This project presentation summarizes a proposed algorithmic approach to cloud data security. The presentation was given by students Gaurav Shukla, Rishank Kesarwani, and Hera Neyaz to their computer science professor. It outlines the objective to resolve cloud security issues, motivation due to increasing cloud usage and data breaches. A proposed model is described using data flow diagrams to encrypt text, image, and video data before storing in the cloud. Challenges for attackers to locate, access, and gather information about encrypted data are also discussed. The project roadmap and conclusions state that the approach provides double security for easy-to-access cloud data storage while ensuring data retrievability.
1. PROJECT PROGRESS PRESENTATION
BACHELOR OF TECHNOLOGY
Computer Science & Engineering
Submitted By:
Gaurav Shukla (1416210021)
Rishank Kesarwani(1416210051)
Hera Neyaz(1416210024)
Under the Guidance of :
Mr. Prashant Srivastava
(Assistant Professor)
(Department of Computer Science & Information
Technology)
ALGORITHMIC APPROACH TOWARDS
CLOUD DATA SECURITY
2. CONTENTS
Introduction
Objective
Motivation
Cloud Service Models
Cloud Security Analysis
Proposed Model
Challenges we Create for Attackers
Road Map to Complete Project
Conclusion
3. INTRODUCTION
According to AT & T , Cloud is
Common
Location-independent
Online
Utility
available on-Demand service.
Cloud Computing is internet-based computing where shared resources,software and information are
provided to the computer.
It promises not just cheaper IT,but also faster,easier,more flexible,and more effective IT. It is also
versatile and flexible application of internet.
Consider an example of Hotmail.com,Yahoo.com or Gmail.com where no installation of server or
softwares is required. All you need to access them is an internet connection. These are simple examples
of cloud computing.
4. OBJECTIVE
The objective is to resolve the various security issues related to cloud .
The cloud can be used by any user of any age group with ease of access.
The contribution made by this project will enable the people and
organizations to secure their data in more effective way.
5. MOTIVATION
Internet is the foremost thing which we all require in this generation.
Data is considered as Money in the 21st Century so it need to be secured.
60% of IT Market Growth Is Being Driven By The Cloud.According to
Wikibon’s report cloud spending is growing at a 16% Compound annual
growth(CAGR) run rate between 2016 and 2026.
Breach level index also reports that out of the 5.9 billion records that have
been lost or stolen since 2013 only 4% consisted of encrypted data which is
useless to any hacker.
6. CLOUD SERVICE MODELS
There are two types of Cloud Services Models.
1. Delivery Models
a. SaaS
b. Paas
c. Iaas
2. Deployment Models
a. Public
b. Private
c. Hybrid
d. Community Cloud
7. Why do we need Cloud Data Security?
Data breaches happen every day
Cyber Attacks Are On The Rise
Controlled Access
Managing the CIA(Confidentiality,Integrity,Availability)
8. PROBLEM DEFINITION
Breach level index reports that out of the 5.9 billion records that have been
lost or stolen since 2013 only 4% consisted of encrypted data which is useless
to any hacker.
According to the Privacy Rights Clearinghouse report, data based on the
amount of data lost, databases are the major source (64%) of data loss.
Interest in the cloud is increasing day by day.
60% of IT Market Growth Is Being Driven by the Cloud. According to Wikibon’s
report, cloud spending is growing at a 16% Compound annual growth (CAGR)
run rate between 2016 and 2026.
14. Challenges For Attacker:
How to find out where the target is located?
How to be co-located with the target within the same
(physical) machine?
How to gather information about target?
20. Roadmap to Complete Project
Phase 1: Literature Review
Phase 2: Division of Task
Phase 3: Working on Our Proposed Model
Phase 4: Implementation of Our Proposed Model
Phase 5: Final Verification
21. Conclusion
This project proposes a Security model to improve security of cloud Data
Through our approach, the cloud provider cannot directly reach the data.
This technique provides double security to the data stored in cloud and it
is easy to integrate, that defends malicious activities occurred on the cloud
server.
It also ensures data retreivability.
Distribution of data ensures security of sensitive data.
22. References:
1. https://www.rightscale.com/blog/cloud-industry-insights/cloud-computing-
trends-2017-state-cloud-survey/
2. http://www.bain.com/Images/BAIN_BRIEF_The_Changing_Faces_of_the_Clou
d.pdf
3. https://www.forbes.com/sites/louiscolumbus/2017/04/29/roundup-of-cloud-
computing-forecasts-2017/
4. https://siliconangle.com/blog/2017/02/20/wikibon-report-preview-big-can-
amazon-web-services-get/
5. https://www.itworld.com/article/2764788/security/database-security-in-a-
cloud-computing-environment.html
6. International Engineering Research and Innovation Symposium (IRIS) IOP Conf.
Series: Materials Science and Engineering 160 (2016) 012106
doi:10.1088/1757-899X/160/1/012106
7. V. Chang , M. Ramachandran ,“Towards achieving data security with the cloud
computing adoption framework”, IEEE Trans.Serv.