33
Presented By Dheeraj Katariya (B80428545), Sandip Karale (B80428544), Sanket Bora (B80428513), Ganesh Shejwal (B80428570). Guided By Prof. S. D. Babar. Cloud Computing Security From Single to Multi-Cloud

Cloud Computing Security From Single To Multicloud

Embed Size (px)

Citation preview

Presented By

Dheeraj Katariya (B80428545),

Sandip Karale (B80428544),

Sanket Bora (B80428513),

Ganesh Shejwal (B80428570).

Guided By

Prof. S. D. Babar.

Cloud Computing Security From

Single to Multi-Cloud

CONTENT

Problem Statement

Cloud Computing

Deployment Model

Cloud Computing Security

Multi-clouds

Architecture

Hardware Requirements

Software Requirements

System Design

Conclusion

Futures Scope 4/10/2015Sinhgad Institute of Technology , Lonavala 2

PROBLEM STATEMENT

• Dealing with “single cloud” providers is predicted to becomeless popular with customers due to risks of service availabilityfailure and the possibility of malicious insiders in the singlecloud.

• A movement towards “multi-clouds”, or in other words,“interclouds” or “cloud-of-clouds” has emerged recently.

4/10/2015Sinhgad Institute of Technology , Lonavala 3

WHAT IS CLOUD COMPUTING ?

• Cloud computing is a model for enabling ubiquitous(present),convenient, on-demand network access to a shared pool ofconfigurable computing resources (e.g., networks, servers,storage, applications, and services) that can be rapidlyprovisioned and released with minimal management effort orservice provider interaction.

• This cloud model is composed of five essential characteristics,three service models, and four deployment models.

4/10/2015Sinhgad Institute of Technology , Lonavala 4

CLOUD COMPUTING

4/10/2015Sinhgad Institute of Technology , Lonavala 5

DEPLOYMENT MODELS

4/10/2015Sinhgad Institute of Technology , Lonavala 6

DIFFERENCE BETWEEN TRADITIONAL DATA CENTER AND CLOUD COMPUTING SERVICES

Traditional Data Services:-

-Proprietary Customize

-More Secure

-Economy of Scale: Organization

-Dedicated

Cloud Computing Services:-

-Standardized

-Secure

-Economy of Scale: Ecosystem

-Share

4/10/2015Sinhgad Institute of Technology , Lonavala 7

MOVING TO CLOUDS

4/10/2015Sinhgad Institute of Technology , Lonavala 8

• Data is moving to the cloud

• Main reason: costs (pay-per-use model)

EVERYTHING CONNECTED TO CLOUD

4/10/2015Sinhgad Institute of Technology , Lonavala 9

EXISTING SYSTEM

• Cloud providers should address privacy and security issues as amatter of high and urgent priority.

• Dealing with “single cloud” providers is becoming less popularwith customers due to potential problems such as serviceavailability failure and the possibility that there are maliciousinsiders in the single cloud.

• Byzantine Protocol

4/10/2015Sinhgad Institute of Technology , Lonavala 10

IF IT FAILS…?

4/10/2015Sinhgad Institute of Technology , Lonavala 11

DISADVANTAGES OF EXISTING SYSTEM

Cloud providers should address privacy and security issues as amatter of high and urgent priority.

Service availability failure and the possibility that there aremalicious insiders in the single cloud.

4/10/2015Sinhgad Institute of Technology , Lonavala 12

CLOUD SECURITY

4/10/2015Sinhgad Institute of Technology , Lonavala 13

PROPOSED SYSTEM

• This Project focuses on the issues related to the data securityaspect of cloud computing.

• Moving towards “Cloud of clouds “ or multi clouds techniquewhich improves

Better read performance

Data corruptions'

Reduces Intrusions ….etc

4/10/2015Sinhgad Institute of Technology , Lonavala 14

MULTI CLOUDS

4/10/2015Sinhgad Institute of Technology , Lonavala 15

ADVANTAGES OF PROPOSED SYSTEM

DepSky System:Multicloud model

Shamir’s Secret sharing algorithm

The user runs custom applications using the service provider’sresources

Cloud service providers should ensure the security of theircustomers’ data and should be responsible if any security riskaffects their customers’ service infrastructure.

4/10/2015Sinhgad Institute of Technology , Lonavala 16

IMPLEMENTATIONS MODULES Data Integrity

Data Intrusion

Service Availability

DepSKy system model

4/10/2015Sinhgad Institute of Technology , Lonavala 17

DEPSKY ADRESSES THREEIMPORTANT LIMITATIONS

Loss of availability

Loss and corruption of data

Loss of privacy

4/10/2015Sinhgad Institute of Technology , Lonavala 18

DEPSKY-ARCHITECTURE

4/10/2015Sinhgad Institute of Technology , Lonavala 19

4/10/2015Sinhgad Institute of Technology , Lonavala 20

DEPSKY data unit and 3 abstraction levels

Data Model

HARDWARE REQUIREMENTS

Processor : Pentium –III

Speed : 1.1 GHz

RAM : 256 MB(min)

Hard Disk : 20 GB

Floppy Drive : 1.44 MB

Key Board : Standard Keyboard

Monitor : SVGA

4/10/2015Sinhgad Institute of Technology , Lonavala 21

SOFTWARE REQUIREMENTS

Operating System : Windows XP

Application Server : Tomcat5.0/6.X

Front End : HTML, Java, JSP

Script : JavaScript.

Server side Script : Java Server Pages.

Database : MYSQL

4/10/2015Sinhgad Institute of Technology , Lonavala 22

4/10/2015Sinhgad Institute of Technology , Lonavala 23

Data Flow Diagram

4/10/2015Sinhgad Institute of Technology , Lonavala 24

ER Diagram

4/10/2015Sinhgad Institute of Technology , Lonavala 25

Class Diagram

4/10/2015Sinhgad Institute of Technology , Lonavala 26

Use Case Diagram

4/10/2015Sinhgad Institute of Technology , Lonavala 27

Sequence Diagram

4/10/2015Sinhgad Institute of Technology , Lonavala 28

Activity Diagram

DEPLOYMENT DIAGRAM

4/10/2015Sinhgad Institute of Technology , Lonavala 29

CONCLUSION

• It is clear that although the use of cloud computing has rapidlyincreased, cloud computing security is still considered the majorissue in the cloud computing environment.

• Customers do not want to lose their private information as aresult of malicious insiders in the cloud. In addition, the loss ofservice availability has caused many problems for a largenumber of customers recently

4/10/2015Sinhgad Institute of Technology , Lonavala 30

FUTURE ENHANCEMENTS

For future work, we aim to provide a framework to supply a secure cloud database that will guarantee to prevent security risks facing the cloud computing community.

This framework will apply multi-clouds and the secret sharing algorithm to reduce the risk of data intrusion and the loss of service availability in the cloud and ensure data integrity.

4/10/2015Sinhgad Institute of Technology , Lonavala 31

REFERENCES[1] Yashpalsinh Jadeja, and Kirit Modi, "Cloud Computing - Concepts, Architecture and

Challenges ", 2012 International Conference on Computing, Electronics and Electrical

Technologies [ICCEET] .

[2] Wentao Liu , "Research on Cloud Computing Security Problem and Strategy", 978-1-4577-

1415-3/12/ 2012 IEEE.

[3] M.A. AlZain and E. Pardede, “Cloud Computing Security from single to multicloud", 45th

Hawaii Intl. Conf. on System Sciences (HICSS), 2012.

4/10/2015Sinhgad Institute of Technology , Lonavala 32

THANK YOU…..!!!

4/10/2015Sinhgad Institute of Technology , Lonavala 33