SlideShare a Scribd company logo
1 of 26
Download to read offline
Secure and Practical Outsourcing of
Linear Programming in Cloud Computing
Presented by
KONATHALA BISHWANTH
310506403026
Integrated dual degree (B.tech+M.tech)
CS&SE Dept, Andhra university
1
Guided by
Kunjam Nageswara Rao
Asst.Professor,CS&SE Dept,
Andhra university
Agenda
▪ Introduction
▪ What is cloud computing?
▪ Why we need cloud
computing ?
▪ What is security ?
▪ Why we need security in
cloud computing ?
▪ Introduction to linear
programming
▪ Why linear programming in
cloud computing?
2
▪ Existing System
▪ Disadvantages
▪ Proposed System
▪ Advantage
▪ Mechanism
▪ Hardware Requirements
▪ Software Requirements
▪ Implementation
▪ Sample screens
Introduction
✦Cloud	
  compu*ng	
  enables	
  customers	
  with	
  limited	
  computa*onal	
  resources	
  to	
  outsource	
  their	
  large	
  
computa*on	
   workloads	
   to	
   the	
   cloud,	
   and	
   economically	
   enjoy	
   the	
   massive	
   computa*onal	
   power,	
  
bandwidth,	
  storage,	
  and	
  even	
  appropriate	
  so;ware	
  that	
  can	
  be	
  shared	
  in	
  a	
  pay-­‐per-­‐use	
  manner.	
  	
  
✦Security	
   is	
   the	
   primary	
   obstacle	
   that	
   prevents	
   the	
   wide	
   adop*on	
   of	
   this	
   promising	
   compu*ng	
  
model,	
  especially	
  for	
  customers	
  when	
  their	
  confiden*al	
  data	
  are	
  consumed	
  and	
  produced	
  during	
  
the	
  computa*on.	
  	
  
✦Trea*ng	
  the	
  cloud	
  as	
  an	
  intrinsically	
  insecure	
  compu*ng	
  plaBorm	
  from	
  the	
  viewpoint	
  of	
  the	
  cloud	
  
customers,	
  
✦Focusing	
   on	
   engineering	
   compu*ng	
   and	
   op*misa*on	
   tasks,	
   the	
   secure	
   outsourcing	
   of	
   widely	
  
applicable	
  linear	
  programming	
  (LP)	
  computa*ons.	
  
✦The	
  resul*ng	
  flexibility	
  allows	
  us	
  to	
  explore	
  appropriate	
  security/	
  efficiency	
  trade	
  off	
  via	
  higher-­‐level	
  
abstrac*on	
  of	
  LP	
  computa*ons	
  than	
  the	
  general	
  circuit	
  representa*on.	
  	
  
✦Formula*ng	
  private	
  data	
  owned	
  by	
  the	
  customer	
  for	
  LP	
  problem	
  as	
  a	
  set	
  of	
  matrices	
  and	
  vectors,	
  we	
  
are	
  able	
  to	
  develop	
  a	
  set	
  of	
  efficient	
  privacy-­‐preserving	
  problem	
  transforma*on	
  techniques,	
  which	
  
allow	
  customers	
  to	
  transform	
  original	
  LP	
  problem	
  into	
  some	
  arbitrary	
  one	
  while	
  protec*ng	
  sensi*ve	
  
input/output	
  informa*on.	
  
3
What is
Cloud Computing ?
✦Cloud computing provides a variety of computing resources ,
from servers and storage to enterprise applications such as
email, security, backup/DR, voice, all delivered over the Internet.
The Cloud delivers a hosting environment that is
• Immediate,
• Flexible,
• Scalable,
• Secure,
Available while saving corporations money, time and resources.
4
Cloud Distribution Examined
5
Why
cloud computing ?
✦Cloud Computing is very much useful to a smaller companies to
generate similar savings and capabilities on its own.
✦Many of the issues blamed on the cloud in large enterprises -
security, integration, compliance and so on - often cause fewer
problems in small companies that can't properly deal with them
anyway.
Main Reasons why cloud computing is even better for small
businesses
• Economies of scale.
• Enterprise-class functionality.
• Money Matters.
• Infrastructure vs. Applications.
• The Legacy Issue.
• Security Problems.
• Compliance.
• Reliability.
6
7
1. Economies of scale: This one's obvious. The larger the company, the easier it
can generate economies of scale on its own. Small companies, by definition, have
more limited resources. Anything that can give them access to scale in purchasing
and pricing is a big win!
2. Enterprise-class functionality. Big companies have the heft to create the
custom functionality they need. Small companies simply don't have the resources to
do that. In the cloud, though, they can leverage development, maintenance and
upgrades across many, many small businesses... And, increasingly, consumers as
well.
3. Money Matters. Startups and small companies are often under capitalized and
pay-as-you-go cloud computing solutions typically don't require lots of upfront cash.
Even if they don't end up saving much as the monthly fees add up over the long run,
avoiding capital expenditures can be a make-or-break issue for cash-strapped small
businesses.
4. Infrastructure vs. Applications. For the enterprise, cloud computing often
means complex Infrastructure as a Service (IaaS) projects that have to be installed
and integrated into a company's existing systems. For smaller companies, cloud
computing often means complete cloud-based Software as a Service (SaaS)
applications and application suites. No IT required.
Reasons why cloud computing
5. The Legacy Issue. A common enterprise objection to cloud computing is how
will it work with the company's legacy applications. Small businesses - and especially
new businesses - typically have fewer and less complex legacy apps. Taken a step
farther, that means startups and small businesses have less installed infrastructure
they'd need to throw out to move into the cloud. As for new businesses, why would
you actually buy anything you could "rent" instead?
6. Security Problems. I'm not saying security isn't important to small businesses
(though many don't take it as seriously as they should). I'm saying that while security
in the cloud may still be shaky by enterprise standards, it's almost always far better
than what small businesses are able to provide for themselves.
7. Compliance. Because you don't necessarily know where your data is stored in
the cloud, IaaS can cause confusion as to whether it complies with local, national and
international regulations. That's a huge issue for multinational corporations, less so
for most small businesses.
8. Reliability. The cloud is more reliable than most people think. When widely
used cloud services and applications have outages, it makes national news. When an
individual company - large or small - has a similar problem, they work hard to make
sure you never even hear about it. The bottom line, though, is that even accounting
for network connectivity hiccups, the cloud is probably a lot more reliable than what
small businesses can afford to provide for themselves.
8
9
Evolution of cloud computing
Isp-Internet service provider
Asp-Application service
provider
SaaS-software as a service
IaaS-infrastructure as a
service
PaaS-Platform as a Service
What is
security ?
Security is the degree of resistance to, or protection from, harm. It
applies to any vulnerable and valuable asset, such as a person,
dwelling, community, nation, or organisation.
✦Cryptography
✦Redundancy
✦Disposal
✦Transfer security
✦Firewalling
What exactly firewall does is.

✦	 It isolates the virtual machines

✦	 Brilliantly filters addresses and ports

✦	 Prevents Denial-of-Service (DoS)

✦	 Detects external security assessment measures
10
Why security
is need in
cloud computing ?
"The Notorious Nine," the top nine cloud computing threats has been identified
by the CSA (Cloud Security Alliance).The report reflects the current consensus
among industry experts surveyed by CSA, focusing on threats specifically
related to the shared, on-demand nature of cloud computing.
The top most threats to the cloud computing are :
11
✦Data Breaches
✦Data Loss
✦Account or Service Traffic Hijacking
✦Insecure Interfaces and APIs
✦Denial of service
✦Malicious insiders
✦Abuse,
✦Insufficient due diligence
✦Pegged shared technology vulnerabilities
Software and
Hardware Specifications
SOFTWARE SPECIFICATION:
Operating System : Windows XP
Software : JAVA (JDK 1.6.0)
Protocol : TCP/IP
IDE : NetBeans,Xampp
12
HARDWARE SPECIFICATION:
Processor : Pentium-IV
Speed : 1.1GHz
RAM : 512MB
Hard Disk : 40GB
General : Keyboard,
. Monitor, Mouse.
13
Outsourcing computation to the commercial public cloud is also
depriving customers’ direct control over the systems that consume
and produce their data during the computation, which inevitably
brings in new security concerns and challenges towards this
promising computing model.
The outsourced computation workloads often contain sensitive
information, such as
✦The business financial records,
✦Proprietary research data,
✦Personally identifiable health information etc.
Existing System
★End to end data confidentiality -
✦unauthorised information leakage
✦sensitive data have to be encrypted before outsourcing
How ever,Ordinary data encryption techniques in essence prevent cloud
from performing any meaningful operation of the underlying plaintext
data making the computation over encrypted data a very hard problem.
There are huge financial incentives for the cloud to be “lazy” if the
customers cannot tell
✦ The correctness of the output
✦Possible software bugs
✦Hardware failures,
even outsider attacks might also affect the quality of the computed
results.
14
Dis-advantages
Proposed System
Our Linear Programming outsourcing scheme which
provides a complete outsourcing solution for not only
the privacy protection of problem input/output, but also its
efficient result checking. We start from a secure LP
outsourcing design framework.
15
✦Optimal solution using LP problems.
✦Better security on both uploading and
downloading.
✦Integrating mathematical implementation in
encryption
Advantages:
16
Mechanism Design Framework
• KeyGen(1k ) → {K }.
• ProbEnc(K, Φ) → {ΦK }.
• ProofGen(ΦK ) → {(y, Γ)}
• Result Dec (K, Φ, y, Γ) → {x, ⊥}
16
Mechanism Design Framework
These four algorithms are summarised below :
• KeyGen(1k ) → {K }. This is a randomized key generation algorithm which takes a system security
parameter k, and returns a secret key K that is used later by customer to encrypt the target LP problem.
• ProbEnc(K, Φ) → {ΦK }. This algorithm encrypts the input tuple Φ into ΦK with the secret key
K. According to problem transformation, the encrypted input ΦK has the same form as Φ, and
thus defines the problem to be solved in the cloud.
• ProofGen(ΦK ) → {(y, Γ)}. This algorithm augments a generic solver that solves the
problem ΦK to produce both the output y and a proof Γ. The output y later decrypts to x, and
Γ is used later by the customer to verify the correctness of y or x.
• Result Dec (K, Φ, y, Γ) → {x, ⊥}. This algorithm may choose to verify either y or x via the
proof Γ. In any case, a correct output x is produced by decrypting y using the secret K. The algorithm
outputs ⊥ when the validation fails, indicating the cloud server was not performing the computation
faithfully.
17
18
Architecture of secure outsourcing linear
programming problems in Cloud Computing .
Finding File
Encrypt the File
Send to Cloud Server
Decrypt the File
Give Solution / Verification key
Response to Customer
IMPLEMENTTION
✦Finding File
✦Encrypt the File
✦Send to Cloud Server
✦Decrypt the File
✦Give Solution / Verification key
✦Response to Customer
19
20
Finding File & Encrypt the File
★ADMIN LOGIN
★FILE UPLOAD
21Send to Cloud Server & Decrypt the File
★CLIENT DETAILS
★FILE ENCRYPTION
& DECRYPTION
22
Give Solution / Verification key
Linear programming process where the optimal solution gets
solved and verified
23
★USER LOGIN
★FILE SEARCH
Response to Customer
24
★IMAGE
SEARCHENGINE
★FILE DOWNLOAD
Conclusion
✦The problem of securely outsourcing LP computations in cloud computing, and
provide such a practical mechanism design which fulfils input/output privacy, cheating
resilience, and efficiency.
✦By explicitly decomposing LP computation outsourcing into public LP solvers and
private data, our mechanism design is able to explore appropriate security/efficiency
trade offs via higher level LP computation than the general circuit representation.
✦This develops problem transformation techniques that enable customers to secretly
transform the original LP into some arbitrary one while protecting sensitive input/
output information.
✦One can also investigate duality theorem and derive a set of necessary and sufficient
condition for result verification.
25
26
Thank You

More Related Content

What's hot

Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldHao Tran
 
PowerPoint Presentation
PowerPoint Presentation PowerPoint Presentation
PowerPoint Presentation christina0310
 
Privacy issues in the cloud final
Privacy issues in the cloud   finalPrivacy issues in the cloud   final
Privacy issues in the cloud finalguest50a642f
 
Cloud Security Issues 1.04.10
Cloud Security  Issues 1.04.10Cloud Security  Issues 1.04.10
Cloud Security Issues 1.04.10Rugby7277
 
Chap 6 cloud security
Chap 6 cloud securityChap 6 cloud security
Chap 6 cloud securityRaj Sarode
 
You're Not Ready for Internal Cloud
You're Not Ready for Internal CloudYou're Not Ready for Internal Cloud
You're Not Ready for Internal CloudBMC Software
 
Client Security Strategies To Defeat Advanced Threats
Client Security Strategies To Defeat Advanced ThreatsClient Security Strategies To Defeat Advanced Threats
Client Security Strategies To Defeat Advanced ThreatsDell World
 
MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!Dell EMC World
 
Manage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageManage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageCitrix
 
Adapting for the Internet of Things
Adapting for the Internet of ThingsAdapting for the Internet of Things
Adapting for the Internet of ThingsTripwire
 
Cloud migration risk
Cloud migration riskCloud migration risk
Cloud migration riskEdgevalue
 

What's hot (17)

Cloud security
Cloud security Cloud security
Cloud security
 
Gain the Cloud Advantage
Gain the Cloud AdvantageGain the Cloud Advantage
Gain the Cloud Advantage
 
Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile World
 
Cloud capability for startups
Cloud capability for startupsCloud capability for startups
Cloud capability for startups
 
PowerPoint Presentation
PowerPoint Presentation PowerPoint Presentation
PowerPoint Presentation
 
Vucci IBM Smart Cloud Presentation
Vucci IBM Smart Cloud PresentationVucci IBM Smart Cloud Presentation
Vucci IBM Smart Cloud Presentation
 
Privacy issues in the cloud final
Privacy issues in the cloud   finalPrivacy issues in the cloud   final
Privacy issues in the cloud final
 
Cloud Security Issues 1.04.10
Cloud Security  Issues 1.04.10Cloud Security  Issues 1.04.10
Cloud Security Issues 1.04.10
 
Chap 6 cloud security
Chap 6 cloud securityChap 6 cloud security
Chap 6 cloud security
 
You're Not Ready for Internal Cloud
You're Not Ready for Internal CloudYou're Not Ready for Internal Cloud
You're Not Ready for Internal Cloud
 
Client Security Strategies To Defeat Advanced Threats
Client Security Strategies To Defeat Advanced ThreatsClient Security Strategies To Defeat Advanced Threats
Client Security Strategies To Defeat Advanced Threats
 
MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!
 
Manage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageManage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usage
 
Private Cloud for Dummies
Private Cloud for DummiesPrivate Cloud for Dummies
Private Cloud for Dummies
 
Cloud Computing Security Issues
Cloud Computing Security Issues Cloud Computing Security Issues
Cloud Computing Security Issues
 
Adapting for the Internet of Things
Adapting for the Internet of ThingsAdapting for the Internet of Things
Adapting for the Internet of Things
 
Cloud migration risk
Cloud migration riskCloud migration risk
Cloud migration risk
 

Viewers also liked

PPT on mind reading computer
 PPT on mind reading computer PPT on mind reading computer
PPT on mind reading computerAnjali Agarwal
 
Night vision technology ppt
Night vision technology pptNight vision technology ppt
Night vision technology pptEkta Singh
 
Resume_Rahul_Gavade
Resume_Rahul_GavadeResume_Rahul_Gavade
Resume_Rahul_GavadeRahul Gavade
 
Real conditionals
Real conditionalsReal conditionals
Real conditionalsLes Davy
 
Aef4 week 2
Aef4 week 2Aef4 week 2
Aef4 week 2Les Davy
 
Lifestyle unit 4
Lifestyle unit 4Lifestyle unit 4
Lifestyle unit 4Les Davy
 
Counting Atoms Spring 2012
Counting Atoms   Spring 2012Counting Atoms   Spring 2012
Counting Atoms Spring 2012jmori1
 
Ostrava asset management
Ostrava asset managementOstrava asset management
Ostrava asset managementjohnarthur101
 
Что делать с деструкторами?
Что делать с деструкторами?Что делать с деструкторами?
Что делать с деструкторами?Dinar Ibragimov
 
Pekkarinen: Luusereita, rebeleitä vai kingejä? Yhteisönäkökulma nuorten syrjä...
Pekkarinen: Luusereita, rebeleitä vai kingejä? Yhteisönäkökulma nuorten syrjä...Pekkarinen: Luusereita, rebeleitä vai kingejä? Yhteisönäkökulma nuorten syrjä...
Pekkarinen: Luusereita, rebeleitä vai kingejä? Yhteisönäkökulma nuorten syrjä...Kouluterveyskysely
 
CSS3 Transitions
CSS3 TransitionsCSS3 Transitions
CSS3 Transitionshstryk
 
Despacho de Moro sobre Lula
Despacho de Moro sobre LulaDespacho de Moro sobre Lula
Despacho de Moro sobre LulaMiguel Rosario
 

Viewers also liked (20)

Artificial Intelligence Preparing for the Future of AI
Artificial Intelligence Preparing for the Future of AIArtificial Intelligence Preparing for the Future of AI
Artificial Intelligence Preparing for the Future of AI
 
Mind reading computer
Mind reading computerMind reading computer
Mind reading computer
 
PPT on mind reading computer
 PPT on mind reading computer PPT on mind reading computer
PPT on mind reading computer
 
Night vision technology ppt
Night vision technology pptNight vision technology ppt
Night vision technology ppt
 
Resume_Rahul_Gavade
Resume_Rahul_GavadeResume_Rahul_Gavade
Resume_Rahul_Gavade
 
02_07_WH_ChrisWalker
02_07_WH_ChrisWalker02_07_WH_ChrisWalker
02_07_WH_ChrisWalker
 
Real conditionals
Real conditionalsReal conditionals
Real conditionals
 
MAINSA
MAINSAMAINSA
MAINSA
 
Aef4 week 2
Aef4 week 2Aef4 week 2
Aef4 week 2
 
Docker First Steps
Docker First StepsDocker First Steps
Docker First Steps
 
Lifestyle unit 4
Lifestyle unit 4Lifestyle unit 4
Lifestyle unit 4
 
Counting Atoms Spring 2012
Counting Atoms   Spring 2012Counting Atoms   Spring 2012
Counting Atoms Spring 2012
 
Ostrava asset management
Ostrava asset managementOstrava asset management
Ostrava asset management
 
Modena
ModenaModena
Modena
 
Что делать с деструкторами?
Что делать с деструкторами?Что делать с деструкторами?
Что делать с деструкторами?
 
2º residencia granada
2º residencia granada2º residencia granada
2º residencia granada
 
Pekkarinen: Luusereita, rebeleitä vai kingejä? Yhteisönäkökulma nuorten syrjä...
Pekkarinen: Luusereita, rebeleitä vai kingejä? Yhteisönäkökulma nuorten syrjä...Pekkarinen: Luusereita, rebeleitä vai kingejä? Yhteisönäkökulma nuorten syrjä...
Pekkarinen: Luusereita, rebeleitä vai kingejä? Yhteisönäkökulma nuorten syrjä...
 
M robby f_mi2b_tugas 2
M robby f_mi2b_tugas 2M robby f_mi2b_tugas 2
M robby f_mi2b_tugas 2
 
CSS3 Transitions
CSS3 TransitionsCSS3 Transitions
CSS3 Transitions
 
Despacho de Moro sobre Lula
Despacho de Moro sobre LulaDespacho de Moro sobre Lula
Despacho de Moro sobre Lula
 

Similar to bishu pdf1

CLOUD COMPUTING -DETAILED APPROACH
CLOUD COMPUTING -DETAILED APPROACHCLOUD COMPUTING -DETAILED APPROACH
CLOUD COMPUTING -DETAILED APPROACHSHAIMA A R
 
The why of a cloud ppt
The why of a cloud pptThe why of a cloud ppt
The why of a cloud pptSana Nasar
 
Pros And Cons Of Cloud-Based Security Solutions.pptx
Pros And Cons Of Cloud-Based Security Solutions.pptxPros And Cons Of Cloud-Based Security Solutions.pptx
Pros And Cons Of Cloud-Based Security Solutions.pptxMetaorange
 
Secure Computing in Enterprise Cloud Environments
Secure Computing in Enterprise Cloud EnvironmentsSecure Computing in Enterprise Cloud Environments
Secure Computing in Enterprise Cloud EnvironmentsShaun Thomas
 
Whitepaper - Analyzing the Adoption of Cloud Computing For Banking & Finance.pdf
Whitepaper - Analyzing the Adoption of Cloud Computing For Banking & Finance.pdfWhitepaper - Analyzing the Adoption of Cloud Computing For Banking & Finance.pdf
Whitepaper - Analyzing the Adoption of Cloud Computing For Banking & Finance.pdfFINAP Worldwide
 
C11-1 CASE STUDY 11 CLOUD COMPUTING (IN)SECURITY .docx
C11-1 CASE STUDY 11   CLOUD COMPUTING (IN)SECURITY .docxC11-1 CASE STUDY 11   CLOUD COMPUTING (IN)SECURITY .docx
C11-1 CASE STUDY 11 CLOUD COMPUTING (IN)SECURITY .docxRAHUL126667
 
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTINGSECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTINGIRJET Journal
 
The Challenges Of Multi-cloud Management.pdf
The Challenges Of Multi-cloud Management.pdfThe Challenges Of Multi-cloud Management.pdf
The Challenges Of Multi-cloud Management.pdfaNumak & Company
 
How the Cloud is Revolutionizing the Retail Industry
How the Cloud is Revolutionizing the Retail IndustryHow the Cloud is Revolutionizing the Retail Industry
How the Cloud is Revolutionizing the Retail IndustryRaymark
 
Tech equity - Cloud presentation
Tech equity - Cloud presentationTech equity - Cloud presentation
Tech equity - Cloud presentationAdrian Hall
 
Cloud Myths and Realities: The Truth About Moving to the Cloud
Cloud Myths and Realities: The Truth About Moving to the CloudCloud Myths and Realities: The Truth About Moving to the Cloud
Cloud Myths and Realities: The Truth About Moving to the CloudEmbotics Corp.
 
Cloud computing ebook
Cloud computing ebookCloud computing ebook
Cloud computing ebookAnkit Gupta
 
C11-1 CASE STUDY 11 CLOUD COMPUTING (IN)SECURITY .docx
C11-1 CASE STUDY 11   CLOUD COMPUTING (IN)SECURITY .docxC11-1 CASE STUDY 11   CLOUD COMPUTING (IN)SECURITY .docx
C11-1 CASE STUDY 11 CLOUD COMPUTING (IN)SECURITY .docxjasoninnes20
 
C11-1 CASE STUDY 11 CLOUD COMPUTING (IN)SECURITY .docx
C11-1 CASE STUDY 11   CLOUD COMPUTING (IN)SECURITY .docxC11-1 CASE STUDY 11   CLOUD COMPUTING (IN)SECURITY .docx
C11-1 CASE STUDY 11 CLOUD COMPUTING (IN)SECURITY .docxclairbycraft
 
Introduction to Cloud computing
Introduction to Cloud computingIntroduction to Cloud computing
Introduction to Cloud computingKumayl Rajani
 

Similar to bishu pdf1 (20)

CLOUD COMPUTING -DETAILED APPROACH
CLOUD COMPUTING -DETAILED APPROACHCLOUD COMPUTING -DETAILED APPROACH
CLOUD COMPUTING -DETAILED APPROACH
 
The why of a cloud ppt
The why of a cloud pptThe why of a cloud ppt
The why of a cloud ppt
 
me
meme
me
 
Pros And Cons Of Cloud-Based Security Solutions.pptx
Pros And Cons Of Cloud-Based Security Solutions.pptxPros And Cons Of Cloud-Based Security Solutions.pptx
Pros And Cons Of Cloud-Based Security Solutions.pptx
 
Secure Computing in Enterprise Cloud Environments
Secure Computing in Enterprise Cloud EnvironmentsSecure Computing in Enterprise Cloud Environments
Secure Computing in Enterprise Cloud Environments
 
Myths About Cloud Computing
Myths About Cloud ComputingMyths About Cloud Computing
Myths About Cloud Computing
 
Whitepaper - Analyzing the Adoption of Cloud Computing For Banking & Finance.pdf
Whitepaper - Analyzing the Adoption of Cloud Computing For Banking & Finance.pdfWhitepaper - Analyzing the Adoption of Cloud Computing For Banking & Finance.pdf
Whitepaper - Analyzing the Adoption of Cloud Computing For Banking & Finance.pdf
 
C11-1 CASE STUDY 11 CLOUD COMPUTING (IN)SECURITY .docx
C11-1 CASE STUDY 11   CLOUD COMPUTING (IN)SECURITY .docxC11-1 CASE STUDY 11   CLOUD COMPUTING (IN)SECURITY .docx
C11-1 CASE STUDY 11 CLOUD COMPUTING (IN)SECURITY .docx
 
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTINGSECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
 
The Challenges Of Multi-cloud Management.pdf
The Challenges Of Multi-cloud Management.pdfThe Challenges Of Multi-cloud Management.pdf
The Challenges Of Multi-cloud Management.pdf
 
Features of cloud
Features of cloudFeatures of cloud
Features of cloud
 
Ad4502189193
Ad4502189193Ad4502189193
Ad4502189193
 
How the Cloud is Revolutionizing the Retail Industry
How the Cloud is Revolutionizing the Retail IndustryHow the Cloud is Revolutionizing the Retail Industry
How the Cloud is Revolutionizing the Retail Industry
 
Tech equity - Cloud presentation
Tech equity - Cloud presentationTech equity - Cloud presentation
Tech equity - Cloud presentation
 
Cloud Myths and Realities: The Truth About Moving to the Cloud
Cloud Myths and Realities: The Truth About Moving to the CloudCloud Myths and Realities: The Truth About Moving to the Cloud
Cloud Myths and Realities: The Truth About Moving to the Cloud
 
Cloud computing ebook
Cloud computing ebookCloud computing ebook
Cloud computing ebook
 
C11-1 CASE STUDY 11 CLOUD COMPUTING (IN)SECURITY .docx
C11-1 CASE STUDY 11   CLOUD COMPUTING (IN)SECURITY .docxC11-1 CASE STUDY 11   CLOUD COMPUTING (IN)SECURITY .docx
C11-1 CASE STUDY 11 CLOUD COMPUTING (IN)SECURITY .docx
 
C11-1 CASE STUDY 11 CLOUD COMPUTING (IN)SECURITY .docx
C11-1 CASE STUDY 11   CLOUD COMPUTING (IN)SECURITY .docxC11-1 CASE STUDY 11   CLOUD COMPUTING (IN)SECURITY .docx
C11-1 CASE STUDY 11 CLOUD COMPUTING (IN)SECURITY .docx
 
Epaper
EpaperEpaper
Epaper
 
Introduction to Cloud computing
Introduction to Cloud computingIntroduction to Cloud computing
Introduction to Cloud computing
 

bishu pdf1

  • 1. Secure and Practical Outsourcing of Linear Programming in Cloud Computing Presented by KONATHALA BISHWANTH 310506403026 Integrated dual degree (B.tech+M.tech) CS&SE Dept, Andhra university 1 Guided by Kunjam Nageswara Rao Asst.Professor,CS&SE Dept, Andhra university
  • 2. Agenda ▪ Introduction ▪ What is cloud computing? ▪ Why we need cloud computing ? ▪ What is security ? ▪ Why we need security in cloud computing ? ▪ Introduction to linear programming ▪ Why linear programming in cloud computing? 2 ▪ Existing System ▪ Disadvantages ▪ Proposed System ▪ Advantage ▪ Mechanism ▪ Hardware Requirements ▪ Software Requirements ▪ Implementation ▪ Sample screens
  • 3. Introduction ✦Cloud  compu*ng  enables  customers  with  limited  computa*onal  resources  to  outsource  their  large   computa*on   workloads   to   the   cloud,   and   economically   enjoy   the   massive   computa*onal   power,   bandwidth,  storage,  and  even  appropriate  so;ware  that  can  be  shared  in  a  pay-­‐per-­‐use  manner.     ✦Security   is   the   primary   obstacle   that   prevents   the   wide   adop*on   of   this   promising   compu*ng   model,  especially  for  customers  when  their  confiden*al  data  are  consumed  and  produced  during   the  computa*on.     ✦Trea*ng  the  cloud  as  an  intrinsically  insecure  compu*ng  plaBorm  from  the  viewpoint  of  the  cloud   customers,   ✦Focusing   on   engineering   compu*ng   and   op*misa*on   tasks,   the   secure   outsourcing   of   widely   applicable  linear  programming  (LP)  computa*ons.   ✦The  resul*ng  flexibility  allows  us  to  explore  appropriate  security/  efficiency  trade  off  via  higher-­‐level   abstrac*on  of  LP  computa*ons  than  the  general  circuit  representa*on.     ✦Formula*ng  private  data  owned  by  the  customer  for  LP  problem  as  a  set  of  matrices  and  vectors,  we   are  able  to  develop  a  set  of  efficient  privacy-­‐preserving  problem  transforma*on  techniques,  which   allow  customers  to  transform  original  LP  problem  into  some  arbitrary  one  while  protec*ng  sensi*ve   input/output  informa*on.   3
  • 4. What is Cloud Computing ? ✦Cloud computing provides a variety of computing resources , from servers and storage to enterprise applications such as email, security, backup/DR, voice, all delivered over the Internet. The Cloud delivers a hosting environment that is • Immediate, • Flexible, • Scalable, • Secure, Available while saving corporations money, time and resources. 4
  • 6. Why cloud computing ? ✦Cloud Computing is very much useful to a smaller companies to generate similar savings and capabilities on its own. ✦Many of the issues blamed on the cloud in large enterprises - security, integration, compliance and so on - often cause fewer problems in small companies that can't properly deal with them anyway. Main Reasons why cloud computing is even better for small businesses • Economies of scale. • Enterprise-class functionality. • Money Matters. • Infrastructure vs. Applications. • The Legacy Issue. • Security Problems. • Compliance. • Reliability. 6
  • 7. 7 1. Economies of scale: This one's obvious. The larger the company, the easier it can generate economies of scale on its own. Small companies, by definition, have more limited resources. Anything that can give them access to scale in purchasing and pricing is a big win! 2. Enterprise-class functionality. Big companies have the heft to create the custom functionality they need. Small companies simply don't have the resources to do that. In the cloud, though, they can leverage development, maintenance and upgrades across many, many small businesses... And, increasingly, consumers as well. 3. Money Matters. Startups and small companies are often under capitalized and pay-as-you-go cloud computing solutions typically don't require lots of upfront cash. Even if they don't end up saving much as the monthly fees add up over the long run, avoiding capital expenditures can be a make-or-break issue for cash-strapped small businesses. 4. Infrastructure vs. Applications. For the enterprise, cloud computing often means complex Infrastructure as a Service (IaaS) projects that have to be installed and integrated into a company's existing systems. For smaller companies, cloud computing often means complete cloud-based Software as a Service (SaaS) applications and application suites. No IT required. Reasons why cloud computing
  • 8. 5. The Legacy Issue. A common enterprise objection to cloud computing is how will it work with the company's legacy applications. Small businesses - and especially new businesses - typically have fewer and less complex legacy apps. Taken a step farther, that means startups and small businesses have less installed infrastructure they'd need to throw out to move into the cloud. As for new businesses, why would you actually buy anything you could "rent" instead? 6. Security Problems. I'm not saying security isn't important to small businesses (though many don't take it as seriously as they should). I'm saying that while security in the cloud may still be shaky by enterprise standards, it's almost always far better than what small businesses are able to provide for themselves. 7. Compliance. Because you don't necessarily know where your data is stored in the cloud, IaaS can cause confusion as to whether it complies with local, national and international regulations. That's a huge issue for multinational corporations, less so for most small businesses. 8. Reliability. The cloud is more reliable than most people think. When widely used cloud services and applications have outages, it makes national news. When an individual company - large or small - has a similar problem, they work hard to make sure you never even hear about it. The bottom line, though, is that even accounting for network connectivity hiccups, the cloud is probably a lot more reliable than what small businesses can afford to provide for themselves. 8
  • 9. 9 Evolution of cloud computing Isp-Internet service provider Asp-Application service provider SaaS-software as a service IaaS-infrastructure as a service PaaS-Platform as a Service
  • 10. What is security ? Security is the degree of resistance to, or protection from, harm. It applies to any vulnerable and valuable asset, such as a person, dwelling, community, nation, or organisation. ✦Cryptography ✦Redundancy ✦Disposal ✦Transfer security ✦Firewalling What exactly firewall does is. ✦ It isolates the virtual machines ✦ Brilliantly filters addresses and ports ✦ Prevents Denial-of-Service (DoS) ✦ Detects external security assessment measures 10
  • 11. Why security is need in cloud computing ? "The Notorious Nine," the top nine cloud computing threats has been identified by the CSA (Cloud Security Alliance).The report reflects the current consensus among industry experts surveyed by CSA, focusing on threats specifically related to the shared, on-demand nature of cloud computing. The top most threats to the cloud computing are : 11 ✦Data Breaches ✦Data Loss ✦Account or Service Traffic Hijacking ✦Insecure Interfaces and APIs ✦Denial of service ✦Malicious insiders ✦Abuse, ✦Insufficient due diligence ✦Pegged shared technology vulnerabilities
  • 12. Software and Hardware Specifications SOFTWARE SPECIFICATION: Operating System : Windows XP Software : JAVA (JDK 1.6.0) Protocol : TCP/IP IDE : NetBeans,Xampp 12 HARDWARE SPECIFICATION: Processor : Pentium-IV Speed : 1.1GHz RAM : 512MB Hard Disk : 40GB General : Keyboard, . Monitor, Mouse.
  • 13. 13 Outsourcing computation to the commercial public cloud is also depriving customers’ direct control over the systems that consume and produce their data during the computation, which inevitably brings in new security concerns and challenges towards this promising computing model. The outsourced computation workloads often contain sensitive information, such as ✦The business financial records, ✦Proprietary research data, ✦Personally identifiable health information etc. Existing System
  • 14. ★End to end data confidentiality - ✦unauthorised information leakage ✦sensitive data have to be encrypted before outsourcing How ever,Ordinary data encryption techniques in essence prevent cloud from performing any meaningful operation of the underlying plaintext data making the computation over encrypted data a very hard problem. There are huge financial incentives for the cloud to be “lazy” if the customers cannot tell ✦ The correctness of the output ✦Possible software bugs ✦Hardware failures, even outsider attacks might also affect the quality of the computed results. 14 Dis-advantages
  • 15. Proposed System Our Linear Programming outsourcing scheme which provides a complete outsourcing solution for not only the privacy protection of problem input/output, but also its efficient result checking. We start from a secure LP outsourcing design framework. 15 ✦Optimal solution using LP problems. ✦Better security on both uploading and downloading. ✦Integrating mathematical implementation in encryption Advantages:
  • 16. 16 Mechanism Design Framework • KeyGen(1k ) → {K }. • ProbEnc(K, Φ) → {ΦK }. • ProofGen(ΦK ) → {(y, Γ)} • Result Dec (K, Φ, y, Γ) → {x, ⊥} 16
  • 17. Mechanism Design Framework These four algorithms are summarised below : • KeyGen(1k ) → {K }. This is a randomized key generation algorithm which takes a system security parameter k, and returns a secret key K that is used later by customer to encrypt the target LP problem. • ProbEnc(K, Φ) → {ΦK }. This algorithm encrypts the input tuple Φ into ΦK with the secret key K. According to problem transformation, the encrypted input ΦK has the same form as Φ, and thus defines the problem to be solved in the cloud. • ProofGen(ΦK ) → {(y, Γ)}. This algorithm augments a generic solver that solves the problem ΦK to produce both the output y and a proof Γ. The output y later decrypts to x, and Γ is used later by the customer to verify the correctness of y or x. • Result Dec (K, Φ, y, Γ) → {x, ⊥}. This algorithm may choose to verify either y or x via the proof Γ. In any case, a correct output x is produced by decrypting y using the secret K. The algorithm outputs ⊥ when the validation fails, indicating the cloud server was not performing the computation faithfully. 17
  • 18. 18 Architecture of secure outsourcing linear programming problems in Cloud Computing . Finding File Encrypt the File Send to Cloud Server Decrypt the File Give Solution / Verification key Response to Customer
  • 19. IMPLEMENTTION ✦Finding File ✦Encrypt the File ✦Send to Cloud Server ✦Decrypt the File ✦Give Solution / Verification key ✦Response to Customer 19
  • 20. 20 Finding File & Encrypt the File ★ADMIN LOGIN ★FILE UPLOAD
  • 21. 21Send to Cloud Server & Decrypt the File ★CLIENT DETAILS ★FILE ENCRYPTION & DECRYPTION
  • 22. 22 Give Solution / Verification key Linear programming process where the optimal solution gets solved and verified
  • 25. Conclusion ✦The problem of securely outsourcing LP computations in cloud computing, and provide such a practical mechanism design which fulfils input/output privacy, cheating resilience, and efficiency. ✦By explicitly decomposing LP computation outsourcing into public LP solvers and private data, our mechanism design is able to explore appropriate security/efficiency trade offs via higher level LP computation than the general circuit representation. ✦This develops problem transformation techniques that enable customers to secretly transform the original LP into some arbitrary one while protecting sensitive input/ output information. ✦One can also investigate duality theorem and derive a set of necessary and sufficient condition for result verification. 25