Date post: | 07-Aug-2015 |
Category: |
Engineering |
Upload: | pabna-university-of-science-and-technology |
View: | 27 times |
Download: | 4 times |
Building an Efficient Security ModelOn Cloud Data Storage
Presented By
Utpaul SarkarID:110144
Supervised By
Md. Mahmudul HasanLecturer, Dept. of CSE, PUST
Course Title: Thesis
Department of Computer Science and EngineeringPabna University of Science and Technology
Presentation Outline
Department of Computer Science and EngineeringPabna University of Science and Technology
Objective
Cloud Computing
Literature Review
Research Problem
Research Plan
Constraints
Objective
Department of Computer Science and EngineeringPabna University of Science and Technology
To provide accuracy and security of better storage
To provide fast localization of data error
To maintain smooth operation
Cloud Computing
Department of Computer Science and EngineeringPabna University of Science and Technology
Literature Review
Department of Computer Science and EngineeringPabna University of Science and Technology
Services and Development Model of Cloud Computing
Cloud ClientsWeb browser, mobile app, clients
SaaSCRM, Email, games, virtual desktop
PaaSDatabase, web server, deployment
tools
IaaSVirtual machines, storage, networks
Application
Platform
Infrastructure
Literature Review(Cont.)
Department of Computer Science and EngineeringPabna University of Science and Technology
Lower Computer
Cost
Improved Performance
Increased data
reliability
Universal document
access
Reduced software
costs
Unlimited storage capacity
Improved document
format
compatibility
Instant software updates
Advantages Disadvantages
Stored data might not be secure
Features might be limited
Does not work well with low-speed connections
Requires a constant Internet connection
Literature Review(Cont.)
Department of Computer Science and EngineeringPabna University of Science and Technology
Application of Cloud Computing Social Networking
E-mail Sites
Search Engines
Research Problem
Department of Computer Science and EngineeringPabna University of Science and Technology
Security Threats Internal Attacks
External Attacks
Design Goal Storage accuracy
Supporting dynamic data
Lightweight
Security of data
Research plan
Department of Computer Science and EngineeringPabna University of Science and Technology
Exiting Solutions Key Generation Module
Signature Generation Module
Proof Generation Module
Proof Verification Module
Proposed
Solutions On Study