SlideShare a Scribd company logo
1 of 47
Cloud Computing
Security From Single to
Multi-Clouds

By
Kiran Kumar
ABSTRACT
• Dealing with “single cloud” providers is
predicted to become less popular with
customers due to risks of service availability
failure and the possibility of malicious insiders
in the single cloud.
• A movement towards “multi-clouds”, or in
other words, “interclouds” or “cloud-ofclouds” has emerged recently.
What is Cloud Computing ?
• Cloud computing is a model for enabling
ubiquitous(present), convenient, on-demand
network access to a shared pool of configurable
computing resources (e.g., networks, servers,
storage, applications, and services) that can be
rapidly provisioned and released with minimal
management effort or service provider
interaction. This cloud model is composed of five
essential characteristics, three service models,
and four deployment models.
Cloud Computing
Deployment Models
Delivery Models
Difference
Finally…….
Moving to Clouds
• Data is moving to the cloud

• Main reason: costs (pay-per-use model)
Everything Connected to Cloud
What about Cloud Security?
EXISTING SYSTEM
• Cloud providers should address privacy and
security issues as a matter of high and urgent
priority. Dealing with “single cloud” providers
is becoming less popular with customers due
to potential problems such as service
availability failure and the possibility that
there are malicious insiders in the single
cloud.
If It Fails…?
DISADVANTAGES OF EXISTING
SYSTEM
• Cloud providers should address privacy and
security issues as a matter of high and urgent
priority.
• Service availability failure and the possibility
that there are malicious insiders in the single
cloud.
PROPOSED SYSTEM
• This Project focuses on the issues related to
the data security aspect of cloud computing.
• Moving towards “Cloud of clouds “ or multi
clouds technique which improves
Better read performance
Data corruptions'
Reduces Intrusions ….etc
Multi Clouds
ADVANTAGES OF PROPOSED SYSTEM
• Data Integrity
• Service Availability.
• The user runs custom applications using the
service provider’s resources
• Cloud service providers should ensure the
security of their customers’ data and should
be responsible if any security risk affects their
customers’ service infrastructure.
ARCHITECTURE
DepSKy System Model
The DepSky system model contains three
parts: readers, writers, and four cloud storage
providers, where readers and writers are the
client’s tasks.
Readers can fail arbitrarily (for example, they
can fail by crashing, they can fail from time to
time and then display any behavior) whereas,
writers only fail by crashing.
DepSKy System Model
DepSky Design Principles
1. No trust on individual cloud providers
Distributed trust is built by using multiple clouds
2. Use storage clouds as they are
No server-side code on the replication protocols
3. Data is updatable
Replication protocols for consistency
Data Model Implementation
DepSky Write
DepSky Read
DepSky Confidentiality
HARDWARE REQUIREMENTS
•
•
•
•
•
•
•

Processor
Speed
RAM
Hard Disk
Floppy Drive
Key Board
Monitor

-

Pentium –III
1.1 GHz
256 MB(min)
20 GB
1.44 MB
Standard Keyboard
SVGA
SOFTWARE REQUIREMENTS
•
•
•
•
•
•

Operating System
Application Server
Front End
Script
Server side Script
Database

: Windows XP
: Tomcat5.0/6.X
: HTML, Java, JSP
: JavaScript.
: Java Server Pages.
: MYSQL
Implémentations
• Data Integrity
• Data Intrusion
• Service Availability
Data Integrity
• One of the most important issues related to
cloud security risks is data integrity. The data
stored in the cloud may suffer from damage
during transition operations from or to the
cloud storage provider.
Data Intrusion
• Another security risk that may occur with a cloud provider,
such as the Amazon cloud service, is a hacked password or
data intrusion.
• If someone gains access to an Amazon account password,
they will be able to access all of the account’s instances and
resources.
• Thus the stolen password allows the hacker to erase all the
information inside any virtual machine instance for the
stolen user account, modify it, or even disable its services.
Furthermore, there is a possibility for the user’s
email(Amazon user name) to be hacked, and since Amazon
allows a lost password to be reset by email, the hacker may
still be able to log in to the account after receiving the new
reset password.
Service Availability
• Another major concern in cloud services is service
availability.
• Amazon mentions in its licensing agreement that it is
possible that the service might be unavailable from
time to time.
• The user’s web service may terminate for any reason at
any time if any user’s files break the cloud storage
policy. In addition, if any damage occurs to any Amazon
web service and the service fails, in this case there will
be no charge to the Amazon Company for this failure.
Companies seeking to protect services from such
failure need measures such as backups or use of
multiple providers.
code #1 getting User Details
try {
conn = (Connection) DbConnector.getConnection();
sql = "select * from user where userid= '" + userid + "' and
password= '" + password+"'";
pst = (PreparedStatement) conn.prepareStatement(sql);
ResultSet rs = pst.executeQuery();
if (rs.next()) {
available = true;
} else {
available = false;
}
} catch (Exception e) {
e.printStackTrace();
}
code #2 for Encryption
public static String encryptString(String str,String key) {
StringBuffer sb = new StringBuffer(str);
int lenStr = str.length();
int lenKey = key.length();
// For each character in our string, encrypt it...
for (int i = 0, j = 0; i < lenStr; i++, j++) {
if (j >= lenKey) {
j = 0; // Wrap 'round to beginning of key string.
}
// XOR the chars together. Must cast back to char to avoid compile
error.
sb.setCharAt(i, (char) (str.charAt(i) ^ key.charAt(j)));
}
return sb.toString();
}
code #3 for FileUpload
public synchronized boolean uploadFile(InputStream is) {
try {
BufferedInputStream bis = new BufferedInputStream(is);
OutputStream os = m_client.getOutputStream();
BufferedOutputStream bos = new BufferedOutputStream(os);
byte[] buffer = new byte[1024];
int readCount;
while ((readCount = bis.read(buffer)) > 0) {
bos.write(buffer, 0, readCount);
}
bos.close();
this.succMesg = "Uploaded!";
return true;
} catch (Exception ex) {
ex.printStackTrace();
return false;
}
}
code #4 for FileDownload
public synchronized boolean downloadFile(String localfilename) {
try {
InputStream is = m_client.getInputStream();
BufferedInputStream bis = new BufferedInputStream(is);
System.out.println(">>>>>>>>>>>"+localfilename);
OutputStream os = new FileOutputStream(localfilename);
BufferedOutputStream bos = new BufferedOutputStream(os);
byte[] buffer = new byte[1024];
int readCount;
while ((readCount = bis.read(buffer)) > 0) {
bos.write(buffer, 0, readCount);
}
bos.close();
is.close(); // close the FTP inputstream
this.succMesg = "Downloaded!";
return true;
} catch (Exception ex) {
ex.printStackTrace();
return false;
}
}
Class Diagram
File Upload

Registration
ID
OwnerID
Password
Gender
Mobile
EMail
Date

FileID
FileName
FileSize
FilePath
FileOwner
MetaData
KeyRequest
DownloadStatus
ModifyStatus
VerifyStatus

Loginidgenration()
CreateAccount()

metadatagenration()
fileupload()

File Download
FileID
FileName
FileSize
FilePath
FileOwner
MetaData
KeyRequest
VerifyStatus

comparemetadata()
fileupload()
Use Case Diagram

CLOUD
CREATION

CLOUD
MAINTENANCE

ADMIN
MEMBER
CREATION

FILE
UPLOAD

FILE
DOWNLOAD

USER

CLOUD
STATUS

REPORTS
Sequence Diagram
CLOUD
CREATION

CLOUD
MAINTAINANCE

Cloud
details

MEMBER
CREATION

FILE
UPLOAD

REPORTS

Credintials
File Details
File Report
Data Flow Diagram
LOGIN

ADMIN

USER

CLOUD CREATION

NEW?

CLOUD
MAINTENANCE

UPLOAD
DATA

MEMBER
CREATION

CLOUD
STATUS

REPORTS

REPORTS
Activity
Diagram
CONCLUSION
• It is clear that although the use of cloud
computing has rapidly increased, cloud
computing security is still considered the
major issue in the cloud computing
environment. Customers do not want to lose
their private information as a result of
malicious insiders in the cloud. In addition, the
loss of service availability has caused many
problems for a large number of customers
recently
CONCLUSION (cont…)
• Furthermore, data intrusion leads to many
problems for the users of cloud computing.
• We support the migration to multi-clouds due
to its ability to decrease security risks that
affect the cloud computing user.
FUTURE ENHANCEMENTS
• For future work, we aim to provide a
framework to supply a secure cloud database
that will guarantee to prevent security risks
facing the cloud computing community.
• This framework will apply multi-clouds and
the secret sharing algorithm to reduce the risk
of data intrusion and the loss of service
availability in the cloud and ensure data
integrity.
FUTURE ENHANCEMENTS (cont…)
• In relation to data intrusion and data integrity,
assume we want to distribute the data into
three different cloud providers, and we apply
the secret sharing algorithm on the stored
data in the cloud provider.
• An intruder needs to retrieve at least three
values to be able to find out the real value
that we want to hide from the intruder.
REFERENCES
•

[1] (NIST), http://www.nist.gov/itl/cloud/.

•

[2] I. Abraham, G. Chockler, I. Keidar and D. Malkhi, "Byzantine disk paxos: optimal
resilience with Byzantine shared memory", Distributed Computing, 18(5), 2006, pp. 387408.

•

[3] H. Abu-Libdeh, L. Princehouse and H. Weatherspoon, "RACS: a case for cloud storage
diversity", SoCC'10:Proc. 1st ACM symposium on Cloud computing, 2010, pp. 229-240.

•

[4] D. Agrawal, A. El Abbadi, F. Emekci and A. Metwally, "Database Management as a
Service: Challenges and Opportunities", ICDE'09:Proc.25thIntl. Conf. on Data Engineering,
2009, pp. 1709-1716.

•

[5] M.A. AlZain and E. Pardede, "Using Multi Shares for Ensuring Privacy in Database-as-aService", 44th Hawaii Intl. Conf. on System Sciences (HICSS), 2011, pp. 1-9.
Thankyou

By
Kiran Kumar

More Related Content

What's hot

Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud ComputingFalgun Rathod
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingJim Geovedi
 
Microsoft Azure Fundamentals
Microsoft Azure FundamentalsMicrosoft Azure Fundamentals
Microsoft Azure FundamentalsAdwait Ullal
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management IntroductionAidy Tificate
 
Microsoft Threat Protection
Microsoft Threat ProtectionMicrosoft Threat Protection
Microsoft Threat ProtectionThierry DEMAN
 
Azure Networking (1).pptx
Azure Networking (1).pptxAzure Networking (1).pptx
Azure Networking (1).pptxRazith2
 
Chap 6 cloud security
Chap 6 cloud securityChap 6 cloud security
Chap 6 cloud securityRaj Sarode
 
What is micro segmentation?
What is micro segmentation?What is micro segmentation?
What is micro segmentation?Mir Mustafa Ali
 
Microsoft Azure Networking Basics
Microsoft Azure Networking BasicsMicrosoft Azure Networking Basics
Microsoft Azure Networking BasicsSai Kishore Naidu
 
Cloud Security: A New Perspective
Cloud Security: A New PerspectiveCloud Security: A New Perspective
Cloud Security: A New PerspectiveWen-Pai Lu
 
Azure Key Vault - Getting Started
Azure Key Vault - Getting StartedAzure Key Vault - Getting Started
Azure Key Vault - Getting StartedTaswar Bhatti
 
Microsoft Azure Technical Overview
Microsoft Azure Technical OverviewMicrosoft Azure Technical Overview
Microsoft Azure Technical Overviewgjuljo
 
LOAD BALANCING ALGORITHMS
LOAD BALANCING ALGORITHMSLOAD BALANCING ALGORITHMS
LOAD BALANCING ALGORITHMStanmayshah95
 
Cloud security Presentation
Cloud security PresentationCloud security Presentation
Cloud security PresentationAjay p
 
Supriya reddy Azure Certification PPT
Supriya reddy Azure Certification PPT Supriya reddy Azure Certification PPT
Supriya reddy Azure Certification PPT SUPRIYAT9
 
AZ-900T00A-ENU-PowerPoint-02.pptx
AZ-900T00A-ENU-PowerPoint-02.pptxAZ-900T00A-ENU-PowerPoint-02.pptx
AZ-900T00A-ENU-PowerPoint-02.pptxTheGameSquad
 

What's hot (20)

Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud Computing
 
Microsoft Azure Fundamentals
Microsoft Azure FundamentalsMicrosoft Azure Fundamentals
Microsoft Azure Fundamentals
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management Introduction
 
Cost Optimisation
Cost OptimisationCost Optimisation
Cost Optimisation
 
Cloud Security Governance
Cloud Security GovernanceCloud Security Governance
Cloud Security Governance
 
Microsoft Threat Protection
Microsoft Threat ProtectionMicrosoft Threat Protection
Microsoft Threat Protection
 
Azure Networking (1).pptx
Azure Networking (1).pptxAzure Networking (1).pptx
Azure Networking (1).pptx
 
Chap 6 cloud security
Chap 6 cloud securityChap 6 cloud security
Chap 6 cloud security
 
What is micro segmentation?
What is micro segmentation?What is micro segmentation?
What is micro segmentation?
 
Application of Cloud Computing
Application of Cloud ComputingApplication of Cloud Computing
Application of Cloud Computing
 
Microsoft Azure Networking Basics
Microsoft Azure Networking BasicsMicrosoft Azure Networking Basics
Microsoft Azure Networking Basics
 
Cloud Security: A New Perspective
Cloud Security: A New PerspectiveCloud Security: A New Perspective
Cloud Security: A New Perspective
 
Azure Key Vault - Getting Started
Azure Key Vault - Getting StartedAzure Key Vault - Getting Started
Azure Key Vault - Getting Started
 
Microsoft Azure Technical Overview
Microsoft Azure Technical OverviewMicrosoft Azure Technical Overview
Microsoft Azure Technical Overview
 
LOAD BALANCING ALGORITHMS
LOAD BALANCING ALGORITHMSLOAD BALANCING ALGORITHMS
LOAD BALANCING ALGORITHMS
 
Cloud security Presentation
Cloud security PresentationCloud security Presentation
Cloud security Presentation
 
Supriya reddy Azure Certification PPT
Supriya reddy Azure Certification PPT Supriya reddy Azure Certification PPT
Supriya reddy Azure Certification PPT
 
AZ-900T00A-ENU-PowerPoint-02.pptx
AZ-900T00A-ENU-PowerPoint-02.pptxAZ-900T00A-ENU-PowerPoint-02.pptx
AZ-900T00A-ENU-PowerPoint-02.pptx
 

Viewers also liked

Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing SecurityNinh Nguyen
 
Cloud computing security from single to multi clouds
Cloud computing security from single to multi cloudsCloud computing security from single to multi clouds
Cloud computing security from single to multi cloudsCholavaram Sai
 
Representation theory
Representation theoryRepresentation theory
Representation theoryAndy Wallis
 
Cation exchange and it’s role on soil behaviour
Cation exchange and it’s role on soil behaviourCation exchange and it’s role on soil behaviour
Cation exchange and it’s role on soil behaviourShahram Maghami
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computingPrince Chandu
 
The Ultimate Guide to Creating Visually Appealing Content
The Ultimate Guide to Creating Visually Appealing ContentThe Ultimate Guide to Creating Visually Appealing Content
The Ultimate Guide to Creating Visually Appealing ContentNeil Patel
 
Dear NSA, let me take care of your slides.
Dear NSA, let me take care of your slides.Dear NSA, let me take care of your slides.
Dear NSA, let me take care of your slides.Emiland
 
What I Carry: 10 Tools for Success
What I Carry: 10 Tools for SuccessWhat I Carry: 10 Tools for Success
What I Carry: 10 Tools for SuccessJonathon Colman
 
What to Upload to SlideShare
What to Upload to SlideShareWhat to Upload to SlideShare
What to Upload to SlideShareSlideShare
 
Pythonによる機械学習入門 ~Deep Learningに挑戦~
Pythonによる機械学習入門 ~Deep Learningに挑戦~Pythonによる機械学習入門 ~Deep Learningに挑戦~
Pythonによる機械学習入門 ~Deep Learningに挑戦~Yasutomo Kawanishi
 
Carton packaging wikipedia
Carton packaging wikipediaCarton packaging wikipedia
Carton packaging wikipediaAlex Xiao
 
What Do Real Women Look Like? 100 Stock Photos of Real Women
What Do Real Women Look Like? 100 Stock Photos of Real WomenWhat Do Real Women Look Like? 100 Stock Photos of Real Women
What Do Real Women Look Like? 100 Stock Photos of Real WomenTwenty20 Inc.
 
Research and Development
Research and DevelopmentResearch and Development
Research and DevelopmentShameem Ali
 
Asean quiz championship_2012
Asean quiz championship_2012Asean quiz championship_2012
Asean quiz championship_2012Movin Miranda
 
Web Trends to Watch in 2014
Web Trends to Watch in 2014Web Trends to Watch in 2014
Web Trends to Watch in 2014David King
 
Getting Started With SlideShare
Getting Started With SlideShareGetting Started With SlideShare
Getting Started With SlideShareSlideShare
 
Masters of SlideShare
Masters of SlideShareMasters of SlideShare
Masters of SlideShareKapost
 

Viewers also liked (20)

Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Breast feeding
Breast feedingBreast feeding
Breast feeding
 
Cloud computing security from single to multi clouds
Cloud computing security from single to multi cloudsCloud computing security from single to multi clouds
Cloud computing security from single to multi clouds
 
Representation theory
Representation theoryRepresentation theory
Representation theory
 
Cation exchange and it’s role on soil behaviour
Cation exchange and it’s role on soil behaviourCation exchange and it’s role on soil behaviour
Cation exchange and it’s role on soil behaviour
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
 
Automobiles
AutomobilesAutomobiles
Automobiles
 
The Ultimate Guide to Creating Visually Appealing Content
The Ultimate Guide to Creating Visually Appealing ContentThe Ultimate Guide to Creating Visually Appealing Content
The Ultimate Guide to Creating Visually Appealing Content
 
Dear NSA, let me take care of your slides.
Dear NSA, let me take care of your slides.Dear NSA, let me take care of your slides.
Dear NSA, let me take care of your slides.
 
What I Carry: 10 Tools for Success
What I Carry: 10 Tools for SuccessWhat I Carry: 10 Tools for Success
What I Carry: 10 Tools for Success
 
What to Upload to SlideShare
What to Upload to SlideShareWhat to Upload to SlideShare
What to Upload to SlideShare
 
Pythonによる機械学習入門 ~Deep Learningに挑戦~
Pythonによる機械学習入門 ~Deep Learningに挑戦~Pythonによる機械学習入門 ~Deep Learningに挑戦~
Pythonによる機械学習入門 ~Deep Learningに挑戦~
 
Carton packaging wikipedia
Carton packaging wikipediaCarton packaging wikipedia
Carton packaging wikipedia
 
What Do Real Women Look Like? 100 Stock Photos of Real Women
What Do Real Women Look Like? 100 Stock Photos of Real WomenWhat Do Real Women Look Like? 100 Stock Photos of Real Women
What Do Real Women Look Like? 100 Stock Photos of Real Women
 
Research and Development
Research and DevelopmentResearch and Development
Research and Development
 
Asean quiz championship_2012
Asean quiz championship_2012Asean quiz championship_2012
Asean quiz championship_2012
 
Web Trends to Watch in 2014
Web Trends to Watch in 2014Web Trends to Watch in 2014
Web Trends to Watch in 2014
 
⼤企業で実現するイマドキの内製開発
⼤企業で実現するイマドキの内製開発⼤企業で実現するイマドキの内製開発
⼤企業で実現するイマドキの内製開発
 
Getting Started With SlideShare
Getting Started With SlideShareGetting Started With SlideShare
Getting Started With SlideShare
 
Masters of SlideShare
Masters of SlideShareMasters of SlideShare
Masters of SlideShare
 

Similar to Cloud computing security from single to multiple

Cloud computing-security-from-single-to-multiple-140211071429-phpapp01
Cloud computing-security-from-single-to-multiple-140211071429-phpapp01Cloud computing-security-from-single-to-multiple-140211071429-phpapp01
Cloud computing-security-from-single-to-multiple-140211071429-phpapp01Shivananda Rai
 
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET-  	  Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET-  	  Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET Journal
 
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET Journal
 
Aws training in bangalore
Aws training in bangalore Aws training in bangalore
Aws training in bangalore apponix123
 
Security Issues in Cloud Computing
Security Issues in Cloud ComputingSecurity Issues in Cloud Computing
Security Issues in Cloud ComputingJyotika Pandey
 
Secure Access to Outsourced Databases
Secure Access to Outsourced DatabasesSecure Access to Outsourced Databases
Secure Access to Outsourced DatabasesIOSR Journals
 
A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...
A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...
A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...Patel Dasharathbhai
 
An Auditing Protocol for Protected Data Storage in Cloud Computing
An Auditing Protocol for Protected Data Storage in Cloud ComputingAn Auditing Protocol for Protected Data Storage in Cloud Computing
An Auditing Protocol for Protected Data Storage in Cloud Computingijceronline
 
Towards Secure and Dependable Storage Services in Cloud Computing
Towards Secure and Dependable Storage Services in Cloud  Computing Towards Secure and Dependable Storage Services in Cloud  Computing
Towards Secure and Dependable Storage Services in Cloud Computing IJMER
 
Introduction to Cloud ppt which is fir engineering
Introduction to Cloud ppt which is fir engineeringIntroduction to Cloud ppt which is fir engineering
Introduction to Cloud ppt which is fir engineeringpremsingh371678
 
Enhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic AlgorithmEnhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic AlgorithmIOSR Journals
 

Similar to Cloud computing security from single to multiple (20)

Cloud computing-security-from-single-to-multiple-140211071429-phpapp01
Cloud computing-security-from-single-to-multiple-140211071429-phpapp01Cloud computing-security-from-single-to-multiple-140211071429-phpapp01
Cloud computing-security-from-single-to-multiple-140211071429-phpapp01
 
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET-  	  Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET-  	  Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
 
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
 
Aws training in bangalore
Aws training in bangalore Aws training in bangalore
Aws training in bangalore
 
Dn35636640
Dn35636640Dn35636640
Dn35636640
 
J0423066069
J0423066069J0423066069
J0423066069
 
Security Issues in Cloud Computing
Security Issues in Cloud ComputingSecurity Issues in Cloud Computing
Security Issues in Cloud Computing
 
Cloud ppt
Cloud pptCloud ppt
Cloud ppt
 
Cloud Computing Amazon
Cloud Computing AmazonCloud Computing Amazon
Cloud Computing Amazon
 
Understanding Cloud Computing
Understanding Cloud ComputingUnderstanding Cloud Computing
Understanding Cloud Computing
 
Secure Access to Outsourced Databases
Secure Access to Outsourced DatabasesSecure Access to Outsourced Databases
Secure Access to Outsourced Databases
 
50120130406006
5012013040600650120130406006
50120130406006
 
CLOUD COMPUTING AND STORAGE
CLOUD COMPUTING AND STORAGECLOUD COMPUTING AND STORAGE
CLOUD COMPUTING AND STORAGE
 
A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...
A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...
A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...
 
An Auditing Protocol for Protected Data Storage in Cloud Computing
An Auditing Protocol for Protected Data Storage in Cloud ComputingAn Auditing Protocol for Protected Data Storage in Cloud Computing
An Auditing Protocol for Protected Data Storage in Cloud Computing
 
Cc unit 1 updated
Cc unit 1 updatedCc unit 1 updated
Cc unit 1 updated
 
Towards Secure and Dependable Storage Services in Cloud Computing
Towards Secure and Dependable Storage Services in Cloud  Computing Towards Secure and Dependable Storage Services in Cloud  Computing
Towards Secure and Dependable Storage Services in Cloud Computing
 
Introduction to Cloud ppt which is fir engineering
Introduction to Cloud ppt which is fir engineeringIntroduction to Cloud ppt which is fir engineering
Introduction to Cloud ppt which is fir engineering
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Enhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic AlgorithmEnhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
 

Recently uploaded

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 

Recently uploaded (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

Cloud computing security from single to multiple

  • 1. Cloud Computing Security From Single to Multi-Clouds By Kiran Kumar
  • 2. ABSTRACT • Dealing with “single cloud” providers is predicted to become less popular with customers due to risks of service availability failure and the possibility of malicious insiders in the single cloud. • A movement towards “multi-clouds”, or in other words, “interclouds” or “cloud-ofclouds” has emerged recently.
  • 3. What is Cloud Computing ? • Cloud computing is a model for enabling ubiquitous(present), convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model is composed of five essential characteristics, three service models, and four deployment models.
  • 9. Moving to Clouds • Data is moving to the cloud • Main reason: costs (pay-per-use model)
  • 10.
  • 12. What about Cloud Security?
  • 13. EXISTING SYSTEM • Cloud providers should address privacy and security issues as a matter of high and urgent priority. Dealing with “single cloud” providers is becoming less popular with customers due to potential problems such as service availability failure and the possibility that there are malicious insiders in the single cloud.
  • 15. DISADVANTAGES OF EXISTING SYSTEM • Cloud providers should address privacy and security issues as a matter of high and urgent priority. • Service availability failure and the possibility that there are malicious insiders in the single cloud.
  • 16. PROPOSED SYSTEM • This Project focuses on the issues related to the data security aspect of cloud computing. • Moving towards “Cloud of clouds “ or multi clouds technique which improves Better read performance Data corruptions' Reduces Intrusions ….etc
  • 18. ADVANTAGES OF PROPOSED SYSTEM • Data Integrity • Service Availability. • The user runs custom applications using the service provider’s resources • Cloud service providers should ensure the security of their customers’ data and should be responsible if any security risk affects their customers’ service infrastructure.
  • 20. DepSKy System Model The DepSky system model contains three parts: readers, writers, and four cloud storage providers, where readers and writers are the client’s tasks. Readers can fail arbitrarily (for example, they can fail by crashing, they can fail from time to time and then display any behavior) whereas, writers only fail by crashing.
  • 22. DepSky Design Principles 1. No trust on individual cloud providers Distributed trust is built by using multiple clouds 2. Use storage clouds as they are No server-side code on the replication protocols 3. Data is updatable Replication protocols for consistency
  • 27. HARDWARE REQUIREMENTS • • • • • • • Processor Speed RAM Hard Disk Floppy Drive Key Board Monitor - Pentium –III 1.1 GHz 256 MB(min) 20 GB 1.44 MB Standard Keyboard SVGA
  • 28. SOFTWARE REQUIREMENTS • • • • • • Operating System Application Server Front End Script Server side Script Database : Windows XP : Tomcat5.0/6.X : HTML, Java, JSP : JavaScript. : Java Server Pages. : MYSQL
  • 29. Implémentations • Data Integrity • Data Intrusion • Service Availability
  • 30. Data Integrity • One of the most important issues related to cloud security risks is data integrity. The data stored in the cloud may suffer from damage during transition operations from or to the cloud storage provider.
  • 31. Data Intrusion • Another security risk that may occur with a cloud provider, such as the Amazon cloud service, is a hacked password or data intrusion. • If someone gains access to an Amazon account password, they will be able to access all of the account’s instances and resources. • Thus the stolen password allows the hacker to erase all the information inside any virtual machine instance for the stolen user account, modify it, or even disable its services. Furthermore, there is a possibility for the user’s email(Amazon user name) to be hacked, and since Amazon allows a lost password to be reset by email, the hacker may still be able to log in to the account after receiving the new reset password.
  • 32. Service Availability • Another major concern in cloud services is service availability. • Amazon mentions in its licensing agreement that it is possible that the service might be unavailable from time to time. • The user’s web service may terminate for any reason at any time if any user’s files break the cloud storage policy. In addition, if any damage occurs to any Amazon web service and the service fails, in this case there will be no charge to the Amazon Company for this failure. Companies seeking to protect services from such failure need measures such as backups or use of multiple providers.
  • 33. code #1 getting User Details try { conn = (Connection) DbConnector.getConnection(); sql = "select * from user where userid= '" + userid + "' and password= '" + password+"'"; pst = (PreparedStatement) conn.prepareStatement(sql); ResultSet rs = pst.executeQuery(); if (rs.next()) { available = true; } else { available = false; } } catch (Exception e) { e.printStackTrace(); }
  • 34. code #2 for Encryption public static String encryptString(String str,String key) { StringBuffer sb = new StringBuffer(str); int lenStr = str.length(); int lenKey = key.length(); // For each character in our string, encrypt it... for (int i = 0, j = 0; i < lenStr; i++, j++) { if (j >= lenKey) { j = 0; // Wrap 'round to beginning of key string. } // XOR the chars together. Must cast back to char to avoid compile error. sb.setCharAt(i, (char) (str.charAt(i) ^ key.charAt(j))); } return sb.toString(); }
  • 35. code #3 for FileUpload public synchronized boolean uploadFile(InputStream is) { try { BufferedInputStream bis = new BufferedInputStream(is); OutputStream os = m_client.getOutputStream(); BufferedOutputStream bos = new BufferedOutputStream(os); byte[] buffer = new byte[1024]; int readCount; while ((readCount = bis.read(buffer)) > 0) { bos.write(buffer, 0, readCount); } bos.close(); this.succMesg = "Uploaded!"; return true; } catch (Exception ex) { ex.printStackTrace(); return false; } }
  • 36. code #4 for FileDownload public synchronized boolean downloadFile(String localfilename) { try { InputStream is = m_client.getInputStream(); BufferedInputStream bis = new BufferedInputStream(is); System.out.println(">>>>>>>>>>>"+localfilename); OutputStream os = new FileOutputStream(localfilename); BufferedOutputStream bos = new BufferedOutputStream(os); byte[] buffer = new byte[1024]; int readCount; while ((readCount = bis.read(buffer)) > 0) { bos.write(buffer, 0, readCount); } bos.close(); is.close(); // close the FTP inputstream this.succMesg = "Downloaded!"; return true; } catch (Exception ex) { ex.printStackTrace(); return false; } }
  • 40. Data Flow Diagram LOGIN ADMIN USER CLOUD CREATION NEW? CLOUD MAINTENANCE UPLOAD DATA MEMBER CREATION CLOUD STATUS REPORTS REPORTS
  • 42. CONCLUSION • It is clear that although the use of cloud computing has rapidly increased, cloud computing security is still considered the major issue in the cloud computing environment. Customers do not want to lose their private information as a result of malicious insiders in the cloud. In addition, the loss of service availability has caused many problems for a large number of customers recently
  • 43. CONCLUSION (cont…) • Furthermore, data intrusion leads to many problems for the users of cloud computing. • We support the migration to multi-clouds due to its ability to decrease security risks that affect the cloud computing user.
  • 44. FUTURE ENHANCEMENTS • For future work, we aim to provide a framework to supply a secure cloud database that will guarantee to prevent security risks facing the cloud computing community. • This framework will apply multi-clouds and the secret sharing algorithm to reduce the risk of data intrusion and the loss of service availability in the cloud and ensure data integrity.
  • 45. FUTURE ENHANCEMENTS (cont…) • In relation to data intrusion and data integrity, assume we want to distribute the data into three different cloud providers, and we apply the secret sharing algorithm on the stored data in the cloud provider. • An intruder needs to retrieve at least three values to be able to find out the real value that we want to hide from the intruder.
  • 46. REFERENCES • [1] (NIST), http://www.nist.gov/itl/cloud/. • [2] I. Abraham, G. Chockler, I. Keidar and D. Malkhi, "Byzantine disk paxos: optimal resilience with Byzantine shared memory", Distributed Computing, 18(5), 2006, pp. 387408. • [3] H. Abu-Libdeh, L. Princehouse and H. Weatherspoon, "RACS: a case for cloud storage diversity", SoCC'10:Proc. 1st ACM symposium on Cloud computing, 2010, pp. 229-240. • [4] D. Agrawal, A. El Abbadi, F. Emekci and A. Metwally, "Database Management as a Service: Challenges and Opportunities", ICDE'09:Proc.25thIntl. Conf. on Data Engineering, 2009, pp. 1709-1716. • [5] M.A. AlZain and E. Pardede, "Using Multi Shares for Ensuring Privacy in Database-as-aService", 44th Hawaii Intl. Conf. on System Sciences (HICSS), 2011, pp. 1-9.

Editor's Notes

  1. Integrity(unity)
  2. Dependable and secure storage in cloud of clouds
  3. Dependable and secure storage in cloud of clouds
  4. Dependable and secure storage in cloud of clouds
  5. Dependable and secure storage in cloud of clouds
  6. Dependable and secure storage in cloud of clouds
  7. Dependable and secure storage in cloud of clouds
  8. Dependable and secure storage in cloud of clouds
  9. Composition(own a strong relation Ex. Duck to Pond )Aggression (has-a relation )