Date post: | 16-Jul-2015 |
Category: |
Engineering |
Upload: | sandip-karale |
View: | 56 times |
Download: | 5 times |
Presented By
Dheeraj Katariya (B80428545),
Sandip Karale (B80428544),
Sanket Bora (B80428513),
Ganesh Shejwal (B80428570).
Guided By
Prof. S. D. Babar.
Cloud Computing Security From
Single to Multi-Cloud
CONTENT
Problem Statement
Cloud Computing
Deployment Model
Cloud Computing Security
Multi-clouds
Architecture
Hardware Requirements
Software Requirements
System Design
Conclusion
Futures Scope 4/10/2015Sinhgad Institute of Technology , Lonavala 2
PROBLEM STATEMENT
• Dealing with “single cloud” providers is predicted to becomeless popular with customers due to risks of service availabilityfailure and the possibility of malicious insiders in the singlecloud.
• A movement towards “multi-clouds”, or in other words,“interclouds” or “cloud-of-clouds” has emerged recently.
4/10/2015Sinhgad Institute of Technology , Lonavala 3
WHAT IS CLOUD COMPUTING ?
• Cloud computing is a model for enabling ubiquitous(present),convenient, on-demand network access to a shared pool ofconfigurable computing resources (e.g., networks, servers,storage, applications, and services) that can be rapidlyprovisioned and released with minimal management effort orservice provider interaction.
• This cloud model is composed of five essential characteristics,three service models, and four deployment models.
4/10/2015Sinhgad Institute of Technology , Lonavala 4
DIFFERENCE BETWEEN TRADITIONAL DATA CENTER AND CLOUD COMPUTING SERVICES
Traditional Data Services:-
-Proprietary Customize
-More Secure
-Economy of Scale: Organization
-Dedicated
Cloud Computing Services:-
-Standardized
-Secure
-Economy of Scale: Ecosystem
-Share
4/10/2015Sinhgad Institute of Technology , Lonavala 7
MOVING TO CLOUDS
4/10/2015Sinhgad Institute of Technology , Lonavala 8
• Data is moving to the cloud
• Main reason: costs (pay-per-use model)
EXISTING SYSTEM
• Cloud providers should address privacy and security issues as amatter of high and urgent priority.
• Dealing with “single cloud” providers is becoming less popularwith customers due to potential problems such as serviceavailability failure and the possibility that there are maliciousinsiders in the single cloud.
• Byzantine Protocol
4/10/2015Sinhgad Institute of Technology , Lonavala 10
DISADVANTAGES OF EXISTING SYSTEM
Cloud providers should address privacy and security issues as amatter of high and urgent priority.
Service availability failure and the possibility that there aremalicious insiders in the single cloud.
4/10/2015Sinhgad Institute of Technology , Lonavala 12
PROPOSED SYSTEM
• This Project focuses on the issues related to the data securityaspect of cloud computing.
• Moving towards “Cloud of clouds “ or multi clouds techniquewhich improves
Better read performance
Data corruptions'
Reduces Intrusions ….etc
4/10/2015Sinhgad Institute of Technology , Lonavala 14
ADVANTAGES OF PROPOSED SYSTEM
DepSky System:Multicloud model
Shamir’s Secret sharing algorithm
The user runs custom applications using the service provider’sresources
Cloud service providers should ensure the security of theircustomers’ data and should be responsible if any security riskaffects their customers’ service infrastructure.
4/10/2015Sinhgad Institute of Technology , Lonavala 16
IMPLEMENTATIONS MODULES Data Integrity
Data Intrusion
Service Availability
DepSKy system model
4/10/2015Sinhgad Institute of Technology , Lonavala 17
DEPSKY ADRESSES THREEIMPORTANT LIMITATIONS
Loss of availability
Loss and corruption of data
Loss of privacy
4/10/2015Sinhgad Institute of Technology , Lonavala 18
4/10/2015Sinhgad Institute of Technology , Lonavala 20
DEPSKY data unit and 3 abstraction levels
Data Model
HARDWARE REQUIREMENTS
Processor : Pentium –III
Speed : 1.1 GHz
RAM : 256 MB(min)
Hard Disk : 20 GB
Floppy Drive : 1.44 MB
Key Board : Standard Keyboard
Monitor : SVGA
4/10/2015Sinhgad Institute of Technology , Lonavala 21
SOFTWARE REQUIREMENTS
Operating System : Windows XP
Application Server : Tomcat5.0/6.X
Front End : HTML, Java, JSP
Script : JavaScript.
Server side Script : Java Server Pages.
Database : MYSQL
4/10/2015Sinhgad Institute of Technology , Lonavala 22
CONCLUSION
• It is clear that although the use of cloud computing has rapidlyincreased, cloud computing security is still considered the majorissue in the cloud computing environment.
• Customers do not want to lose their private information as aresult of malicious insiders in the cloud. In addition, the loss ofservice availability has caused many problems for a largenumber of customers recently
4/10/2015Sinhgad Institute of Technology , Lonavala 30
FUTURE ENHANCEMENTS
For future work, we aim to provide a framework to supply a secure cloud database that will guarantee to prevent security risks facing the cloud computing community.
This framework will apply multi-clouds and the secret sharing algorithm to reduce the risk of data intrusion and the loss of service availability in the cloud and ensure data integrity.
4/10/2015Sinhgad Institute of Technology , Lonavala 31
REFERENCES[1] Yashpalsinh Jadeja, and Kirit Modi, "Cloud Computing - Concepts, Architecture and
Challenges ", 2012 International Conference on Computing, Electronics and Electrical
Technologies [ICCEET] .
[2] Wentao Liu , "Research on Cloud Computing Security Problem and Strategy", 978-1-4577-
1415-3/12/ 2012 IEEE.
[3] M.A. AlZain and E. Pardede, “Cloud Computing Security from single to multicloud", 45th
Hawaii Intl. Conf. on System Sciences (HICSS), 2012.
4/10/2015Sinhgad Institute of Technology , Lonavala 32