SlideShare a Scribd company logo
1 of 17
SEMINAR REPORT ON
JIIU’S
Jamia Institute of Engineering and Management Studies
Presented By:
Saba Karim
 Introduction
 Cloud Services delivery Model
 Deployment Model
 Cloud advantage
 Security in Cloud
 data security
 Encryption Scheme
 Cloud integrity
 Cloud availability
 Conclusion
 References
Introduction
Cloud computing is an internet-based computing
technology, where shared resources such as software,
platform, storage and information are provided to
customers on demand.
Cloud computing is a computing platform for sharing
resources that include infrastructures, software,
applications, and business processes. .
.
Cloud Services Delivery Model
A cloud services delivery model is
commonly referred to as an SPI and falls
into three generally accepted services:
 The Software-As-a-Service Model
 The Platform-As-a-Service Model
 The Infrastructure-As-a-Service Model
hh
FIG.: Cloud delivery model
Software as a service (SaaS):
Software as a service features a complete
application offered as a service on
demand. A single instance of the
software runs on the cloud and services
multiple end users or client organizations.
.
Infrastructure as a service (IaaS):
Infrastructure as a service delivers basic storage and
computer capabilities as standardized services over
the network. Servers, storage systems, switches,
routers.
Platform as a service (PaaS):
In a platform-as-a-service
(PaaS) model, the vendor offers a
development environment to application
developers, who develop applications and
offer those services through the provider’s
platform.
Deployment Model
Cloud deployment models include:
 Public clouds
 Private clouds
 Community clouds
 Hybrid clouds.
Cloud deployment model
Public Clouds:
Public clouds are external or publicly available
cloud environments that are accessible to
multiple tenants.
Private clouds:
private clouds are typically tailored
environments with dedicated virtualized
resources for particular organizations.
Hybrid clouds:
Hybrid clouds combine both public and private
cloud models. They can help to provide on-
demand, externally provisioned scale.
Community Cloud:
In Community Cloud the cloud
infrastructure is shared by several
organizations and supports a specific
community that has shared concerns (e.g.,
mission, security requirements, policy, or
compliance considerations).
Cloud Advantage
 Agility improves with users' ability to rapidly and inexpensively re-provision
technological infrastructure resources.
 Cost is claimed to be greatly reduced and capital expenditure is converted to
operational expenditure.
 Multi-tenancy enables sharing of resources and costs across a large pool of users .
 Maintenance cloud computing applications are easier to maintain, since they don't
have to be installed on each user's computer.
Security could improve due to centralization of data, increased security-focused
resources, etc
SECURITY IN CLOUD
Data Security:
It focuses on protecting the software
and hardware associated with the cloud.
It deals with choosing an apt locatio
n for data centers so as to protect it from inter
nal threats, different types of weather conditio
ns, fire and even physical attacks that might de
stroy the center physically and external threats
avoiding unauthorized access and break in.
Network Security:
Network security Protecting the
network over which cloud is running from
various attacks DOS, DDOS, IP Spoofing, ARP
Spoofing and any novel attacks that
intruders may device.
Backups of Data
• Data store in database of provider should be redundantly store
in multiple physical location.
• Data that is generated during running of program on instances
is all customer data and therefore provider should not perform
backups.
• Control of Administrator on Databases.
Encryption Scheme
• Is it possible for all of my data to be fully encrypted?
• What algorithms are used?
• Who holds, maintains and issues the keys?
Problem:
• Encryption accidents can make data totally unusable.
• Encryption can complicate availability
Solution :
• The cloud provider should provide evidence that encryption schemes were
designed and tested by experienced specialists
Cloud Integrity
Integrity is a degree confidence that the data in the cloud is what is
supposed to be there, and is protected against accidental or intentional
alteration without authorization.
It also extends to the hurdles of synchronizing multiple databases.
Integrity is supported by well audited code, well-designed distributed
systems, and robust access control mechanisms.
Cloud Availability
Availability means being able to use the system as anticipated.
Cloud technologies can increase availability through widespread internet
enabled access, but the client is dependent on the timely and robust provision
of resources.
Availability is supported by capacity building and good architecture by the
provider, as well as well-defined contracts and terms of agreement.
Conclusion
Every new technology has its pros and cons, similar is the case with cloud computing.
Although cloud computing provides easy data storage and access. But there are several
issues related to storing and managing data, that is not controlled by owner of the data.
This attack attempts to prevent the data available to its intended users. The last
issue is cloud privacy and it is similar to cloud confidentiality. if cloud confidentiality is at
risk, cloud privacy will also be at risk.
Wang, Q, Wan, K. Ren nd Wenjing Lou, "Privacy-Preserving Public Auditing for Data StorageSecurity in
Cloud Computing", Infocom, Proceedings IEEE, 2010, pp.1-9.
Chen and H. Zhao, "Data Security and Privacy Protection Issues in Cloud Com-puting", in International
Conference on Computer Science and Electronics Engineer-ing(ICCSEE), 2012, vol.1, pp.647-651.
Xiao and Y. Xiao, "Security and Privacy in Cloud Computing ",IEEE Commun. Surveys and Tutorials, vol.
15, no.2, pp.843 - 859, Second quarter 2013.
Ren, C. Wang and Q. Wang, "Security Challenges for the Public Cloud", Internet Computing, IEEE ,
vol.16, no.1, pp.69-73, Jan/Feb 2012.
REFERENCES
Security in cloud computing

More Related Content

What's hot

What is Virtualization and its types & Techniques.What is hypervisor and its ...
What is Virtualization and its types & Techniques.What is hypervisor and its ...What is Virtualization and its types & Techniques.What is hypervisor and its ...
What is Virtualization and its types & Techniques.What is hypervisor and its ...Shashi soni
 
Network - Bilgisayar Ağlarına Giriş
Network - Bilgisayar Ağlarına Giriş Network - Bilgisayar Ağlarına Giriş
Network - Bilgisayar Ağlarına Giriş Murat KARA
 
The Future of Securing Access Controls in Information Security
The Future of Securing Access Controls in Information SecurityThe Future of Securing Access Controls in Information Security
The Future of Securing Access Controls in Information SecurityAmazon Web Services
 
What is Virtualization
What is VirtualizationWhat is Virtualization
What is VirtualizationIsrael Marcus
 
Virtualization concept slideshare
Virtualization concept slideshareVirtualization concept slideshare
Virtualization concept slideshareYogesh Kumar
 
Virtualization in cloud computing ppt
Virtualization in cloud computing pptVirtualization in cloud computing ppt
Virtualization in cloud computing pptMehul Patel
 
Vmware virtualization in data centers
Vmware virtualization in data centersVmware virtualization in data centers
Vmware virtualization in data centersHarshitTaneja13
 
VMware Performance Troubleshooting
VMware Performance TroubleshootingVMware Performance Troubleshooting
VMware Performance Troubleshootingglbsolutions
 
Network Virtualization Architectural & Technological aspects
Network Virtualization Architectural & Technological aspectsNetwork Virtualization Architectural & Technological aspects
Network Virtualization Architectural & Technological aspectsdeshpandeamrut
 
DHCP SERVER Logları ve SNMP ile Kimlik Takibi
DHCP SERVER Logları ve SNMP ile Kimlik TakibiDHCP SERVER Logları ve SNMP ile Kimlik Takibi
DHCP SERVER Logları ve SNMP ile Kimlik TakibiErtugrul Akbas
 
Virtualization and cloud computing
Virtualization and cloud computingVirtualization and cloud computing
Virtualization and cloud computingDeep Gupta
 

What's hot (20)

VMWare on AWS
VMWare on AWSVMWare on AWS
VMWare on AWS
 
Virtualization.ppt
Virtualization.pptVirtualization.ppt
Virtualization.ppt
 
What is Virtualization and its types & Techniques.What is hypervisor and its ...
What is Virtualization and its types & Techniques.What is hypervisor and its ...What is Virtualization and its types & Techniques.What is hypervisor and its ...
What is Virtualization and its types & Techniques.What is hypervisor and its ...
 
Paravirtualization
ParavirtualizationParavirtualization
Paravirtualization
 
Introduction to virtualization
Introduction to virtualizationIntroduction to virtualization
Introduction to virtualization
 
Network - Bilgisayar Ağlarına Giriş
Network - Bilgisayar Ağlarına Giriş Network - Bilgisayar Ağlarına Giriş
Network - Bilgisayar Ağlarına Giriş
 
The Future of Securing Access Controls in Information Security
The Future of Securing Access Controls in Information SecurityThe Future of Securing Access Controls in Information Security
The Future of Securing Access Controls in Information Security
 
What is Virtualization
What is VirtualizationWhat is Virtualization
What is Virtualization
 
Kablosuz Ağlarda Güvenlik
Kablosuz Ağlarda GüvenlikKablosuz Ağlarda Güvenlik
Kablosuz Ağlarda Güvenlik
 
Virtualization concept slideshare
Virtualization concept slideshareVirtualization concept slideshare
Virtualization concept slideshare
 
Virtualization in cloud computing ppt
Virtualization in cloud computing pptVirtualization in cloud computing ppt
Virtualization in cloud computing ppt
 
Network virtualization
Network virtualizationNetwork virtualization
Network virtualization
 
Vmware virtualization in data centers
Vmware virtualization in data centersVmware virtualization in data centers
Vmware virtualization in data centers
 
Virtualization basics
Virtualization basics Virtualization basics
Virtualization basics
 
VMware Performance Troubleshooting
VMware Performance TroubleshootingVMware Performance Troubleshooting
VMware Performance Troubleshooting
 
Network Virtualization Architectural & Technological aspects
Network Virtualization Architectural & Technological aspectsNetwork Virtualization Architectural & Technological aspects
Network Virtualization Architectural & Technological aspects
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
DHCP SERVER Logları ve SNMP ile Kimlik Takibi
DHCP SERVER Logları ve SNMP ile Kimlik TakibiDHCP SERVER Logları ve SNMP ile Kimlik Takibi
DHCP SERVER Logları ve SNMP ile Kimlik Takibi
 
Virtualization and cloud computing
Virtualization and cloud computingVirtualization and cloud computing
Virtualization and cloud computing
 
Networking in Openstack - Neutron 101
Networking in Openstack - Neutron 101Networking in Openstack - Neutron 101
Networking in Openstack - Neutron 101
 

Similar to Security in cloud computing

Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIjirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIJIR JOURNALS IJIRUSA
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computingPrince Chandu
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detectionijsrd.com
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentIOSR Journals
 
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGA STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGEr Piyush Gupta IN ⊞⌘
 
Fog computing document
Fog computing documentFog computing document
Fog computing documentsravya raju
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloudpriyanka reddy
 
A Detailed Analysis of the Issues and Solutions for Securing Data in Cloud
A Detailed Analysis of the Issues and Solutions for Securing Data  in CloudA Detailed Analysis of the Issues and Solutions for Securing Data  in Cloud
A Detailed Analysis of the Issues and Solutions for Securing Data in CloudIOSR Journals
 
Cloud computing and Cloud Security - Basics and Terminologies
Cloud computing and Cloud Security - Basics and TerminologiesCloud computing and Cloud Security - Basics and Terminologies
Cloud computing and Cloud Security - Basics and TerminologiesTechsparks
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computingronak patel
 
A220113
A220113A220113
A220113irjes
 
Cloud computing final format(1)
Cloud computing final format(1)Cloud computing final format(1)
Cloud computing final format(1)ahmed elmeghiny
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelijcsit
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREIJNSA Journal
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREIJNSA Journal
 
Clouding computing
Clouding computingClouding computing
Clouding computingMadhavi39
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 

Similar to Security in cloud computing (20)

Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIjirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detection
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud Environment
 
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGA STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
 
Fog computing document
Fog computing documentFog computing document
Fog computing document
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
 
Fog doc
Fog doc Fog doc
Fog doc
 
Cloud security
Cloud securityCloud security
Cloud security
 
A Detailed Analysis of the Issues and Solutions for Securing Data in Cloud
A Detailed Analysis of the Issues and Solutions for Securing Data  in CloudA Detailed Analysis of the Issues and Solutions for Securing Data  in Cloud
A Detailed Analysis of the Issues and Solutions for Securing Data in Cloud
 
Cloud computing and Cloud Security - Basics and Terminologies
Cloud computing and Cloud Security - Basics and TerminologiesCloud computing and Cloud Security - Basics and Terminologies
Cloud computing and Cloud Security - Basics and Terminologies
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computing
 
A220113
A220113A220113
A220113
 
Cloud computing final format(1)
Cloud computing final format(1)Cloud computing final format(1)
Cloud computing final format(1)
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher model
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
 
Clouding computing
Clouding computingClouding computing
Clouding computing
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 

More from Er. Saba karim

More from Er. Saba karim (8)

eye gaze
eye gazeeye gaze
eye gaze
 
Wireless USB
Wireless USBWireless USB
Wireless USB
 
Wireless USB
Wireless USBWireless USB
Wireless USB
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Eye Gaze
Eye GazeEye Gaze
Eye Gaze
 
Underwater Wireless Communication”,
Underwater Wireless Communication”,Underwater Wireless Communication”,
Underwater Wireless Communication”,
 
security in cloud computing
security in cloud computingsecurity in cloud computing
security in cloud computing
 
Under Water wireless communication
Under Water wireless communicationUnder Water wireless communication
Under Water wireless communication
 

Recently uploaded

power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 

Recently uploaded (20)

power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 

Security in cloud computing

  • 1. SEMINAR REPORT ON JIIU’S Jamia Institute of Engineering and Management Studies Presented By: Saba Karim
  • 2.  Introduction  Cloud Services delivery Model  Deployment Model  Cloud advantage  Security in Cloud  data security  Encryption Scheme  Cloud integrity  Cloud availability  Conclusion  References
  • 3. Introduction Cloud computing is an internet-based computing technology, where shared resources such as software, platform, storage and information are provided to customers on demand. Cloud computing is a computing platform for sharing resources that include infrastructures, software, applications, and business processes. . .
  • 4. Cloud Services Delivery Model A cloud services delivery model is commonly referred to as an SPI and falls into three generally accepted services:  The Software-As-a-Service Model  The Platform-As-a-Service Model  The Infrastructure-As-a-Service Model hh FIG.: Cloud delivery model
  • 5. Software as a service (SaaS): Software as a service features a complete application offered as a service on demand. A single instance of the software runs on the cloud and services multiple end users or client organizations. . Infrastructure as a service (IaaS): Infrastructure as a service delivers basic storage and computer capabilities as standardized services over the network. Servers, storage systems, switches, routers. Platform as a service (PaaS): In a platform-as-a-service (PaaS) model, the vendor offers a development environment to application developers, who develop applications and offer those services through the provider’s platform.
  • 6. Deployment Model Cloud deployment models include:  Public clouds  Private clouds  Community clouds  Hybrid clouds. Cloud deployment model
  • 7. Public Clouds: Public clouds are external or publicly available cloud environments that are accessible to multiple tenants. Private clouds: private clouds are typically tailored environments with dedicated virtualized resources for particular organizations.
  • 8. Hybrid clouds: Hybrid clouds combine both public and private cloud models. They can help to provide on- demand, externally provisioned scale. Community Cloud: In Community Cloud the cloud infrastructure is shared by several organizations and supports a specific community that has shared concerns (e.g., mission, security requirements, policy, or compliance considerations).
  • 9. Cloud Advantage  Agility improves with users' ability to rapidly and inexpensively re-provision technological infrastructure resources.  Cost is claimed to be greatly reduced and capital expenditure is converted to operational expenditure.  Multi-tenancy enables sharing of resources and costs across a large pool of users .  Maintenance cloud computing applications are easier to maintain, since they don't have to be installed on each user's computer. Security could improve due to centralization of data, increased security-focused resources, etc
  • 10. SECURITY IN CLOUD Data Security: It focuses on protecting the software and hardware associated with the cloud. It deals with choosing an apt locatio n for data centers so as to protect it from inter nal threats, different types of weather conditio ns, fire and even physical attacks that might de stroy the center physically and external threats avoiding unauthorized access and break in. Network Security: Network security Protecting the network over which cloud is running from various attacks DOS, DDOS, IP Spoofing, ARP Spoofing and any novel attacks that intruders may device.
  • 11. Backups of Data • Data store in database of provider should be redundantly store in multiple physical location. • Data that is generated during running of program on instances is all customer data and therefore provider should not perform backups. • Control of Administrator on Databases.
  • 12. Encryption Scheme • Is it possible for all of my data to be fully encrypted? • What algorithms are used? • Who holds, maintains and issues the keys? Problem: • Encryption accidents can make data totally unusable. • Encryption can complicate availability Solution : • The cloud provider should provide evidence that encryption schemes were designed and tested by experienced specialists
  • 13. Cloud Integrity Integrity is a degree confidence that the data in the cloud is what is supposed to be there, and is protected against accidental or intentional alteration without authorization. It also extends to the hurdles of synchronizing multiple databases. Integrity is supported by well audited code, well-designed distributed systems, and robust access control mechanisms.
  • 14. Cloud Availability Availability means being able to use the system as anticipated. Cloud technologies can increase availability through widespread internet enabled access, but the client is dependent on the timely and robust provision of resources. Availability is supported by capacity building and good architecture by the provider, as well as well-defined contracts and terms of agreement.
  • 15. Conclusion Every new technology has its pros and cons, similar is the case with cloud computing. Although cloud computing provides easy data storage and access. But there are several issues related to storing and managing data, that is not controlled by owner of the data. This attack attempts to prevent the data available to its intended users. The last issue is cloud privacy and it is similar to cloud confidentiality. if cloud confidentiality is at risk, cloud privacy will also be at risk.
  • 16. Wang, Q, Wan, K. Ren nd Wenjing Lou, "Privacy-Preserving Public Auditing for Data StorageSecurity in Cloud Computing", Infocom, Proceedings IEEE, 2010, pp.1-9. Chen and H. Zhao, "Data Security and Privacy Protection Issues in Cloud Com-puting", in International Conference on Computer Science and Electronics Engineer-ing(ICCSEE), 2012, vol.1, pp.647-651. Xiao and Y. Xiao, "Security and Privacy in Cloud Computing ",IEEE Commun. Surveys and Tutorials, vol. 15, no.2, pp.843 - 859, Second quarter 2013. Ren, C. Wang and Q. Wang, "Security Challenges for the Public Cloud", Internet Computing, IEEE , vol.16, no.1, pp.69-73, Jan/Feb 2012. REFERENCES