12
you-ly05
 
OmniSpotlight 05-2014
OmniSpotlight 05-2014OmniSpotlight 05-2014
OmniSpotlight 05-2014
Anita Lösch
 
Ad

More from Mandar Pathrikar (6)

Service oriented cloud computing
Service oriented cloud computingService oriented cloud computing
Service oriented cloud computing
Mandar Pathrikar
 
Mission mumbai
Mission mumbaiMission mumbai
Mission mumbai
Mandar Pathrikar
 
Service oriented cloud computing
Service oriented cloud computingService oriented cloud computing
Service oriented cloud computing
Mandar Pathrikar
 
Smart security system for sensitive area by using image processing
Smart security system for sensitive area by using   image processingSmart security system for sensitive area by using   image processing
Smart security system for sensitive area by using image processing
Mandar Pathrikar
 
Enhancement in Laser Tchnology
Enhancement in Laser TchnologyEnhancement in Laser Tchnology
Enhancement in Laser Tchnology
Mandar Pathrikar
 
New world of Wireless
New world of WirelessNew world of Wireless
New world of Wireless
Mandar Pathrikar
 
Service oriented cloud computing
Service oriented cloud computingService oriented cloud computing
Service oriented cloud computing
Mandar Pathrikar
 
Service oriented cloud computing
Service oriented cloud computingService oriented cloud computing
Service oriented cloud computing
Mandar Pathrikar
 
Smart security system for sensitive area by using image processing
Smart security system for sensitive area by using   image processingSmart security system for sensitive area by using   image processing
Smart security system for sensitive area by using image processing
Mandar Pathrikar
 
Enhancement in Laser Tchnology
Enhancement in Laser TchnologyEnhancement in Laser Tchnology
Enhancement in Laser Tchnology
Mandar Pathrikar
 

Recently uploaded (20)

Everything You Need to Know About Agentforce? (Put AI Agents to Work)
Everything You Need to Know About Agentforce? (Put AI Agents to Work)Everything You Need to Know About Agentforce? (Put AI Agents to Work)
Everything You Need to Know About Agentforce? (Put AI Agents to Work)
Cyntexa
 
The Microsoft Excel Parts Presentation.pdf
The Microsoft Excel Parts Presentation.pdfThe Microsoft Excel Parts Presentation.pdf
The Microsoft Excel Parts Presentation.pdf
YvonneRoseEranista
 
The No-Code Way to Build a Marketing Team with One AI Agent (Download the n8n...
The No-Code Way to Build a Marketing Team with One AI Agent (Download the n8n...The No-Code Way to Build a Marketing Team with One AI Agent (Download the n8n...
The No-Code Way to Build a Marketing Team with One AI Agent (Download the n8n...
SOFTTECHHUB
 
On-Device or Remote? On the Energy Efficiency of Fetching LLM-Generated Conte...
On-Device or Remote? On the Energy Efficiency of Fetching LLM-Generated Conte...On-Device or Remote? On the Energy Efficiency of Fetching LLM-Generated Conte...
On-Device or Remote? On the Energy Efficiency of Fetching LLM-Generated Conte...
Ivano Malavolta
 
IT484 Cyber Forensics_Information Technology
IT484 Cyber Forensics_Information TechnologyIT484 Cyber Forensics_Information Technology
IT484 Cyber Forensics_Information Technology
SHEHABALYAMANI
 
Agentic Automation - Delhi UiPath Community Meetup
Agentic Automation - Delhi UiPath Community MeetupAgentic Automation - Delhi UiPath Community Meetup
Agentic Automation - Delhi UiPath Community Meetup
Manoj Batra (1600 + Connections)
 
Kit-Works Team Study_팀스터디_김한솔_nuqs_20250509.pdf
Kit-Works Team Study_팀스터디_김한솔_nuqs_20250509.pdfKit-Works Team Study_팀스터디_김한솔_nuqs_20250509.pdf
Kit-Works Team Study_팀스터디_김한솔_nuqs_20250509.pdf
Wonjun Hwang
 
Canadian book publishing: Insights from the latest salary survey - Tech Forum...
Canadian book publishing: Insights from the latest salary survey - Tech Forum...Canadian book publishing: Insights from the latest salary survey - Tech Forum...
Canadian book publishing: Insights from the latest salary survey - Tech Forum...
BookNet Canada
 
The Future of Cisco Cloud Security: Innovations and AI Integration
The Future of Cisco Cloud Security: Innovations and AI IntegrationThe Future of Cisco Cloud Security: Innovations and AI Integration
The Future of Cisco Cloud Security: Innovations and AI Integration
Re-solution Data Ltd
 
MINDCTI revenue release Quarter 1 2025 PR
MINDCTI revenue release Quarter 1 2025 PRMINDCTI revenue release Quarter 1 2025 PR
MINDCTI revenue release Quarter 1 2025 PR
MIND CTI
 
Web and Graphics Designing Training in Rajpura
Web and Graphics Designing Training in RajpuraWeb and Graphics Designing Training in Rajpura
Web and Graphics Designing Training in Rajpura
Erginous Technology
 
AsyncAPI v3 : Streamlining Event-Driven API Design
AsyncAPI v3 : Streamlining Event-Driven API DesignAsyncAPI v3 : Streamlining Event-Driven API Design
AsyncAPI v3 : Streamlining Event-Driven API Design
leonid54
 
Zilliz Cloud Monthly Technical Review: May 2025
Zilliz Cloud Monthly Technical Review: May 2025Zilliz Cloud Monthly Technical Review: May 2025
Zilliz Cloud Monthly Technical Review: May 2025
Zilliz
 
Challenges in Migrating Imperative Deep Learning Programs to Graph Execution:...
Challenges in Migrating Imperative Deep Learning Programs to Graph Execution:...Challenges in Migrating Imperative Deep Learning Programs to Graph Execution:...
Challenges in Migrating Imperative Deep Learning Programs to Graph Execution:...
Raffi Khatchadourian
 
Mastering Testing in the Modern F&B Landscape
Mastering Testing in the Modern F&B LandscapeMastering Testing in the Modern F&B Landscape
Mastering Testing in the Modern F&B Landscape
marketing943205
 
Transcript: Canadian book publishing: Insights from the latest salary survey ...
Transcript: Canadian book publishing: Insights from the latest salary survey ...Transcript: Canadian book publishing: Insights from the latest salary survey ...
Transcript: Canadian book publishing: Insights from the latest salary survey ...
BookNet Canada
 
The Changing Compliance Landscape in 2025.pdf
The Changing Compliance Landscape in 2025.pdfThe Changing Compliance Landscape in 2025.pdf
The Changing Compliance Landscape in 2025.pdf
Precisely
 
Unlocking Generative AI in your Web Apps
Unlocking Generative AI in your Web AppsUnlocking Generative AI in your Web Apps
Unlocking Generative AI in your Web Apps
Maximiliano Firtman
 
UiPath Automation Suite – Cas d'usage d'une NGO internationale basée à Genève
UiPath Automation Suite – Cas d'usage d'une NGO internationale basée à GenèveUiPath Automation Suite – Cas d'usage d'une NGO internationale basée à Genève
UiPath Automation Suite – Cas d'usage d'une NGO internationale basée à Genève
UiPathCommunity
 
Q1 2025 Dropbox Earnings and Investor Presentation
Q1 2025 Dropbox Earnings and Investor PresentationQ1 2025 Dropbox Earnings and Investor Presentation
Q1 2025 Dropbox Earnings and Investor Presentation
Dropbox
 
Everything You Need to Know About Agentforce? (Put AI Agents to Work)
Everything You Need to Know About Agentforce? (Put AI Agents to Work)Everything You Need to Know About Agentforce? (Put AI Agents to Work)
Everything You Need to Know About Agentforce? (Put AI Agents to Work)
Cyntexa
 
The Microsoft Excel Parts Presentation.pdf
The Microsoft Excel Parts Presentation.pdfThe Microsoft Excel Parts Presentation.pdf
The Microsoft Excel Parts Presentation.pdf
YvonneRoseEranista
 
The No-Code Way to Build a Marketing Team with One AI Agent (Download the n8n...
The No-Code Way to Build a Marketing Team with One AI Agent (Download the n8n...The No-Code Way to Build a Marketing Team with One AI Agent (Download the n8n...
The No-Code Way to Build a Marketing Team with One AI Agent (Download the n8n...
SOFTTECHHUB
 
On-Device or Remote? On the Energy Efficiency of Fetching LLM-Generated Conte...
On-Device or Remote? On the Energy Efficiency of Fetching LLM-Generated Conte...On-Device or Remote? On the Energy Efficiency of Fetching LLM-Generated Conte...
On-Device or Remote? On the Energy Efficiency of Fetching LLM-Generated Conte...
Ivano Malavolta
 
IT484 Cyber Forensics_Information Technology
IT484 Cyber Forensics_Information TechnologyIT484 Cyber Forensics_Information Technology
IT484 Cyber Forensics_Information Technology
SHEHABALYAMANI
 
Kit-Works Team Study_팀스터디_김한솔_nuqs_20250509.pdf
Kit-Works Team Study_팀스터디_김한솔_nuqs_20250509.pdfKit-Works Team Study_팀스터디_김한솔_nuqs_20250509.pdf
Kit-Works Team Study_팀스터디_김한솔_nuqs_20250509.pdf
Wonjun Hwang
 
Canadian book publishing: Insights from the latest salary survey - Tech Forum...
Canadian book publishing: Insights from the latest salary survey - Tech Forum...Canadian book publishing: Insights from the latest salary survey - Tech Forum...
Canadian book publishing: Insights from the latest salary survey - Tech Forum...
BookNet Canada
 
The Future of Cisco Cloud Security: Innovations and AI Integration
The Future of Cisco Cloud Security: Innovations and AI IntegrationThe Future of Cisco Cloud Security: Innovations and AI Integration
The Future of Cisco Cloud Security: Innovations and AI Integration
Re-solution Data Ltd
 
MINDCTI revenue release Quarter 1 2025 PR
MINDCTI revenue release Quarter 1 2025 PRMINDCTI revenue release Quarter 1 2025 PR
MINDCTI revenue release Quarter 1 2025 PR
MIND CTI
 
Web and Graphics Designing Training in Rajpura
Web and Graphics Designing Training in RajpuraWeb and Graphics Designing Training in Rajpura
Web and Graphics Designing Training in Rajpura
Erginous Technology
 
AsyncAPI v3 : Streamlining Event-Driven API Design
AsyncAPI v3 : Streamlining Event-Driven API DesignAsyncAPI v3 : Streamlining Event-Driven API Design
AsyncAPI v3 : Streamlining Event-Driven API Design
leonid54
 
Zilliz Cloud Monthly Technical Review: May 2025
Zilliz Cloud Monthly Technical Review: May 2025Zilliz Cloud Monthly Technical Review: May 2025
Zilliz Cloud Monthly Technical Review: May 2025
Zilliz
 
Challenges in Migrating Imperative Deep Learning Programs to Graph Execution:...
Challenges in Migrating Imperative Deep Learning Programs to Graph Execution:...Challenges in Migrating Imperative Deep Learning Programs to Graph Execution:...
Challenges in Migrating Imperative Deep Learning Programs to Graph Execution:...
Raffi Khatchadourian
 
Mastering Testing in the Modern F&B Landscape
Mastering Testing in the Modern F&B LandscapeMastering Testing in the Modern F&B Landscape
Mastering Testing in the Modern F&B Landscape
marketing943205
 
Transcript: Canadian book publishing: Insights from the latest salary survey ...
Transcript: Canadian book publishing: Insights from the latest salary survey ...Transcript: Canadian book publishing: Insights from the latest salary survey ...
Transcript: Canadian book publishing: Insights from the latest salary survey ...
BookNet Canada
 
The Changing Compliance Landscape in 2025.pdf
The Changing Compliance Landscape in 2025.pdfThe Changing Compliance Landscape in 2025.pdf
The Changing Compliance Landscape in 2025.pdf
Precisely
 
Unlocking Generative AI in your Web Apps
Unlocking Generative AI in your Web AppsUnlocking Generative AI in your Web Apps
Unlocking Generative AI in your Web Apps
Maximiliano Firtman
 
UiPath Automation Suite – Cas d'usage d'une NGO internationale basée à Genève
UiPath Automation Suite – Cas d'usage d'une NGO internationale basée à GenèveUiPath Automation Suite – Cas d'usage d'une NGO internationale basée à Genève
UiPath Automation Suite – Cas d'usage d'une NGO internationale basée à Genève
UiPathCommunity
 
Q1 2025 Dropbox Earnings and Investor Presentation
Q1 2025 Dropbox Earnings and Investor PresentationQ1 2025 Dropbox Earnings and Investor Presentation
Q1 2025 Dropbox Earnings and Investor Presentation
Dropbox
 

Digital spectacle by using cloud computing

  • 1. Digital Spectacles byDigital Spectacles by usingusing cloud Computing.cloud Computing. Third Year Of Computer EngineeringThird Year Of Computer Engineering.. Imperial college of engineering and Research, Wagholi, Nagar Road. ,Pune-421207.Imperial college of engineering and Research, Wagholi, Nagar Road. ,Pune-421207. Submitted by...Submitted by... Mr. Mandar pathrikar.Mr. Mandar pathrikar.
  • 2. Digital spectaclesDigital spectacles  Digital spectacles is the newDigital spectacles is the new invention in the science ,this isinvention in the science ,this is beneficial for all cops.beneficial for all cops.  A small camera fitted to theA small camera fitted to the glasses can capture 400 facialglasses can capture 400 facial images per second and sendimages per second and send them to a central computerthem to a central computer database storing up to 13database storing up to 13 million faces.million faces.  The system can compareThe system can compare biometric data at 46,000 pointsbiometric data at 46,000 points on a face and will immediatelyon a face and will immediately signal any matches to knownsignal any matches to known criminals or people wanted bycriminals or people wanted by
  • 3. Criminal Information present at Different location Encryption of data Cloud Decryption of data Mobile
  • 4. What is Cloud ComputingWhat is Cloud Computing  ““Cloud” is a collective term forCloud” is a collective term for a large number of developmentsa large number of developments and possibilities. It is not anand possibilities. It is not an invention, but more of ainvention, but more of a “practical innovation”.“practical innovation”.  Dynamically scalable sharedDynamically scalable shared resourcesresources  accessed over a networkaccessed over a network  Only pay for what you useOnly pay for what you use  Shared internally or with otherShared internally or with other customerscustomers  Resources = Storage,Resources = Storage, computing, services, etc.computing, services, etc.  Internal network or InternetInternal network or Internet
  • 6. Deployment ModelsDeployment Models  ••PublicPublic Cloud infrastructure isCloud infrastructure is available to the generalavailable to the general publicpublic, owned by org selling cloud services, owned by org selling cloud services  ••PrivatePrivate Cloud infrastructureCloud infrastructure for single org onlyfor single org only, may be, may be managed by the org or a 3managed by the org or a 3rdrd party, on or offparty, on or off premisepremise
  • 7. How Can I Create personal CloudHow Can I Create personal Cloud  Iomega Personal Cloud is a new technology that createsIomega Personal Cloud is a new technology that creates your own Internet connected “cloud” network of Storyour own Internet connected “cloud” network of Stor Center storage devices, personal computers andCenter storage devices, personal computers and handheld mobile devices, which allows you to connect,handheld mobile devices, which allows you to connect, share, copy and protect your files within your network.share, copy and protect your files within your network.  Installing this software in our devices and connectingInstalling this software in our devices and connecting through internet ,we can create our own cloud.through internet ,we can create our own cloud.
  • 8. Working of cloud spectsWorking of cloud spects
  • 9. Lumus LOE technologyLumus LOE technology
  • 10. Lumus LOE technologyLumus LOE technology  Lumus has developed a unique technology it calls Light-Lumus has developed a unique technology it calls Light- guide Optical Element (LOE). The Lumus video-glassesguide Optical Element (LOE). The Lumus video-glasses are connected either wired or wirelessly to a mediaare connected either wired or wirelessly to a media source, such as a cell phone, which transfers the videosource, such as a cell phone, which transfers the video image into a micro projector embedded in the temple ofimage into a micro projector embedded in the temple of the eyeglasses.the eyeglasses.  The image travels through the lens by way of TotalThe image travels through the lens by way of Total Internal Reflection (TIR).Internal Reflection (TIR).  TIR is an optical phenomenon that occurs when lightTIR is an optical phenomenon that occurs when light strikes a medium boundary at a steep angle. If thestrikes a medium boundary at a steep angle. If the refractive index is lower on the other side of therefractive index is lower on the other side of the boundary, no light can pass through, effectively reflectingboundary, no light can pass through, effectively reflecting all of the light.all of the light.
  • 11. Head-Mounted display-:Head-Mounted display-: ((Sight of death)Sight of death)  This Technology used in the Fighter planes for targetingThis Technology used in the Fighter planes for targeting their targets.their targets.  The idea of a pilot directing a missile to its target byThe idea of a pilot directing a missile to its target by simply looking at it .simply looking at it .  You want the image to be large, the device has to beYou want the image to be large, the device has to be large; if you want the device to be small, the image willlarge; if you want the device to be small, the image will be small.be small.
  • 13. Security of cloudSecurity of cloud  Security of cloud is the main feature of thisSecurity of cloud is the main feature of this technology. Data which contain in the cloud istechnology. Data which contain in the cloud is very precocious that's why we have to use it invery precocious that's why we have to use it in encryption form.encryption form.  ““Nessus vulnerability scannerNessus vulnerability scanner “ it is the“ it is the technology which is used in the Multi nationaltechnology which is used in the Multi national companies for sending data from one place tocompanies for sending data from one place to another .Data is totally in encryption form soanother .Data is totally in encryption form so that it is most secure in form.that it is most secure in form.
  • 14. Nessus vulnerability scannerNessus vulnerability scanner
  • 15. Nessus vulnerability scannerNessus vulnerability scanner  This is the most secure technology which isThis is the most secure technology which is mostly used in the Multinational companies formostly used in the Multinational companies for sending data from one state to another .sending data from one state to another .  Nessus scanner when send the data it is in theNessus scanner when send the data it is in the encryption form so that it is difficult to predict ifencryption form so that it is difficult to predict if any one try to do that then whole algorithmany one try to do that then whole algorithm change within 5min. And data sending againchange within 5min. And data sending again started.started.
  • 17. Radar PageRadar Page  The Radar Page was designed and built to caterThe Radar Page was designed and built to cater for the demands of Government and Militaryfor the demands of Government and Military networks requiring near real time information onnetworks requiring near real time information on new and emerging cyber threats.new and emerging cyber threats.  The page auto updates every 20 minutes drawingThe page auto updates every 20 minutes drawing information from multiple sources.information from multiple sources.  If any threats or illegal access is found than theIf any threats or illegal access is found than the scanner note down the IP Address and put itscanner note down the IP Address and put it into list and appropriate action we can easilyinto list and appropriate action we can easily take.take.
  • 18. ConclusionConclusion  Digital spectacles are the latest technology in case ofDigital spectacles are the latest technology in case of security purpose. Many social problems we can sort usingsecurity purpose. Many social problems we can sort using it.it.  Many Disasters we can avoid by using this technology.Many Disasters we can avoid by using this technology.  Cloud security is very up coming future technology.Cloud security is very up coming future technology.  With the help of Cloud Security and digital spectacles weWith the help of Cloud Security and digital spectacles we can stop Crimes in the society And Find out the Missingcan stop Crimes in the society And Find out the Missing personal.personal.  Increases business responsiveness.Increases business responsiveness.  Uses IT resources efficiently via sharing and higher systemUses IT resources efficiently via sharing and higher system utilization Cultivates skills for next generation workforce.utilization Cultivates skills for next generation workforce.