SlideShare a Scribd company logo
1 of 12
Cloud Storage Security
~~ Pankaj G. Watekar ~~
~~ Anup S. Juwar ~~
Cloud Computing Storage Security …….?
Cloud describes the use of a collection of “SECURED”
services, applications, information, and infrastructure
comprised of pools of compute, network, information and
storage resources.
Cloud Security is security principles applied to
protect data, applications and infrastructure
associated within the Cloud Computing technology.
COMPANIES ARE STILL AFRAID TO USE CLOUDS
3
[Chow09ccsw]
INTEGRITY
LACK OF TRUST IN THE CLOUD
LOSS OF CONTROL IN THE
CLOUD
MULTI-TENANCY ISSUES IN THE
CLOUD
Tenants share a pool of resources and have
opposing goals
•Encrypt data in transit, at rest, backup media
• Secure key store
•Protect encryption keys
•Ensure encryption is based on industry/govt
standards.
•NO proprietary standard
•Limit access to key stores
•Key backup & recoverability
•Test these procedures
ENCRYPTION, KEY MGT
Research for Storage Security:
1.Authorization:
2.Encryption:
3. Segmentation:
• Multi-level authorization
• The Face Fuzzy Vault
• RSA Encryption
• AES Encryption
• Hybrid Encryption
• Metadata Based Storage Model
• Multi-cloud Architecture Model
DATA
PART 1 PART 2COPY 1 COPY 2
SERVER SERVER SERVER SERVER
Figure: Segmentation Backup System
ESSENTIAL
CHARACTERISTICS
On-demand service
Get computing capabilities as
needed automatically
Broad Network Access
Services available over the net
using desktop, laptop, PDA,
mobile phone
ESSENTIAL
CHARACTERISTICS
 Resource pooling
 Provider resources pooled to
server multiple clients
 Rapid Elasticity
 Ability to quickly scale in/out
service
 Measured service
 control, optimize services based
on metering
CLOUD SERVICE MODELS
 Software as a Service (SaaS)
 We use the provider apps
 User doesn’t manage or control
the network, servers, OS, storage
or applications
 Platform as a Service (PaaS)
 User deploys their apps on the
cloud
 Controls their apps
 User doesn’t manage servers, IS,
storage
9
Infrastructure as a Service (IaaS)
Consumers gets access to the
infrastructure to deploy their stuff
Doesn’t manage or control the
infrastructure
Does manage or control the OS,
storage, apps, selected network
components
Cloud Computing
Advantages:
 
•Security
•Privacy
Disadvantages:
• Backup and Recovery
• Almost Unlimited Storage
• Efficiency and Performance Increasing
Thank you….

More Related Content

What's hot

Data encryption in database management system
Data encryption in database management systemData encryption in database management system
Data encryption in database management systemRabin BK
 
Securing blockchain assets
Securing blockchain assetsSecuring blockchain assets
Securing blockchain assetsSimon Wilson
 
Cloud gateways for regulatory compliance
Cloud gateways for regulatory complianceCloud gateways for regulatory compliance
Cloud gateways for regulatory complianceUlf Mattsson
 
Presentation1 new (1) (1)cf
Presentation1 new (1) (1)cfPresentation1 new (1) (1)cf
Presentation1 new (1) (1)cftoamma
 
Public cloud data protection
Public cloud data protectionPublic cloud data protection
Public cloud data protectionUlf Mattsson
 
Sqrrl May Webinar: Data-Centric Security
Sqrrl May Webinar: Data-Centric SecuritySqrrl May Webinar: Data-Centric Security
Sqrrl May Webinar: Data-Centric SecuritySqrrl
 
Cloud Security 101 (Webinar Deck)
Cloud Security 101 (Webinar Deck)Cloud Security 101 (Webinar Deck)
Cloud Security 101 (Webinar Deck)Panther Labs
 
What is cloud encryption
What is cloud encryptionWhat is cloud encryption
What is cloud encryptionPrancer Io
 
Network security
Network securityNetwork security
Network securityRaaz Karkee
 
NTXISSACSC3 - Security at the Point of Storage by Todd Barton
NTXISSACSC3 - Security at the Point of Storage by Todd BartonNTXISSACSC3 - Security at the Point of Storage by Todd Barton
NTXISSACSC3 - Security at the Point of Storage by Todd BartonNorth Texas Chapter of the ISSA
 
Customer Story: Scaling Security With Detections-as-Code
Customer Story: Scaling Security With Detections-as-CodeCustomer Story: Scaling Security With Detections-as-Code
Customer Story: Scaling Security With Detections-as-CodePanther Labs
 
Top 10 Cyber Security Tips for SMEs
Top 10 Cyber Security Tips for SMEsTop 10 Cyber Security Tips for SMEs
Top 10 Cyber Security Tips for SMEsDarraghCommsec
 

What's hot (20)

Data encryption in database management system
Data encryption in database management systemData encryption in database management system
Data encryption in database management system
 
Securing blockchain assets
Securing blockchain assetsSecuring blockchain assets
Securing blockchain assets
 
Week13
Week13Week13
Week13
 
Week13
Week13Week13
Week13
 
Week13
Week13Week13
Week13
 
Cloud gateways for regulatory compliance
Cloud gateways for regulatory complianceCloud gateways for regulatory compliance
Cloud gateways for regulatory compliance
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
Presentation1 new (1) (1)cf
Presentation1 new (1) (1)cfPresentation1 new (1) (1)cf
Presentation1 new (1) (1)cf
 
Network Security
Network SecurityNetwork Security
Network Security
 
Public cloud data protection
Public cloud data protectionPublic cloud data protection
Public cloud data protection
 
Sqrrl May Webinar: Data-Centric Security
Sqrrl May Webinar: Data-Centric SecuritySqrrl May Webinar: Data-Centric Security
Sqrrl May Webinar: Data-Centric Security
 
Cloud Security 101 (Webinar Deck)
Cloud Security 101 (Webinar Deck)Cloud Security 101 (Webinar Deck)
Cloud Security 101 (Webinar Deck)
 
VenkaSure Total Security+
VenkaSure Total Security+VenkaSure Total Security+
VenkaSure Total Security+
 
What is cloud encryption
What is cloud encryptionWhat is cloud encryption
What is cloud encryption
 
Network security
Network securityNetwork security
Network security
 
NTXISSACSC3 - Security at the Point of Storage by Todd Barton
NTXISSACSC3 - Security at the Point of Storage by Todd BartonNTXISSACSC3 - Security at the Point of Storage by Todd Barton
NTXISSACSC3 - Security at the Point of Storage by Todd Barton
 
Customer Story: Scaling Security With Detections-as-Code
Customer Story: Scaling Security With Detections-as-CodeCustomer Story: Scaling Security With Detections-as-Code
Customer Story: Scaling Security With Detections-as-Code
 
Encryption: Fact and Fiction
Encryption: Fact and FictionEncryption: Fact and Fiction
Encryption: Fact and Fiction
 
VPN VS. Secure SD-WAN
VPN VS. Secure SD-WANVPN VS. Secure SD-WAN
VPN VS. Secure SD-WAN
 
Top 10 Cyber Security Tips for SMEs
Top 10 Cyber Security Tips for SMEsTop 10 Cyber Security Tips for SMEs
Top 10 Cyber Security Tips for SMEs
 

Viewers also liked

Ethics and Security of Cloud Computing for Lawyers
Ethics and Security of Cloud Computing for LawyersEthics and Security of Cloud Computing for Lawyers
Ethics and Security of Cloud Computing for LawyersRobert Ambrogi
 
20151110 easymoove ita_short
20151110 easymoove ita_short20151110 easymoove ita_short
20151110 easymoove ita_shortIgnazio Chiappone
 
a-startup-guide-to-marketing-automation-for-sugarcrm
a-startup-guide-to-marketing-automation-for-sugarcrma-startup-guide-to-marketing-automation-for-sugarcrm
a-startup-guide-to-marketing-automation-for-sugarcrmBill Kahlert
 
Quantitative Methods for Lawyers - Class #15 - R Boot Camp - Part 2 - Profess...
Quantitative Methods for Lawyers - Class #15 - R Boot Camp - Part 2 - Profess...Quantitative Methods for Lawyers - Class #15 - R Boot Camp - Part 2 - Profess...
Quantitative Methods for Lawyers - Class #15 - R Boot Camp - Part 2 - Profess...Daniel Katz
 
Facebook for-business
Facebook for-businessFacebook for-business
Facebook for-businessNick Scheynen
 
Topic 4 nutrition part 2 : COMPILED from Various resources
Topic 4  nutrition part 2 : COMPILED from Various resourcesTopic 4  nutrition part 2 : COMPILED from Various resources
Topic 4 nutrition part 2 : COMPILED from Various resourcesSHAKINAZ DESA
 
Colombia_II_ppt
Colombia_II_pptColombia_II_ppt
Colombia_II_pptstimson
 
The Mobile Engagement Playbook - Going from Good to Great
The Mobile Engagement Playbook - Going from Good to GreatThe Mobile Engagement Playbook - Going from Good to Great
The Mobile Engagement Playbook - Going from Good to Great Urban Airship
 
The Science Behind Resistance to Change: What the Research Says & How it 
Can...
The Science Behind Resistance to Change: What the Research Says & How it 
Can...The Science Behind Resistance to Change: What the Research Says & How it 
Can...
The Science Behind Resistance to Change: What the Research Says & How it 
Can...KaiNexus
 
Growth Hacking Mobile Apps: 3 Critical Growth Tactics
Growth Hacking Mobile Apps: 3 Critical Growth TacticsGrowth Hacking Mobile Apps: 3 Critical Growth Tactics
Growth Hacking Mobile Apps: 3 Critical Growth Tactics Urban Airship
 
Planilha treino-5km
Planilha treino-5kmPlanilha treino-5km
Planilha treino-5kmSoraia Sousa
 
The Future of User Engagement Through Apps and IoT
The Future of User Engagement Through Apps and IoTThe Future of User Engagement Through Apps and IoT
The Future of User Engagement Through Apps and IoT Urban Airship
 
Applying Lean Thinking to Legal-Service Delivery - Lean Process Improvement a...
Applying Lean Thinking to Legal-Service Delivery - Lean Process Improvement a...Applying Lean Thinking to Legal-Service Delivery - Lean Process Improvement a...
Applying Lean Thinking to Legal-Service Delivery - Lean Process Improvement a...Daniel W. Linna Jr.
 
Introduction to Bdd and cucumber
Introduction to Bdd and cucumberIntroduction to Bdd and cucumber
Introduction to Bdd and cucumberNibu Baby
 

Viewers also liked (20)

Ethics and Security of Cloud Computing for Lawyers
Ethics and Security of Cloud Computing for LawyersEthics and Security of Cloud Computing for Lawyers
Ethics and Security of Cloud Computing for Lawyers
 
20151110 easymoove ita_short
20151110 easymoove ita_short20151110 easymoove ita_short
20151110 easymoove ita_short
 
a-startup-guide-to-marketing-automation-for-sugarcrm
a-startup-guide-to-marketing-automation-for-sugarcrma-startup-guide-to-marketing-automation-for-sugarcrm
a-startup-guide-to-marketing-automation-for-sugarcrm
 
Quantitative Methods for Lawyers - Class #15 - R Boot Camp - Part 2 - Profess...
Quantitative Methods for Lawyers - Class #15 - R Boot Camp - Part 2 - Profess...Quantitative Methods for Lawyers - Class #15 - R Boot Camp - Part 2 - Profess...
Quantitative Methods for Lawyers - Class #15 - R Boot Camp - Part 2 - Profess...
 
Facebook for-business
Facebook for-businessFacebook for-business
Facebook for-business
 
安全防護
安全防護安全防護
安全防護
 
PDM & DRM
PDM & DRMPDM & DRM
PDM & DRM
 
Topic 4 nutrition part 2 : COMPILED from Various resources
Topic 4  nutrition part 2 : COMPILED from Various resourcesTopic 4  nutrition part 2 : COMPILED from Various resources
Topic 4 nutrition part 2 : COMPILED from Various resources
 
Colombia_II_ppt
Colombia_II_pptColombia_II_ppt
Colombia_II_ppt
 
The Mobile Engagement Playbook - Going from Good to Great
The Mobile Engagement Playbook - Going from Good to GreatThe Mobile Engagement Playbook - Going from Good to Great
The Mobile Engagement Playbook - Going from Good to Great
 
The Science Behind Resistance to Change: What the Research Says & How it 
Can...
The Science Behind Resistance to Change: What the Research Says & How it 
Can...The Science Behind Resistance to Change: What the Research Says & How it 
Can...
The Science Behind Resistance to Change: What the Research Says & How it 
Can...
 
Growth Hacking Mobile Apps: 3 Critical Growth Tactics
Growth Hacking Mobile Apps: 3 Critical Growth TacticsGrowth Hacking Mobile Apps: 3 Critical Growth Tactics
Growth Hacking Mobile Apps: 3 Critical Growth Tactics
 
Planilha treino-5km
Planilha treino-5kmPlanilha treino-5km
Planilha treino-5km
 
The Future of User Engagement Through Apps and IoT
The Future of User Engagement Through Apps and IoTThe Future of User Engagement Through Apps and IoT
The Future of User Engagement Through Apps and IoT
 
Applying Lean Thinking to Legal-Service Delivery - Lean Process Improvement a...
Applying Lean Thinking to Legal-Service Delivery - Lean Process Improvement a...Applying Lean Thinking to Legal-Service Delivery - Lean Process Improvement a...
Applying Lean Thinking to Legal-Service Delivery - Lean Process Improvement a...
 
PMO Insights - PMO e a Gestão de Benefícios
PMO Insights - PMO e a Gestão de BenefíciosPMO Insights - PMO e a Gestão de Benefícios
PMO Insights - PMO e a Gestão de Benefícios
 
#Fame case study
#Fame case study#Fame case study
#Fame case study
 
Maxim Babichev, VK.com
Maxim Babichev, VK.comMaxim Babichev, VK.com
Maxim Babichev, VK.com
 
Managing Lean Hospitals
Managing Lean HospitalsManaging Lean Hospitals
Managing Lean Hospitals
 
Introduction to Bdd and cucumber
Introduction to Bdd and cucumberIntroduction to Bdd and cucumber
Introduction to Bdd and cucumber
 

Similar to Cloud storage security

Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud ComputingFalgun Rathod
 
Cloud Security Solutions - Cyber security.pptx
Cloud Security Solutions - Cyber security.pptxCloud Security Solutions - Cyber security.pptx
Cloud Security Solutions - Cyber security.pptxjaswanthbale2
 
Cloud Security for Regulated Firms - Securing my cloud and proving it
Cloud Security for Regulated Firms - Securing my cloud and proving itCloud Security for Regulated Firms - Securing my cloud and proving it
Cloud Security for Regulated Firms - Securing my cloud and proving itHentsū
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourleyGovCloud Network
 
security Issues of cloud computing
security Issues of cloud computingsecurity Issues of cloud computing
security Issues of cloud computingprachupanchal
 
Guide to security patterns for cloud systems and data security in aws and azure
Guide to security patterns for cloud systems and data security in aws and azureGuide to security patterns for cloud systems and data security in aws and azure
Guide to security patterns for cloud systems and data security in aws and azureAbdul Khan
 
Hybrid - Seguridad en Contenedores v3.pptx
Hybrid - Seguridad en Contenedores v3.pptxHybrid - Seguridad en Contenedores v3.pptx
Hybrid - Seguridad en Contenedores v3.pptxHansFarroCastillo1
 
Cloud security issues and concerns
Cloud security   issues and concernsCloud security   issues and concerns
Cloud security issues and concernsMrinal Baowaly
 
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture. Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture. IJCERT JOURNAL
 
UNIT IV RESOURCE MANAGEMENT AND SECURITY IN CLOUD
UNIT IV RESOURCE MANAGEMENT AND SECURITY IN CLOUDUNIT IV RESOURCE MANAGEMENT AND SECURITY IN CLOUD
UNIT IV RESOURCE MANAGEMENT AND SECURITY IN CLOUDJohnSamuel280314
 
Cryptography Final Presentation.pptx
Cryptography Final Presentation.pptxCryptography Final Presentation.pptx
Cryptography Final Presentation.pptxGaneshBagul8
 
Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudEfficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudIRJET Journal
 
GA-CSD4007.pptx
GA-CSD4007.pptxGA-CSD4007.pptx
GA-CSD4007.pptxPerak1
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computingPrince Chandu
 

Similar to Cloud storage security (20)

Cloud_Security.pptx
Cloud_Security.pptxCloud_Security.pptx
Cloud_Security.pptx
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 
Cloud Security Solutions - Cyber security.pptx
Cloud Security Solutions - Cyber security.pptxCloud Security Solutions - Cyber security.pptx
Cloud Security Solutions - Cyber security.pptx
 
Cloud Security for Regulated Firms - Securing my cloud and proving it
Cloud Security for Regulated Firms - Securing my cloud and proving itCloud Security for Regulated Firms - Securing my cloud and proving it
Cloud Security for Regulated Firms - Securing my cloud and proving it
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computing
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
 
security Issues of cloud computing
security Issues of cloud computingsecurity Issues of cloud computing
security Issues of cloud computing
 
Guide to security patterns for cloud systems and data security in aws and azure
Guide to security patterns for cloud systems and data security in aws and azureGuide to security patterns for cloud systems and data security in aws and azure
Guide to security patterns for cloud systems and data security in aws and azure
 
Hybrid - Seguridad en Contenedores v3.pptx
Hybrid - Seguridad en Contenedores v3.pptxHybrid - Seguridad en Contenedores v3.pptx
Hybrid - Seguridad en Contenedores v3.pptx
 
Cloud security issues and concerns
Cloud security   issues and concernsCloud security   issues and concerns
Cloud security issues and concerns
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture. Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
UNIT IV RESOURCE MANAGEMENT AND SECURITY IN CLOUD
UNIT IV RESOURCE MANAGEMENT AND SECURITY IN CLOUDUNIT IV RESOURCE MANAGEMENT AND SECURITY IN CLOUD
UNIT IV RESOURCE MANAGEMENT AND SECURITY IN CLOUD
 
AWS Cloud Security
AWS Cloud SecurityAWS Cloud Security
AWS Cloud Security
 
Cloud security
Cloud securityCloud security
Cloud security
 
Cryptography Final Presentation.pptx
Cryptography Final Presentation.pptxCryptography Final Presentation.pptx
Cryptography Final Presentation.pptx
 
Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudEfficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using Cloud
 
GA-CSD4007.pptx
GA-CSD4007.pptxGA-CSD4007.pptx
GA-CSD4007.pptx
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
 

Recently uploaded

Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubaikojalkojal131
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...SUHANI PANDEY
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...Escorts Call Girls
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...singhpriety023
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtrahman018755
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Standkumarajju5765
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.soniya singh
 
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.soniya singh
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirtrahman018755
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceDelhi Call girls
 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls DubaiEscorts Call Girls
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445ruhi
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)Delhi Call girls
 

Recently uploaded (20)

Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
 
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
 
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls Dubai
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
 

Cloud storage security

  • 1. Cloud Storage Security ~~ Pankaj G. Watekar ~~ ~~ Anup S. Juwar ~~
  • 2. Cloud Computing Storage Security …….? Cloud describes the use of a collection of “SECURED” services, applications, information, and infrastructure comprised of pools of compute, network, information and storage resources. Cloud Security is security principles applied to protect data, applications and infrastructure associated within the Cloud Computing technology.
  • 3. COMPANIES ARE STILL AFRAID TO USE CLOUDS 3 [Chow09ccsw]
  • 4. INTEGRITY LACK OF TRUST IN THE CLOUD LOSS OF CONTROL IN THE CLOUD MULTI-TENANCY ISSUES IN THE CLOUD Tenants share a pool of resources and have opposing goals
  • 5. •Encrypt data in transit, at rest, backup media • Secure key store •Protect encryption keys •Ensure encryption is based on industry/govt standards. •NO proprietary standard •Limit access to key stores •Key backup & recoverability •Test these procedures ENCRYPTION, KEY MGT
  • 6. Research for Storage Security: 1.Authorization: 2.Encryption: 3. Segmentation: • Multi-level authorization • The Face Fuzzy Vault • RSA Encryption • AES Encryption • Hybrid Encryption • Metadata Based Storage Model • Multi-cloud Architecture Model DATA PART 1 PART 2COPY 1 COPY 2 SERVER SERVER SERVER SERVER Figure: Segmentation Backup System
  • 7. ESSENTIAL CHARACTERISTICS On-demand service Get computing capabilities as needed automatically Broad Network Access Services available over the net using desktop, laptop, PDA, mobile phone
  • 8. ESSENTIAL CHARACTERISTICS  Resource pooling  Provider resources pooled to server multiple clients  Rapid Elasticity  Ability to quickly scale in/out service  Measured service  control, optimize services based on metering
  • 9. CLOUD SERVICE MODELS  Software as a Service (SaaS)  We use the provider apps  User doesn’t manage or control the network, servers, OS, storage or applications  Platform as a Service (PaaS)  User deploys their apps on the cloud  Controls their apps  User doesn’t manage servers, IS, storage 9
  • 10. Infrastructure as a Service (IaaS) Consumers gets access to the infrastructure to deploy their stuff Doesn’t manage or control the infrastructure Does manage or control the OS, storage, apps, selected network components
  • 11. Cloud Computing Advantages:   •Security •Privacy Disadvantages: • Backup and Recovery • Almost Unlimited Storage • Efficiency and Performance Increasing