Thomas (Tom)
Newbie
Offline
Activity: 40
Merit: 0
|
|
June 13, 2018, 08:44:16 AM |
|
speaks volume of the project, i really love project with dedicated team members, it shows they won't leave out tasks in the nearest future because the niche they choose is a very tasking one.
|
|
|
|
Sharjeel.97
Newbie
Offline
Activity: 61
Merit: 0
|
|
June 13, 2018, 09:37:00 AM |
|
The main characteristic of Cloud computing is broad network access, which means resources can be accessed from anywhere through a standard mechanism by thin or thick client platforms such mobile phone, laptop, and desktop computer.
|
|
|
|
Felicity no.1
Newbie
Offline
Activity: 50
Merit: 0
|
|
June 13, 2018, 09:54:47 AM |
|
Blockchain is a technology that has many applications and holds vast promise for every business, society and individual person. Blockchain consists of blocks of transactions that allow the person to share digital ledger across a network of computers without the need of central authority. No single organization or party have the authority to tamper with your transaction records. CloudFish is using Blockchain in a very impressive way.
|
|
|
|
Simon 66
Newbie
Offline
Activity: 26
Merit: 0
|
|
June 14, 2018, 03:40:35 AM |
|
What a very dedicated project to establish security into the blockchain world. I strongly support this project
|
|
|
|
Tom Welling
Newbie
Offline
Activity: 14
Merit: 0
|
|
June 14, 2018, 09:29:53 AM |
|
The concept looks very interesting and singular your goals could give the investors a great reward when you achieved it... Now you gain a new follower!!
|
|
|
|
rockerzofIco
Newbie
Offline
Activity: 100
Merit: 0
|
|
June 14, 2018, 03:02:57 PM |
|
CloudFish developed a security platform that enables companies and individual users to secure their assets stored in the cloud using blockchain technology. Instead of relying on a single private key stored on a server that can be hacked or stolen, CloudFish developed a unique technology that splits the users’ private security key into millions of fragments and store it in blockchain thereby making it impossible for someone to steal or hack the key. The dynamic construction of encryption keys using blockchain provides a fool-proof mechanism to secure the digital assets like documents, files, emails etc. and crypto-currency keys stored in the cloud.
|
|
|
|
Felicity no.1
Newbie
Offline
Activity: 50
Merit: 0
|
|
June 14, 2018, 03:19:20 PM |
|
I predict because of the blockchain technology CloudFish-a key innovator in cloud security software built on blockchain will play a vital role for cloud security and the team looks pretty good which is a mixture of blockchain technology expert and software giant having three decade experience.
|
|
|
|
spartanec1
Newbie
Offline
Activity: 84
Merit: 0
|
|
June 15, 2018, 10:09:23 AM |
|
What a very dedicated project to establish security into the blockchain world. I strongly support this project
|
|
|
|
Couldmimenti
Newbie
Offline
Activity: 9
Merit: 0
|
|
June 15, 2018, 10:27:02 AM |
|
The basic thing that in the future it has provided the growth of the idea. Good luck.
|
|
|
|
Allison Jane
Newbie
Offline
Activity: 32
Merit: 0
|
|
June 15, 2018, 10:47:28 AM |
|
Cloud computing was defined by the US National Institute of Standards and Technology (NIST) “a cloud computing as a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.”
|
|
|
|
Felicity no.1
Newbie
Offline
Activity: 50
Merit: 0
|
|
June 15, 2018, 10:50:21 AM |
|
When implementing cloud projects, security is one of the most important issues. It requires companies to identify and understand the risks inherent to digitization, public networks and outsourcing of infrastructure components.Companies still fear that their data is insecure with cloud systems. Businesses are moving their data from on-premise servers to cloud. And second, as the block- chain assets’ market like crypto-currencies is getting traction, the business decision makers are planning to diversify their assets and invest in the crypto-currencies. The commercial security products and crypto-currency wallets available in the market today, rely on encryption-based security using a single private key that is stored either on a local computer or an external cloud server. If the key is lost, stolen or hacked, the digital asset is lost. This creates the need for an enterprise class solution that provides a more robust and unified security solution not only for the digital assets like documents, files, emails etc. but also for the crypto-currency assets stored in the cloud. Security breaches in external cloud servers, internal and external intrusions and hacking by individuals and foreign governments poses a critical threat to the enterprise data stored on commercial cloud servers. The security of the cloud server is managed by the cloud service providers and the companies have little control over the security of their data and no significant legal remedies if their data or crypto currency assets are compromised on the cloud server.
|
|
|
|
Sharjeel.97
Newbie
Offline
Activity: 61
Merit: 0
|
|
June 15, 2018, 10:53:57 AM |
|
Cloud application architectures are made up of elements of the three cloud reference models: infrastructure-as-a-service (IaaS), platform-as-a-service (PaaS) and software-as-a-service (SaaS). With IaaS, the cloud vendor provides only the physical or virtual infrastructure. From this level, the user is the administrator of the network and system infrastructure, applications and data. With PaaS, the cloud provider manages the entire infrastructure, including middleware components such as databases. The application and data content comes from the cloud consumer. SaaS means that a cloud provider provides everything from the infrastructure to the application — the cloud consumer only adds the data and accesses it.
|
|
|
|
Thomas (Tom)
Newbie
Offline
Activity: 40
Merit: 0
|
|
June 19, 2018, 04:26:21 AM |
|
I must say this is a project in its own zone, very interesting and exciting. More like hacker's trying to stop hacker's. Boy i know i am going to love this project to the fullest. Off to look at the whitepaper.
|
|
|
|
KristenDom
Newbie
Offline
Activity: 17
Merit: 0
|
|
June 19, 2018, 05:04:41 AM |
|
I believe this business is very interesting and cool! Apperceptive results, classy results, riveting design.
|
|
|
|
liam spencer
Newbie
Offline
Activity: 20
Merit: 0
|
|
June 19, 2018, 05:28:57 AM |
|
This an amazing project, I just glanced through their website and also the white-paper, this project has great attributes.i like the fact they are working towards giving your security team an unfair advantage over hackers.
|
|
|
|
Sharjeel.97
Newbie
Offline
Activity: 61
Merit: 0
|
|
June 19, 2018, 10:46:34 AM |
|
CloudFish developed a security platform that enables companies and individual users to secure their assets stored in the cloud using blockchain technology. it use machine learning algorithms to automate threat detection and control before it becomes a risk to the security of users’ assets.
|
|
|
|
Miles Max
Newbie
Offline
Activity: 23
Merit: 0
|
|
June 19, 2018, 11:11:10 AM |
|
Encryption is based on asymmetric cryptography, so there is a public and a private key involved. For each dataset present in the system, the owner generates a special public/private key pair and encrypts the data with the public key, while not giving away the corresponding private key.
|
|
|
|
Allison Jane
Newbie
Offline
Activity: 32
Merit: 0
|
|
June 19, 2018, 11:14:08 AM |
|
Cloud storage is convenient and gives employees access to their data anywhere, at any time, on nearly any device, cloud storage security is a top concern for organizations’ IT and security departments. The benefits brought by cloud storage from scalability and accessibility to decreased IT overhead are driving rapid adoption at enterprises around the world, and there are steps that companies should take to improve cloud storage security and keep sensitive data safe and secure in the cloud.
|
|
|
|
Felicity no.1
Newbie
Offline
Activity: 50
Merit: 0
|
|
June 19, 2018, 11:17:53 AM |
|
CloudFish is using an approach to secure data that leverages the block-chain technology. Interesting Project !
|
|
|
|
Risen4610
Newbie
Offline
Activity: 44
Merit: 0
|
|
June 19, 2018, 11:19:30 AM |
|
Project looks interesting! (Y) I have a question. What makes this coin superior to Storj ?
Thanks for your compliments. Regarding your question, Storj and CloudFish, although the two companies share some common strengths, their products are completely different and targeting different market segments. Storj's product is in the cloud storage while CloudFish's product is in the cloud security space. CloudFish Enterprise Security Suite consists of three main functional components: The Cloud Access Security Broker (CASB) and the Cloud Data Encryption Interface (CDEI). Cloud Access Security Broker (CASB)The CloudFish CASB uses a proprietary algorithm to store and manage users’ encryption keys using block chain technology. Unlike the traditional CASB products available in the market that stores users’ private encryption keys on a single server, the CloudFish CASB splits the users’ keys into fragments and stores it in blockchain. This makes it virtually impossible for a hacker to steal users’ private keys and the digital assets protected through those keys. CloudFish uses a proprietary algorithm to dynamically construct and store users’ keys in the blockchain. The reconstruction and validation mechanism implemented by CloudFish for users’ encryption keys is very similar to the way blockchain validates your cryptocurrency transactions. The use of blockchain for security keys validation makes it not only impossible to steal but also makes it easy for the user to access it anytime from any platform……means you don’t have to worry what happens to my crypto wallet if my laptop is stolen or lost or if the wallet company’s server gets hacked. Cloud Data Encryption InterfaceThe Cloud data encryption interface provides a transparent security layer on top of commercially available cloud services. This layer automatically encrypts any data going to the public cloud and decrypts it when the data is received on the local machine. This encryption layer uses the industry-standard AES 256-bit encryption and it is built on top of the public interfaces provided by commercial cloud services provider. In release 1.0, CloudFish product has been integrated with Dropbox, Google Drive, Box and Microsoft OneDrive. In release 2.0, additional integrations are planned including Amazon Web Service (AWS) Salesforce.com, Slack and IBM Cloud. CLOUDFISH CLOUD SERVICES GATEWAY (CSG)CloudFish Cloud Services Gateway (CSG) is a separate licensable product which integrates with CloudFish Enterprise Security Server. The CSG provides enterprise data services related to security including automatic detection and control of security threats for the data, the companies store on commercial cloud servers. The CSG is an agent-based software. Each node in the enterprise network (laptop, desktop, server etc.) runs a CloudFish agent software that monitors the network use pattern on that machine. It uses the artificial intelligence technology and machine learning algorithms to detect unusual activities like suspicious login attempts, hacking or intrusion attempts, ransomware or a potential spyware or malware activity on each. Upon detection of a suspicious activity on a node, the CloudFish agent running on that node immediately takes preventive actions on that node and it triggers an ‘alarm’ about the security risks that propagates to other nodes in the network . Upon receiving this information, the agent software running on other nodes takes preventive actions to isolate themselves from the network threat. This sharing and learning about network threats among different network nodes acts like a ‘collective network wisdom’ which minimizes the risk of large-scale data loss and services interruption for the enterprise. I just read your explain about project. This great to protect our data from hacker with router. it's an interesting project and security is going to be very high in demand in the coming years with IOT and new technologies, there will be holes and vulnerabilities in applications and networks as technology advances. I'm glad to see a project which is trying to take care of this.
|
|
|
|
|