SlideShare a Scribd company logo
1 of 24
PROJECT PROGRESS PRESENTATION
BACHELOR OF TECHNOLOGY
Computer Science & Engineering
Submitted By:
Gaurav Shukla (1416210021)
Rishank Kesarwani(1416210051)
Hera Neyaz(1416210024)
Under the Guidance of :
Mr. Prashant Srivastava
(Assistant Professor)
(Department of Computer Science & Information
Technology)
ALGORITHMIC APPROACH TOWARDS
CLOUD DATA SECURITY
CONTENTS
 Introduction
 Objective
 Motivation
 Cloud Service Models
 Cloud Security Analysis
 Proposed Model
 Challenges we Create for Attackers
 Road Map to Complete Project
 Conclusion
INTRODUCTION
According to AT & T , Cloud is
Common
Location-independent
Online
Utility
available on-Demand service.
 Cloud Computing is internet-based computing where shared resources,software and information are
provided to the computer.
 It promises not just cheaper IT,but also faster,easier,more flexible,and more effective IT. It is also
versatile and flexible application of internet.
 Consider an example of Hotmail.com,Yahoo.com or Gmail.com where no installation of server or
softwares is required. All you need to access them is an internet connection. These are simple examples
of cloud computing.
OBJECTIVE
 The objective is to resolve the various security issues related to cloud .
 The cloud can be used by any user of any age group with ease of access.
 The contribution made by this project will enable the people and
organizations to secure their data in more effective way.
MOTIVATION
 Internet is the foremost thing which we all require in this generation.
 Data is considered as Money in the 21st Century so it need to be secured.
 60% of IT Market Growth Is Being Driven By The Cloud.According to
Wikibon’s report cloud spending is growing at a 16% Compound annual
growth(CAGR) run rate between 2016 and 2026.
 Breach level index also reports that out of the 5.9 billion records that have
been lost or stolen since 2013 only 4% consisted of encrypted data which is
useless to any hacker.
CLOUD SERVICE MODELS
 There are two types of Cloud Services Models.
1. Delivery Models
a. SaaS
b. Paas
c. Iaas
2. Deployment Models
a. Public
b. Private
c. Hybrid
d. Community Cloud
Why do we need Cloud Data Security?
 Data breaches happen every day
 Cyber Attacks Are On The Rise
 Controlled Access
 Managing the CIA(Confidentiality,Integrity,Availability)
PROBLEM DEFINITION
 Breach level index reports that out of the 5.9 billion records that have been
lost or stolen since 2013 only 4% consisted of encrypted data which is useless
to any hacker.
 According to the Privacy Rights Clearinghouse report, data based on the
amount of data lost, databases are the major source (64%) of data loss.
Interest in the cloud is increasing day by day.
 60% of IT Market Growth Is Being Driven by the Cloud. According to Wikibon’s
report, cloud spending is growing at a 16% Compound annual growth (CAGR)
run rate between 2016 and 2026.
PROPOSED COUNTERMEASURES
PROPOSED MODEL
HARDWARE REQUIREMENT
1. 1 GB RAM ( Random Access Memory )
2. 128 GB ROM ( Read Only Memory )
SOFTWARE REQUIREMENT
1. Java Development Kit (JDK)
2. Text Encrypter
3. Image Encrypter
4. MP4Tool Application
5. Image Splitter Merger
6. Windows 7 or above
DATA FLOW DIAGRAM
Figure 1. Level-0 DFD
Figure 2. Level-1 DFD
Figure 3. Level-2 DFD
Challenges For Attacker:
 How to find out where the target is located?
 How to be co-located with the target within the same
(physical) machine?
 How to gather information about target?
DESIGN
1. TEXT DATA
2. IMAGE DATA
3. VIDEO DATA
RESULTS
1. TEXT DATA
2. IMAGE DATA
BEFORE ENCRYPTION AFTER ENCRYPTION
Roadmap to Complete Project
 Phase 1: Literature Review
 Phase 2: Division of Task
 Phase 3: Working on Our Proposed Model
 Phase 4: Implementation of Our Proposed Model
 Phase 5: Final Verification
Conclusion
 This project proposes a Security model to improve security of cloud Data
 Through our approach, the cloud provider cannot directly reach the data.
This technique provides double security to the data stored in cloud and it
is easy to integrate, that defends malicious activities occurred on the cloud
server.
 It also ensures data retreivability.
 Distribution of data ensures security of sensitive data.
References:
1. https://www.rightscale.com/blog/cloud-industry-insights/cloud-computing-
trends-2017-state-cloud-survey/
2. http://www.bain.com/Images/BAIN_BRIEF_The_Changing_Faces_of_the_Clou
d.pdf
3. https://www.forbes.com/sites/louiscolumbus/2017/04/29/roundup-of-cloud-
computing-forecasts-2017/
4. https://siliconangle.com/blog/2017/02/20/wikibon-report-preview-big-can-
amazon-web-services-get/
5. https://www.itworld.com/article/2764788/security/database-security-in-a-
cloud-computing-environment.html
6. International Engineering Research and Innovation Symposium (IRIS) IOP Conf.
Series: Materials Science and Engineering 160 (2016) 012106
doi:10.1088/1757-899X/160/1/012106
7. V. Chang , M. Ramachandran ,“Towards achieving data security with the cloud
computing adoption framework”, IEEE Trans.Serv.
Thank You!!!
Any Question?

More Related Content

What's hot

Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
dbpublications
 
BlueHat v18 || Modern day entomology - examining the inner workings of the bu...
BlueHat v18 || Modern day entomology - examining the inner workings of the bu...BlueHat v18 || Modern day entomology - examining the inner workings of the bu...
BlueHat v18 || Modern day entomology - examining the inner workings of the bu...
BlueHat Security Conference
 
Cloud computing security- critical infrastructures
Cloud computing security- critical infrastructuresCloud computing security- critical infrastructures
Cloud computing security- critical infrastructures
Mohammed Saqib
 

What's hot (20)

Cloud computing projects
Cloud computing projects Cloud computing projects
Cloud computing projects
 
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
 
BlueHat v18 || Modern day entomology - examining the inner workings of the bu...
BlueHat v18 || Modern day entomology - examining the inner workings of the bu...BlueHat v18 || Modern day entomology - examining the inner workings of the bu...
BlueHat v18 || Modern day entomology - examining the inner workings of the bu...
 
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud MembersAn Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
 
Br36413417
Br36413417Br36413417
Br36413417
 
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
 
IJARCCE 20
IJARCCE 20IJARCCE 20
IJARCCE 20
 
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET-  	  Ensuring Security in Cloud Computing Cryptography using CryptographyIRJET-  	  Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Security and Privacy in Cloud Computing - a High-level view
Security and Privacy in Cloud Computing - a High-level viewSecurity and Privacy in Cloud Computing - a High-level view
Security and Privacy in Cloud Computing - a High-level view
 
Cloud computing security- critical infrastructures
Cloud computing security- critical infrastructuresCloud computing security- critical infrastructures
Cloud computing security- critical infrastructures
 
IRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using CryptographyIRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using Cryptography
 
FRAMEWORK FOR SECURE CLOUD COMPUTING
FRAMEWORK FOR SECURE CLOUD COMPUTINGFRAMEWORK FOR SECURE CLOUD COMPUTING
FRAMEWORK FOR SECURE CLOUD COMPUTING
 
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmHybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
 
Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure clouds
 
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
 
Threat Modeling of Cloud based Implementation of Homomorphic Encryption
Threat Modeling of Cloud based Implementation of Homomorphic EncryptionThreat Modeling of Cloud based Implementation of Homomorphic Encryption
Threat Modeling of Cloud based Implementation of Homomorphic Encryption
 
Protecting Pipeline DevOps and IaC
Protecting Pipeline DevOps and IaCProtecting Pipeline DevOps and IaC
Protecting Pipeline DevOps and IaC
 
Secure protocol design for decentralized world
Secure protocol design for decentralized worldSecure protocol design for decentralized world
Secure protocol design for decentralized world
 
Firepower ngfw internet
Firepower ngfw internetFirepower ngfw internet
Firepower ngfw internet
 

Similar to ALGORITHMIC APPROACH TO CLOUD DATA SECURITY

Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd cloud computing and security challenges
Iaetsd cloud computing and security challenges
Iaetsd Iaetsd
 
Fog computing
Fog computingFog computing
Fog computing
Mahantesh Hiremath
 

Similar to ALGORITHMIC APPROACH TO CLOUD DATA SECURITY (20)

IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
 
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTINGSECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
 
Cloud Encryption
Cloud EncryptionCloud Encryption
Cloud Encryption
 
A Review On Data Security In Cloud Computing
A Review On Data Security In Cloud ComputingA Review On Data Security In Cloud Computing
A Review On Data Security In Cloud Computing
 
cloud security using Fog Computing
cloud security using Fog Computingcloud security using Fog Computing
cloud security using Fog Computing
 
Ijaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinderIjaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinder
 
Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...
 
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
 
Exploring Cloud Encryption
Exploring Cloud EncryptionExploring Cloud Encryption
Exploring Cloud Encryption
 
Ad4502189193
Ad4502189193Ad4502189193
Ad4502189193
 
Ijaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinderIjaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinder
 
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd cloud computing and security challenges
Iaetsd cloud computing and security challenges
 
Securing Cloud from Cloud Drain
Securing Cloud from Cloud DrainSecuring Cloud from Cloud Drain
Securing Cloud from Cloud Drain
 
Fog computing
Fog computingFog computing
Fog computing
 
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud Computing
 
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
 
Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...
Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...
Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...
 
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions.
 
Encryption Algorithms for Cloud
Encryption Algorithms for CloudEncryption Algorithms for Cloud
Encryption Algorithms for Cloud
 
Challenges and Proposed Solutions for Cloud Forensic
Challenges and Proposed Solutions for Cloud ForensicChallenges and Proposed Solutions for Cloud Forensic
Challenges and Proposed Solutions for Cloud Forensic
 

Recently uploaded

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 

Recently uploaded (20)

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 

ALGORITHMIC APPROACH TO CLOUD DATA SECURITY

  • 1. PROJECT PROGRESS PRESENTATION BACHELOR OF TECHNOLOGY Computer Science & Engineering Submitted By: Gaurav Shukla (1416210021) Rishank Kesarwani(1416210051) Hera Neyaz(1416210024) Under the Guidance of : Mr. Prashant Srivastava (Assistant Professor) (Department of Computer Science & Information Technology) ALGORITHMIC APPROACH TOWARDS CLOUD DATA SECURITY
  • 2. CONTENTS  Introduction  Objective  Motivation  Cloud Service Models  Cloud Security Analysis  Proposed Model  Challenges we Create for Attackers  Road Map to Complete Project  Conclusion
  • 3. INTRODUCTION According to AT & T , Cloud is Common Location-independent Online Utility available on-Demand service.  Cloud Computing is internet-based computing where shared resources,software and information are provided to the computer.  It promises not just cheaper IT,but also faster,easier,more flexible,and more effective IT. It is also versatile and flexible application of internet.  Consider an example of Hotmail.com,Yahoo.com or Gmail.com where no installation of server or softwares is required. All you need to access them is an internet connection. These are simple examples of cloud computing.
  • 4. OBJECTIVE  The objective is to resolve the various security issues related to cloud .  The cloud can be used by any user of any age group with ease of access.  The contribution made by this project will enable the people and organizations to secure their data in more effective way.
  • 5. MOTIVATION  Internet is the foremost thing which we all require in this generation.  Data is considered as Money in the 21st Century so it need to be secured.  60% of IT Market Growth Is Being Driven By The Cloud.According to Wikibon’s report cloud spending is growing at a 16% Compound annual growth(CAGR) run rate between 2016 and 2026.  Breach level index also reports that out of the 5.9 billion records that have been lost or stolen since 2013 only 4% consisted of encrypted data which is useless to any hacker.
  • 6. CLOUD SERVICE MODELS  There are two types of Cloud Services Models. 1. Delivery Models a. SaaS b. Paas c. Iaas 2. Deployment Models a. Public b. Private c. Hybrid d. Community Cloud
  • 7. Why do we need Cloud Data Security?  Data breaches happen every day  Cyber Attacks Are On The Rise  Controlled Access  Managing the CIA(Confidentiality,Integrity,Availability)
  • 8. PROBLEM DEFINITION  Breach level index reports that out of the 5.9 billion records that have been lost or stolen since 2013 only 4% consisted of encrypted data which is useless to any hacker.  According to the Privacy Rights Clearinghouse report, data based on the amount of data lost, databases are the major source (64%) of data loss. Interest in the cloud is increasing day by day.  60% of IT Market Growth Is Being Driven by the Cloud. According to Wikibon’s report, cloud spending is growing at a 16% Compound annual growth (CAGR) run rate between 2016 and 2026.
  • 11. HARDWARE REQUIREMENT 1. 1 GB RAM ( Random Access Memory ) 2. 128 GB ROM ( Read Only Memory ) SOFTWARE REQUIREMENT 1. Java Development Kit (JDK) 2. Text Encrypter 3. Image Encrypter 4. MP4Tool Application 5. Image Splitter Merger 6. Windows 7 or above
  • 12. DATA FLOW DIAGRAM Figure 1. Level-0 DFD Figure 2. Level-1 DFD
  • 14. Challenges For Attacker:  How to find out where the target is located?  How to be co-located with the target within the same (physical) machine?  How to gather information about target?
  • 19. 2. IMAGE DATA BEFORE ENCRYPTION AFTER ENCRYPTION
  • 20. Roadmap to Complete Project  Phase 1: Literature Review  Phase 2: Division of Task  Phase 3: Working on Our Proposed Model  Phase 4: Implementation of Our Proposed Model  Phase 5: Final Verification
  • 21. Conclusion  This project proposes a Security model to improve security of cloud Data  Through our approach, the cloud provider cannot directly reach the data. This technique provides double security to the data stored in cloud and it is easy to integrate, that defends malicious activities occurred on the cloud server.  It also ensures data retreivability.  Distribution of data ensures security of sensitive data.
  • 22. References: 1. https://www.rightscale.com/blog/cloud-industry-insights/cloud-computing- trends-2017-state-cloud-survey/ 2. http://www.bain.com/Images/BAIN_BRIEF_The_Changing_Faces_of_the_Clou d.pdf 3. https://www.forbes.com/sites/louiscolumbus/2017/04/29/roundup-of-cloud- computing-forecasts-2017/ 4. https://siliconangle.com/blog/2017/02/20/wikibon-report-preview-big-can- amazon-web-services-get/ 5. https://www.itworld.com/article/2764788/security/database-security-in-a- cloud-computing-environment.html 6. International Engineering Research and Innovation Symposium (IRIS) IOP Conf. Series: Materials Science and Engineering 160 (2016) 012106 doi:10.1088/1757-899X/160/1/012106 7. V. Chang , M. Ramachandran ,“Towards achieving data security with the cloud computing adoption framework”, IEEE Trans.Serv.
  • 23.