Show Posts
|
Pages: [1] 2 »
|
The importance of security these days cannot be stressed enough. Security is the forefront of cloud. I think this project is the platform which can provide us security at its best.
|
|
|
The blockchain is a chain of blocks which contains information. this technique was originally invented in 1991 by a group of researchers. however, it remains as a mostly unused until it was adopted by Satoshi Nakamoto in 2009 meanwhile a project of creating digital cryptocurrency bitcoin. Blockchain is a distributed ledger which is completely open to anyone. Once some data has been recorded inside the blockchain it becomes very very difficult to change it. So, how does that work. well, let's think about a single block in the blockchain. each block contains some data and hash of the block and hash of the previous block. the data that stored inside the block depends on the type of the blockchain. Bitcoin blockchain for example stores the details about transaction here suggests the sender, receiver and the amount of coins. a block also has a hash, you can compare a hash to a fingerprint. it identifies a block and all of its content and it is always unique such as fingerprints.once a block is created its hashes been calculated, changing something inside the block will cause the hash to change.so in another words hashes are very useful when you want to detect changes of a block. The third element inside a block is the hash of the previous block. and this creates a chain of blocks and this is the technique which makes the blockchain so secure.
|
|
|
Artificial intelligence is now a mainstay in helping businesses better secure themselves. cloudfish uses artificialintelligence and machinelearning techniques to automate threat detection and control before it becomes a risk to the security of users’ assets.
|
|
|
CloudFish is using Block-chain in a very unique way, The CloudFish CASB uses a proprietary algorithm to store and manage users’ encryption keys using block chain technology. Unlike the traditional CASB products available in the market that stores users’ private encryption keys on a single server, the CloudFish CASB splits the users’ keys into fragments and stores it in blockchain. This makes it virtually impossible for a hacker to steal users’ private keys and the digital assets protected through those keys. CloudFish uses a proprietary algorithm to dynamically construct and store users’ keys in the blockchain. The reconstruction and validation mechanism implemented by CloudFish for users’ encryption keys is very similar to the way blockchain validates your cryptocurrency transactions. The use of blockchain for security keys validation makes it not only impossible to steal but also makes it easy for the user to access it anytime from any platform……means you don’t have to worry what happens to my crypto wallet if my laptop is stolen or lost or if the wallet company’s server gets hacked.
|
|
|
CloudFish CSG uses machine learning algorithms to proactively detect and control suspicious user activity, network intrusion, hacking attempts, ransomware and malware activity.
|
|
|
I strongly believe that this project is one of the best project in 2018, Don’t forget to contribute and join on this project.
|
|
|
CloudFish offers a flexible deployment model for its customers. A SaaS based deployment model available for SMBs and individual users. An enterprise security server option available for large enterprises.
|
|
|
We are building revolutionizing products for the Cloud and Blockchain on a SaaS-based model. Innovative ApproachBacked by researchers from the Georgia Institute of Technology, CloudFish has built an innovative approach to secure both digital and block chain assets on a single unified platform. Flexible DeploymentCloudFish offers a flexible deployment model for its customers. A SaaS based deployment model available for SMBs and individual users. An enterprise security server option available for large enterprises. Industry Standard TechnologyCloudFish technology is platform independent and the product is built using industry standard technologies to integrate with other platforms. Accessible from Web, Mobile or Desktop computers. Uses AES 256-bit encryption and SSL for security. Please check out our web site for details about the key innovation we are bringing to the cloud security industry www.cloud-fish.ioWhite paper cloud-fish.io/CloudFishWhitepaper.pdf
|
|
|
CloudFish completely makes impossible for the systems to be hacked or sensitive data stolen. Excellent project.
|
|
|
Cloud computing is composed of many technologies such as service oriented architecture, virtualization, and more. Cloud computing offers highly efficient data retrieval and availability. Cloud providers are taking the responsibility of resource optimization.
|
|
|
Blockchain promises to solve security problems. The technology at the heart of bitcoin and other virtual currencies, blockchain is an open, distributed ledger that can record transactions between two parties efficiently and in a verifiable and permanent way. The ledger itself can also be programmed to trigger transactions automatically.
|
|
|
I have noticed cloudfish is suitable for every entity when it comes to provide security to any individual or any company. Looking forward to see the success of this great project.
|
|
|
Cloud security controls can be classified in a tiered model. Front-end security handles authentication and authorization. The middle layer deals with VM (virtual machine) security, OS security, etc. Back-end security handles storage security, data and database security, network security, etc. Delivering assured and verifiable security in the cloud requires separate architectures for security and trust, as well as a framework for governance.
|
|
|
If you are looking for best ICO, then you are looking for CloudFish. CloudFish is relatively a new ICO that was launched and promises alot, as they are best in providing security.
|
|
|
Cloud storage is convenient and gives employees access to their data anywhere, at any time, on nearly any device, cloud storage security is a top concern for organizations’ IT and security departments. The benefits brought by cloud storage from scalability and accessibility to decreased IT overhead are driving rapid adoption at enterprises around the world, and there are steps that companies should take to improve cloud storage security and keep sensitive data safe and secure in the cloud.
|
|
|
Cloud computing was defined by the US National Institute of Standards and Technology (NIST) “a cloud computing as a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.”
|
|
|
Cryptocurrency is a form of digital money that is designed to be secure and, in many cases, anonymous.
It is a currency associated with the internet that uses cryptography, the process of converting legible information into an almost uncrackable code, to track purchases and transfers.
|
|
|
Cloud computing does not only create new security and privacy risks, it also provides opportunities to provision improved security services and privacy capabilities that are better than those many organizations implement on their own. Cloud service providers can offer advanced security and privacy capabilities that leverage their scale and their skills at automating infrastructure management tasks, including cloud services offering security capabilities and security tools built into SaaS offerings.
|
|
|
Cloud computing now is everywhere. In many cases, users are using the cloud without knowing they are using it. Small and medium organizations will move to cloud computing because it will support fast access to their application and reduce the cost of infrastructure. The Cloud computing is not only a technical solution but also a business model that computing power can be sold and rented. Cloud computing is focused on delivering services. Organization data are being hosted in the cloud.
|
|
|
CloudFish ICO- CloudFish is a startup backed by GeorgiaTech’s accelerator in the United States and has recently announce plans for an ICO. CloudFish developed a security platform that enables companies and individual users to secure their assets stored in the cloud using blockchain technology.
|
|
|
|