SlideShare a Scribd company logo
DATA
CONFIDENTIALITY IN
CLOUD COMPUTING
RITESH DWIVEDI GUIDED BY:
9911103528 MR. BANSIDHAR JOSHI
What is Cloud?
 Cloud computing involves deploying groups of remote servers and
software networked that allow centralized data storage and online
access to computer services or resources.
 Cloud computing continues to be one of the most hyped subjects in
IT, but it is becoming more and more an integral concept in IT
overall.
 Cloud computing providers offer their services according to several
fundamental models.
Cloud Services
 Cloud infrastructure services, known as Infrastructure as a Service
(IaaS), are self-service models for accessing, monitoring, and
managing remote data center infrastructures, such as compute,
storage, networking, and networking services.
 Cloud platform services, or Platform as a Service (PaaS), are used for
applications, and other development, while providing cloud
components to software.
 Cloud application services, or Software as a Service (SaaS), uses the
web to deliver applications that are managed by a third-party
vendor and whose interface is accessed on the clients’ side.
Cloud Computing Types
 A cloud is called a "public cloud" when the services are rendered
over a network that is open for public use. They may be free or
offered on a pay-per-usage model.
 Private cloud is cloud infrastructure operated solely for a single
organization, whether managed internally or by a third-party, and
hosted either internally or externally.
 Hybrid cloud is a composition of two or more clouds (private,
community or public) that remain distinct entities but are bound
together, offering the benefits of multiple deployment models.
Why did I chose Private Cloud?
 In case of public cloud you may not know where your data is stored,
if or how it is backed up, and whether unauthorized users can get to
it.
 Public cloud vendors provide their own services, so you can’t
control them or modify them.
 Your business is your data and your applications. Therefore, control
and security are paramount.
 You have to abide by the privacy policy, terms and conditions of
the vendor of public cloud.
What have I used?
 I have used Ubuntu Server OS for my private cloud as Ubuntu is most
preferred OS worldwide.
 For cloud deployment I have used OpenStack, which is a free and
open-source cloud computing software platform.
 I have used two-node architecture with legacy networking (nova-
network) having primarily Controller node and Compute node.
Legacy Network (Nova Network)
My Project
 Clouds are sometimes used to manage sensitive information, the
aim of my project is to secure that sensitive data within the cloud.
 This is known as Data Confidentiality.
 It can be defined as, Data Confidentiality is whether the information
stored on a system is protected against unintended or unauthorized
access.
 Data Confidentiality is often a measure of the ability of the system to
protect its data. Accordingly, this is an integral component of
Security.
What are the threats?
 Unauthorized users
 Operating system break-in
 Unauthorized access to data
 Data mining is a threat to privacy
 Eavesdropping on communications
Solutions are many
 Data obfuscation
 Data Fragmentation
 Protecting Data with Encryption
 Intrusion Protection Against Malicious Traffic
 Authentication, Authorization, and Access Control
My Contribution
 In this project I have proposed the idea of two level security of data
on cloud.
 Firstly, fragmentation of data into sensitive and non-sensitive part.
 On second level data encryption and obfuscation.
 Finally saving this data on different servers.
User Interface
Get unclassified
Data
K-NN Classification
Algorithm
Sensitive
Data
Blowfish Encryption
Yes
Non
Sensitive
Data
Yes
No
Obfuscation
VM1 VM2
Flow Diagram of the Project
Conclusion
 Data security in the cloud is ensured by the confidentiality of
sensitive data.
 That can be done with the help of storing encrypted data on
storage servers.
 Along with encryption, storage of data in the cloud environment is
based on fragmentation.
Thank You!

More Related Content

What's hot

Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
Rohit Buddabathina
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
nitinw25
 
cloud computing documentation
cloud computing documentationcloud computing documentation
cloud computing documentation
shilpa bojji
 
Cloud computing presentation
Cloud computing presentationCloud computing presentation
Cloud computing presentation
Priyanka Sharma
 

What's hot (20)

Cloud Ecosystem
Cloud EcosystemCloud Ecosystem
Cloud Ecosystem
 
Cloud Security: A New Perspective
Cloud Security: A New PerspectiveCloud Security: A New Perspective
Cloud Security: A New Perspective
 
Cloud Computing Project
Cloud Computing Project Cloud Computing Project
Cloud Computing Project
 
Cloud computing and data security
Cloud computing and data securityCloud computing and data security
Cloud computing and data security
 
Hybrid Cloud and Its Implementation
Hybrid Cloud and Its ImplementationHybrid Cloud and Its Implementation
Hybrid Cloud and Its Implementation
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Cryptography
Cloud CryptographyCloud Cryptography
Cloud Cryptography
 
Cloud computing Risk management
Cloud computing Risk management  Cloud computing Risk management
Cloud computing Risk management
 
Cloud security
Cloud securityCloud security
Cloud security
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Computing Architecture
Cloud Computing ArchitectureCloud Computing Architecture
Cloud Computing Architecture
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security Challenges
 
Cloud security
Cloud securityCloud security
Cloud security
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
cloud computing documentation
cloud computing documentationcloud computing documentation
cloud computing documentation
 
Cloud computing presentation
Cloud computing presentationCloud computing presentation
Cloud computing presentation
 

Viewers also liked

Disaster Recovery Center and Disaster Recovery Plan
Disaster Recovery Center and Disaster Recovery PlanDisaster Recovery Center and Disaster Recovery Plan
Disaster Recovery Center and Disaster Recovery Plan
Farid Er
 
Nelly ayala velasquez
Nelly  ayala velasquezNelly  ayala velasquez
Nelly ayala velasquez
Nala Ayala
 
Power alfabet.digital
Power alfabet.digitalPower alfabet.digital
Power alfabet.digital
ester889
 
Thi cong ctb ii danh cho sv-1
Thi cong ctb ii   danh cho sv-1Thi cong ctb ii   danh cho sv-1
Thi cong ctb ii danh cho sv-1
Thanh Tran
 
Group 4 sight sound and motion
Group 4 sight sound and motion Group 4 sight sound and motion
Group 4 sight sound and motion
robindai
 
American fantasy drama
American fantasy dramaAmerican fantasy drama
American fantasy drama
timeclarke94
 
1 sesion tecnologia educativa
1 sesion tecnologia educativa1 sesion tecnologia educativa
1 sesion tecnologia educativa
V3RSO
 
American fantasy drama
American fantasy dramaAmerican fantasy drama
American fantasy drama
timeclarke94
 

Viewers also liked (20)

Data Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model RulesData Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model Rules
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing and Security - ISACA Hyderabad Chapter PresentationCloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
 
Disaster Recovery Center and Disaster Recovery Plan
Disaster Recovery Center and Disaster Recovery PlanDisaster Recovery Center and Disaster Recovery Plan
Disaster Recovery Center and Disaster Recovery Plan
 
Ensuring data security in cloud computing. - Anusha Tuke
Ensuring data security in  cloud computing. - Anusha TukeEnsuring data security in  cloud computing. - Anusha Tuke
Ensuring data security in cloud computing. - Anusha Tuke
 
Nelly ayala velasquez
Nelly  ayala velasquezNelly  ayala velasquez
Nelly ayala velasquez
 
Power alfabet.digital
Power alfabet.digitalPower alfabet.digital
Power alfabet.digital
 
Ekonomi
EkonomiEkonomi
Ekonomi
 
My work experience
My work experienceMy work experience
My work experience
 
Otp authentication scheme based on ECC
Otp authentication scheme based on ECCOtp authentication scheme based on ECC
Otp authentication scheme based on ECC
 
Apa references (bbs)
Apa references (bbs)Apa references (bbs)
Apa references (bbs)
 
Modelo OSI
Modelo OSIModelo OSI
Modelo OSI
 
Thi cong ctb ii danh cho sv-1
Thi cong ctb ii   danh cho sv-1Thi cong ctb ii   danh cho sv-1
Thi cong ctb ii danh cho sv-1
 
Group 4 sight sound and motion
Group 4 sight sound and motion Group 4 sight sound and motion
Group 4 sight sound and motion
 
The Avalon Media System: Implementation and Community
The Avalon Media System: Implementation and CommunityThe Avalon Media System: Implementation and Community
The Avalon Media System: Implementation and Community
 
American fantasy drama
American fantasy dramaAmerican fantasy drama
American fantasy drama
 
1 sesion tecnologia educativa
1 sesion tecnologia educativa1 sesion tecnologia educativa
1 sesion tecnologia educativa
 
American fantasy drama
American fantasy dramaAmerican fantasy drama
American fantasy drama
 
The Walking Dead 01
The Walking Dead 01The Walking Dead 01
The Walking Dead 01
 
My work experience
My work experienceMy work experience
My work experience
 

Similar to Data Confidentiality in Cloud Computing

fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
priyanka reddy
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
Er. rahul abhishek
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
Er. rahul abhishek
 
Splendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptxSplendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptx
ssuserea0dfe
 
Cloud Security POV_Final (by KM)
Cloud Security POV_Final (by KM)Cloud Security POV_Final (by KM)
Cloud Security POV_Final (by KM)
Khiro Mishra
 
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd cloud computing and security challenges
Iaetsd cloud computing and security challenges
Iaetsd Iaetsd
 

Similar to Data Confidentiality in Cloud Computing (20)

Fog computing document
Fog computing documentFog computing document
Fog computing document
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detection
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
 
Fog doc
Fog doc Fog doc
Fog doc
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
Cloud computing and Cloud Security - Basics and Terminologies
Cloud computing and Cloud Security - Basics and TerminologiesCloud computing and Cloud Security - Basics and Terminologies
Cloud computing and Cloud Security - Basics and Terminologies
 
A survey on cloud security issues and techniques
A survey on cloud security issues and techniquesA survey on cloud security issues and techniques
A survey on cloud security issues and techniques
 
CLOUD COMPUTING.pdf
CLOUD COMPUTING.pdfCLOUD COMPUTING.pdf
CLOUD COMPUTING.pdf
 
CLOUD COMPUTING.pdf
CLOUD COMPUTING.pdfCLOUD COMPUTING.pdf
CLOUD COMPUTING.pdf
 
CLOUD COMPUTING kk.pptx
CLOUD COMPUTING kk.pptxCLOUD COMPUTING kk.pptx
CLOUD COMPUTING kk.pptx
 
Splendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptxSplendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptx
 
UNIT -V.docx
UNIT -V.docxUNIT -V.docx
UNIT -V.docx
 
Implementing security groups in open stack
Implementing security groups in open stackImplementing security groups in open stack
Implementing security groups in open stack
 
Literature Review: Security on cloud computing
Literature Review: Security on cloud computingLiterature Review: Security on cloud computing
Literature Review: Security on cloud computing
 
Cloud Security POV_Final (by KM)
Cloud Security POV_Final (by KM)Cloud Security POV_Final (by KM)
Cloud Security POV_Final (by KM)
 
Cloud security
Cloud securityCloud security
Cloud security
 
Cloud security
Cloud securityCloud security
Cloud security
 
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd cloud computing and security challenges
Iaetsd cloud computing and security challenges
 
Introduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptxIntroduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptx
 

Recently uploaded

The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 

Recently uploaded (20)

The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptBasic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
 
NLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptxNLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptx
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
B.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdfB.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdf
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptxJose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
 

Data Confidentiality in Cloud Computing

  • 1. DATA CONFIDENTIALITY IN CLOUD COMPUTING RITESH DWIVEDI GUIDED BY: 9911103528 MR. BANSIDHAR JOSHI
  • 2. What is Cloud?  Cloud computing involves deploying groups of remote servers and software networked that allow centralized data storage and online access to computer services or resources.  Cloud computing continues to be one of the most hyped subjects in IT, but it is becoming more and more an integral concept in IT overall.  Cloud computing providers offer their services according to several fundamental models.
  • 3. Cloud Services  Cloud infrastructure services, known as Infrastructure as a Service (IaaS), are self-service models for accessing, monitoring, and managing remote data center infrastructures, such as compute, storage, networking, and networking services.  Cloud platform services, or Platform as a Service (PaaS), are used for applications, and other development, while providing cloud components to software.  Cloud application services, or Software as a Service (SaaS), uses the web to deliver applications that are managed by a third-party vendor and whose interface is accessed on the clients’ side.
  • 4. Cloud Computing Types  A cloud is called a "public cloud" when the services are rendered over a network that is open for public use. They may be free or offered on a pay-per-usage model.  Private cloud is cloud infrastructure operated solely for a single organization, whether managed internally or by a third-party, and hosted either internally or externally.  Hybrid cloud is a composition of two or more clouds (private, community or public) that remain distinct entities but are bound together, offering the benefits of multiple deployment models.
  • 5. Why did I chose Private Cloud?  In case of public cloud you may not know where your data is stored, if or how it is backed up, and whether unauthorized users can get to it.  Public cloud vendors provide their own services, so you can’t control them or modify them.  Your business is your data and your applications. Therefore, control and security are paramount.  You have to abide by the privacy policy, terms and conditions of the vendor of public cloud.
  • 6. What have I used?  I have used Ubuntu Server OS for my private cloud as Ubuntu is most preferred OS worldwide.  For cloud deployment I have used OpenStack, which is a free and open-source cloud computing software platform.  I have used two-node architecture with legacy networking (nova- network) having primarily Controller node and Compute node.
  • 8. My Project  Clouds are sometimes used to manage sensitive information, the aim of my project is to secure that sensitive data within the cloud.  This is known as Data Confidentiality.  It can be defined as, Data Confidentiality is whether the information stored on a system is protected against unintended or unauthorized access.  Data Confidentiality is often a measure of the ability of the system to protect its data. Accordingly, this is an integral component of Security.
  • 9. What are the threats?  Unauthorized users  Operating system break-in  Unauthorized access to data  Data mining is a threat to privacy  Eavesdropping on communications
  • 10. Solutions are many  Data obfuscation  Data Fragmentation  Protecting Data with Encryption  Intrusion Protection Against Malicious Traffic  Authentication, Authorization, and Access Control
  • 11. My Contribution  In this project I have proposed the idea of two level security of data on cloud.  Firstly, fragmentation of data into sensitive and non-sensitive part.  On second level data encryption and obfuscation.  Finally saving this data on different servers.
  • 12. User Interface Get unclassified Data K-NN Classification Algorithm Sensitive Data Blowfish Encryption Yes Non Sensitive Data Yes No Obfuscation VM1 VM2 Flow Diagram of the Project
  • 13. Conclusion  Data security in the cloud is ensured by the confidentiality of sensitive data.  That can be done with the help of storing encrypted data on storage servers.  Along with encryption, storage of data in the cloud environment is based on fragmentation.