SlideShare a Scribd company logo
1 of 19
Stealthy denial of service strategy in cloud
computing
Under the guidance of
Mr. S. Suraj kamal (M.Tech)
Assistant Professor.
Presented by
K. Roopa (12701A0565)
G . Prasanna (12701A0560)
J. Venkata Praveen (12701A0597)
S. Subhash chandra bose (12701A0581)
Department of computer science and engineering(CSE).
Annamacharya institute of technology and sciences
new boyanpalli,rajampet(AITS)
CONTENTS
 Abstract
Existing System And its Challenges
Proposed System And its Advantages
Architecture
List of Modules
Modeling Diagrams
System configuration
Title explanation
• Cloud computing is the use of computing resources
(hardware and software) that are delivered as a service
over a network (typically the Internet).
• Propose a strategy to orchestrate stealthy attack
patterns, which exhibit a slowly-increasing-intensity trend
designed to inflict the maximum financial cost to the
cloud customer.
Abstract
Cloud computing paradigm is due to its on-demand,
self-service, and pay-by-use nature.
Denial of Service (DoS) attacks involve not only the
quality of the delivered service, but also the service
maintenance costs in terms of resource consumption.
Aim at minimizing their visibility
Longer the detection delay is, the higher cost to be
incurred
Existing system
Sophisticated DDoS attacks are defined as that
category of attacks, which are tailored to hurt a
specific weak point in the target system design.
 In order to conduct denial of service or just to
significantly degrade the performance.
Disadvantages:
Target server has a finite service queue, where the
incoming service requests are temporarily stored to be
served by the corresponding application process or thread.
None of the works proposed in the literature focus on
stealthy attacks against application that run in the cloud
environment.
Proposed System
Sophisticated strategy to orchestrate stealthy attack
patterns against applications running in the cloud.
Proposed strategy aims at exploiting the cloud
flexibility.
Advantages
Proposed slowly-increasing polymorphic
behavior avoids enough overload on the target
system
Detects the attack, the attack process can be re-initiate
by exploiting a different application vulnerability
(polymorphism in the form), or a different timing
(polymorphism over time), in order to inflict a prolonged
consumption of resources.
System Architecture for Stealthy denial of
service strategy in cloud computing
List of modules
Data owner
Cloud server
Data consumer
Threat model
Data owner
In this module, the data owner uploads
their data in the cloud server. For the
security purpose the data owner splits file
to four packets, encrypts the data file and
then store in the cloud. The Data owner
can have capable of manipulating the
encrypted data file.
Cloud server
The cloud service provider manages a
cloud to provide data storage service. Data
owner encrypts and splits the data files and
store them in the cloud for sharing with
data consumers. To access the shared
data files, data consumers download
encrypted data files of their interest from
the cloud and then decrypt them.
Data consumer
In this module, the user can only access
the data file with the encrypted key to
access the file. Then The NC cloud
combines all the packets and sends to
Remote user. Users may try to access data
files within the cloud only.
Threat model
Attacker adds the malicious data to a file
in cloud servers. Then the Unauthorized
user will considered as a attacker. The
unauthorized user can delete the packets in
a particular file.
USECASE DIAGRAM for Stealthy denial of service strategy in cloud
computing:
Browse File
Send File
Upload Response
Encrypt File
Store Encrypted Data
View Owner Files
View Attackers
Search 'N Ranked Data
View 'N' Ranked Data
Request data
Retrieve and store data
Process End User Request
View User Files
data owner
cloud server
end user
CLASS DIAGRAM for Stealthy denial of service strategy in cloud
computing:
data owner
Browse File
Upload File
Encrypt File
View All
View_owner_Files
Exit
Select File Name()
Owner Name()
Owner File()
Cloud Server
View all Owner Files
View Attacks
Store_Files
,Authorize_Files
Authorize users
File ID, File Name, Owner Name()
Secret Key, User Details()
File Access Details()
View User Property, Hackers, Exit()
Register
Register
Reset
Name()
Password()
DOB()
Gender()
Address()
City()
Country()
Email()
Mobile()
End User
Search File Download
Search 'N' Ranked data
Exit
Register
Login
Fname()
n rank()
username()
secret_key()
Login
Login
Register
Reset
User Name()
Password()
SEQUENCE DIAGRAM for Stealthy denial of service strategy in
cloud computing:
Data Owner End User Cloud Server
1: create the account
2: account acceptance res
3: upload the file
4: file received confirmation
5: create the account
6: account confirmation
7: req the file
8: file req confirmation
9: file sending responce
12: verify confirmation
14: delete file
11: view user file req
13: process req
15: view reqts
10: verify files
COLLABORATION DIAGRAM for Stealthy denial of service strategy in cloud
computing:
Cloud
Server
Data
Owner
End
User
11: view user file req
13: process req
15: view reqts
1: create the account
3: upload the file
12: verifyconfirmation
14: delete file
2: account acceptance res
4: file received confirmation
5: create the account
7: req the file
6: account confirmation
8: file req confirmation
9: file sending responce
10: verify files
SYSTEM REQUIREMENTS
Hardware Requirements:
System : Pentium IV 2.4 Ghz
Hard Disk : 40 GB
RAM : 2 GB
Software Requirements:
Operating System : Windows XP
Language : Java
Front End : JSP
Data Base : My SQL
Server : Apache Tomcat

More Related Content

What's hot

SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUDSECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUDNexgen Technology
 
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET-  	  Privacy Preserving Encrypted Keyword Search SchemesIRJET-  	  Privacy Preserving Encrypted Keyword Search Schemes
IRJET- Privacy Preserving Encrypted Keyword Search SchemesIRJET Journal
 
A secure erasure code based cloud storage
A secure erasure code based cloud storageA secure erasure code based cloud storage
A secure erasure code based cloud storageIMPULSE_TECHNOLOGY
 
MCDB: Multi Cloud Database Model
MCDB: Multi Cloud Database ModelMCDB: Multi Cloud Database Model
MCDB: Multi Cloud Database Modelathulya_raj
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationPvrtechnologies Nellore
 
Towards Secure and Dependable Storage Services in Cloud Computing
Towards Secure and Dependable Storage Services in Cloud  Computing Towards Secure and Dependable Storage Services in Cloud  Computing
Towards Secure and Dependable Storage Services in Cloud Computing IJMER
 
Towards secure and dependable storage
Towards secure and dependable storageTowards secure and dependable storage
Towards secure and dependable storageKhaja Moiz Uddin
 
Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...Pvrtechnologies Nellore
 
Thilaganga mphil cs viva presentation ppt
Thilaganga mphil cs viva presentation pptThilaganga mphil cs viva presentation ppt
Thilaganga mphil cs viva presentation pptthilaganga
 
Oruta privacy preserving public auditing
Oruta privacy preserving public auditingOruta privacy preserving public auditing
Oruta privacy preserving public auditingPapitha Velumani
 
Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...IGEEKS TECHNOLOGIES
 
A Novel Additive Order Protocol in Cloud Storage and Avoiding the Trapdoors
A Novel Additive Order Protocol in Cloud Storage and Avoiding the TrapdoorsA Novel Additive Order Protocol in Cloud Storage and Avoiding the Trapdoors
A Novel Additive Order Protocol in Cloud Storage and Avoiding the TrapdoorsIRJET Journal
 
Towards secure and dependable storage service in cloud
Towards secure and dependable storage service in cloudTowards secure and dependable storage service in cloud
Towards secure and dependable storage service in cloudsibidlegend
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storageIEEEFINALYEARPROJECTS
 
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET-  	  A Survey on Searching of Keyword on Encrypted Data in Cloud using ...IRJET-  	  A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...IRJET Journal
 
A Novel Approach for Data Security in Cloud Environment
A Novel Approach for Data Security in  Cloud EnvironmentA Novel Approach for Data Security in  Cloud Environment
A Novel Approach for Data Security in Cloud EnvironmentSHREYASSRINATH94
 
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
 A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD... A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...Nexgen Technology
 

What's hot (19)

SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUDSECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
 
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET-  	  Privacy Preserving Encrypted Keyword Search SchemesIRJET-  	  Privacy Preserving Encrypted Keyword Search Schemes
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
 
A secure erasure code based cloud storage
A secure erasure code based cloud storageA secure erasure code based cloud storage
A secure erasure code based cloud storage
 
MCDB: Multi Cloud Database Model
MCDB: Multi Cloud Database ModelMCDB: Multi Cloud Database Model
MCDB: Multi Cloud Database Model
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplication
 
Towards Secure and Dependable Storage Services in Cloud Computing
Towards Secure and Dependable Storage Services in Cloud  Computing Towards Secure and Dependable Storage Services in Cloud  Computing
Towards Secure and Dependable Storage Services in Cloud Computing
 
Towards secure and dependable storage
Towards secure and dependable storageTowards secure and dependable storage
Towards secure and dependable storage
 
Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...
 
Thilaganga mphil cs viva presentation ppt
Thilaganga mphil cs viva presentation pptThilaganga mphil cs viva presentation ppt
Thilaganga mphil cs viva presentation ppt
 
Oruta ppt
Oruta pptOruta ppt
Oruta ppt
 
Oruta privacy preserving public auditing
Oruta privacy preserving public auditingOruta privacy preserving public auditing
Oruta privacy preserving public auditing
 
Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...
 
A Novel Additive Order Protocol in Cloud Storage and Avoiding the Trapdoors
A Novel Additive Order Protocol in Cloud Storage and Avoiding the TrapdoorsA Novel Additive Order Protocol in Cloud Storage and Avoiding the Trapdoors
A Novel Additive Order Protocol in Cloud Storage and Avoiding the Trapdoors
 
Towards secure and dependable storage service in cloud
Towards secure and dependable storage service in cloudTowards secure and dependable storage service in cloud
Towards secure and dependable storage service in cloud
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storage
 
Final 1st
Final 1stFinal 1st
Final 1st
 
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET-  	  A Survey on Searching of Keyword on Encrypted Data in Cloud using ...IRJET-  	  A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
 
A Novel Approach for Data Security in Cloud Environment
A Novel Approach for Data Security in  Cloud EnvironmentA Novel Approach for Data Security in  Cloud Environment
A Novel Approach for Data Security in Cloud Environment
 
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
 A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD... A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
 

Similar to review exicution

IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET-  	  Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET-  	  Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET Journal
 
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET Journal
 
Drops division and replication of data in cloud for optimal performance and s...
Drops division and replication of data in cloud for optimal performance and s...Drops division and replication of data in cloud for optimal performance and s...
Drops division and replication of data in cloud for optimal performance and s...Pvrtechnologies Nellore
 
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in CloudAn Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in CloudIRJET Journal
 
Secure_Data_Distribution_Algorithm_for_Fog_Computing.pdf
Secure_Data_Distribution_Algorithm_for_Fog_Computing.pdfSecure_Data_Distribution_Algorithm_for_Fog_Computing.pdf
Secure_Data_Distribution_Algorithm_for_Fog_Computing.pdfHimaBinduKrovvidi
 
FOG drive Keerthana3rd ppt.pptx
FOG drive Keerthana3rd ppt.pptxFOG drive Keerthana3rd ppt.pptx
FOG drive Keerthana3rd ppt.pptxrohithprakash16
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET Journal
 
Secure File Sharing on Cloud
Secure File Sharing on CloudSecure File Sharing on Cloud
Secure File Sharing on CloudSupriya .
 
Iaetsd time constrained self-destructing
Iaetsd time constrained self-destructingIaetsd time constrained self-destructing
Iaetsd time constrained self-destructingIaetsd Iaetsd
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 
Data security framework for cloud computing networks
Data security framework for cloud computing networksData security framework for cloud computing networks
Data security framework for cloud computing networksIAEME Publication
 
Appraisal of the Most Prominent Attacks due to Vulnerabilities in Cloud Compu...
Appraisal of the Most Prominent Attacks due to Vulnerabilities in Cloud Compu...Appraisal of the Most Prominent Attacks due to Vulnerabilities in Cloud Compu...
Appraisal of the Most Prominent Attacks due to Vulnerabilities in Cloud Compu...Salam Shah
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudIJTET Journal
 
Securing Sensitive Data in Your Hybrid Cloud
Securing Sensitive Data in Your Hybrid CloudSecuring Sensitive Data in Your Hybrid Cloud
Securing Sensitive Data in Your Hybrid CloudRightScale
 
thilaganga journal 1
thilaganga journal 1thilaganga journal 1
thilaganga journal 1thilaganga
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computingEr. Saba karim
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
E041212224
E041212224E041212224
E041212224IOSR-JEN
 

Similar to review exicution (20)

IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET-  	  Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET-  	  Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
 
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
 
Drops division and replication of data in cloud for optimal performance and s...
Drops division and replication of data in cloud for optimal performance and s...Drops division and replication of data in cloud for optimal performance and s...
Drops division and replication of data in cloud for optimal performance and s...
 
L01246974
L01246974L01246974
L01246974
 
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in CloudAn Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
 
Secure_Data_Distribution_Algorithm_for_Fog_Computing.pdf
Secure_Data_Distribution_Algorithm_for_Fog_Computing.pdfSecure_Data_Distribution_Algorithm_for_Fog_Computing.pdf
Secure_Data_Distribution_Algorithm_for_Fog_Computing.pdf
 
FOG drive Keerthana3rd ppt.pptx
FOG drive Keerthana3rd ppt.pptxFOG drive Keerthana3rd ppt.pptx
FOG drive Keerthana3rd ppt.pptx
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
 
Secure File Sharing on Cloud
Secure File Sharing on CloudSecure File Sharing on Cloud
Secure File Sharing on Cloud
 
Iaetsd time constrained self-destructing
Iaetsd time constrained self-destructingIaetsd time constrained self-destructing
Iaetsd time constrained self-destructing
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
Data security framework for cloud computing networks
Data security framework for cloud computing networksData security framework for cloud computing networks
Data security framework for cloud computing networks
 
Appraisal of the Most Prominent Attacks due to Vulnerabilities in Cloud Compu...
Appraisal of the Most Prominent Attacks due to Vulnerabilities in Cloud Compu...Appraisal of the Most Prominent Attacks due to Vulnerabilities in Cloud Compu...
Appraisal of the Most Prominent Attacks due to Vulnerabilities in Cloud Compu...
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-Cloud
 
Securing Sensitive Data in Your Hybrid Cloud
Securing Sensitive Data in Your Hybrid CloudSecuring Sensitive Data in Your Hybrid Cloud
Securing Sensitive Data in Your Hybrid Cloud
 
thilaganga journal 1
thilaganga journal 1thilaganga journal 1
thilaganga journal 1
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computing
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
E041212224
E041212224E041212224
E041212224
 

review exicution

  • 1. Stealthy denial of service strategy in cloud computing Under the guidance of Mr. S. Suraj kamal (M.Tech) Assistant Professor. Presented by K. Roopa (12701A0565) G . Prasanna (12701A0560) J. Venkata Praveen (12701A0597) S. Subhash chandra bose (12701A0581) Department of computer science and engineering(CSE). Annamacharya institute of technology and sciences new boyanpalli,rajampet(AITS)
  • 2. CONTENTS  Abstract Existing System And its Challenges Proposed System And its Advantages Architecture List of Modules Modeling Diagrams System configuration
  • 3. Title explanation • Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over a network (typically the Internet). • Propose a strategy to orchestrate stealthy attack patterns, which exhibit a slowly-increasing-intensity trend designed to inflict the maximum financial cost to the cloud customer.
  • 4. Abstract Cloud computing paradigm is due to its on-demand, self-service, and pay-by-use nature. Denial of Service (DoS) attacks involve not only the quality of the delivered service, but also the service maintenance costs in terms of resource consumption. Aim at minimizing their visibility Longer the detection delay is, the higher cost to be incurred
  • 5. Existing system Sophisticated DDoS attacks are defined as that category of attacks, which are tailored to hurt a specific weak point in the target system design.  In order to conduct denial of service or just to significantly degrade the performance.
  • 6. Disadvantages: Target server has a finite service queue, where the incoming service requests are temporarily stored to be served by the corresponding application process or thread. None of the works proposed in the literature focus on stealthy attacks against application that run in the cloud environment.
  • 7. Proposed System Sophisticated strategy to orchestrate stealthy attack patterns against applications running in the cloud. Proposed strategy aims at exploiting the cloud flexibility.
  • 8. Advantages Proposed slowly-increasing polymorphic behavior avoids enough overload on the target system Detects the attack, the attack process can be re-initiate by exploiting a different application vulnerability (polymorphism in the form), or a different timing (polymorphism over time), in order to inflict a prolonged consumption of resources.
  • 9. System Architecture for Stealthy denial of service strategy in cloud computing
  • 10. List of modules Data owner Cloud server Data consumer Threat model
  • 11. Data owner In this module, the data owner uploads their data in the cloud server. For the security purpose the data owner splits file to four packets, encrypts the data file and then store in the cloud. The Data owner can have capable of manipulating the encrypted data file.
  • 12. Cloud server The cloud service provider manages a cloud to provide data storage service. Data owner encrypts and splits the data files and store them in the cloud for sharing with data consumers. To access the shared data files, data consumers download encrypted data files of their interest from the cloud and then decrypt them.
  • 13. Data consumer In this module, the user can only access the data file with the encrypted key to access the file. Then The NC cloud combines all the packets and sends to Remote user. Users may try to access data files within the cloud only.
  • 14. Threat model Attacker adds the malicious data to a file in cloud servers. Then the Unauthorized user will considered as a attacker. The unauthorized user can delete the packets in a particular file.
  • 15. USECASE DIAGRAM for Stealthy denial of service strategy in cloud computing: Browse File Send File Upload Response Encrypt File Store Encrypted Data View Owner Files View Attackers Search 'N Ranked Data View 'N' Ranked Data Request data Retrieve and store data Process End User Request View User Files data owner cloud server end user
  • 16. CLASS DIAGRAM for Stealthy denial of service strategy in cloud computing: data owner Browse File Upload File Encrypt File View All View_owner_Files Exit Select File Name() Owner Name() Owner File() Cloud Server View all Owner Files View Attacks Store_Files ,Authorize_Files Authorize users File ID, File Name, Owner Name() Secret Key, User Details() File Access Details() View User Property, Hackers, Exit() Register Register Reset Name() Password() DOB() Gender() Address() City() Country() Email() Mobile() End User Search File Download Search 'N' Ranked data Exit Register Login Fname() n rank() username() secret_key() Login Login Register Reset User Name() Password()
  • 17. SEQUENCE DIAGRAM for Stealthy denial of service strategy in cloud computing: Data Owner End User Cloud Server 1: create the account 2: account acceptance res 3: upload the file 4: file received confirmation 5: create the account 6: account confirmation 7: req the file 8: file req confirmation 9: file sending responce 12: verify confirmation 14: delete file 11: view user file req 13: process req 15: view reqts 10: verify files
  • 18. COLLABORATION DIAGRAM for Stealthy denial of service strategy in cloud computing: Cloud Server Data Owner End User 11: view user file req 13: process req 15: view reqts 1: create the account 3: upload the file 12: verifyconfirmation 14: delete file 2: account acceptance res 4: file received confirmation 5: create the account 7: req the file 6: account confirmation 8: file req confirmation 9: file sending responce 10: verify files
  • 19. SYSTEM REQUIREMENTS Hardware Requirements: System : Pentium IV 2.4 Ghz Hard Disk : 40 GB RAM : 2 GB Software Requirements: Operating System : Windows XP Language : Java Front End : JSP Data Base : My SQL Server : Apache Tomcat