SlideShare a Scribd company logo
Providing User Security Guarantees in Public
Infrastructure Clouds
ABSTRACT
One such mechanism is platform integrity verification for figure hosts that
support the virtualized cloud infrastructure. Several giant cloud vendors have signaled
sensible implementations of this mechanism, primarily to safeguard the cloud infrastructure
from corporate executive threats and advanced persistent threats. we tend to see 2 major
improvement vectors regarding these implementations. First, details of such proprietary
solutions aren't disclosed and may therefore not be enforced and improved by alternative
cloud platforms. Second, to the most effective of our information, none of the solutions
provides cloud tenants a symbol concerning the integrity of figure hosts supporting their
slice of the cloud infrastructure. To address this, we tend to propose a group of protocols for
sure launch of virtual machines (VM) in IaaS, which give tenants with a symbol that the
requested VM instances were launched on a number with associate degree expected code
stack.
EXISTING SYSTEM PROPOSED SYSTEM
EXISTING CONCEPT:-
 While providers may offer security enhancements
such as protection of data at rest, end-users have
limited or no control over such mechanisms. There is
a clear need for usable and cost-effective cloud
platform security mechanisms suitable for
organizations that rely on cloud infrastructure. A role
may be assigned to multiple users who share the
same secret-key. That means there is no way to
distinguish those assigned users and the secret-key
derivation is not able to support functions, such as
user revocation and traitor tracing.
PROPOSED CONCEPT:-
• Presented experimental results demonstrate the
validity and efficiency of the proposed protocols. The
framework prototype was implemented on a test bed
operating a public electronic health record system,
showing that the proposed protocols can be integrated
into existing cloud environments.
EXISTING TECHNIQUE:-
• Role-Based Access Control (RBAC)
PROPOSED TECHNIQUE:-
• Partially-ordered Hierarchical Encryption (PHE)
TECHNIQUE DEFNITION:-
• Control (RBAC) in place to maintain the
privacy and confidentiality of data for
collaboration with teams. Cloud providers have
access to the data stored in the cloud, and can
control access to it by outside entities the
confidentiality of data and limiting privileged
user access to it.
TECHNIQUE DEFNITION:-
 PHE is more effective than traditional
cryptosystem for tracing-and-revoking because it
can organize all decryption keys into a
hierarchical key structure according to partially
ordering relation of role hierarchy in RBAC.
DRAWBACKS:-
• Time taken for data load
• Data is not secured
ADVANTAGES:-
• Low power resource only used
• Data is secured for storing in cloud
SOFTWARE REQUIREMENT
 Operating system :- Windows 7,8.1
 Front End :- Microsoft Visual Studio .NET 2013
 Coding Language :- C#
 Backend :- DB2
HARDWARE REQUIREMENT
 Processor : Pentium Dual Core 2.00GHZ
 Hard disk : 50 GB
 Mouse : Optical Mouse
 RAM : 2GB(minimum)
• Keyboard : Standard Keyboard (102 keys)
PROPOSED SYSTEM:
• Proposed a user secret-key must be unique and is
accompanied by the user identity. In addition, the
derivation of secret-key in such a construction should
be avoided.
• Advantage of our key structure is that it could be
seamlessly integrated into the existing RBAC
systems. Consequently, an RBAC system can directly
use the public role key to encrypt resources in terms
of users’ assigned roles, and then the users owned the
senior roles can use their privacy keys to decrypt the
encrypted resources.
FUTURE WORK:
• Future system we focus on protection the privacy of
outsourcing data and preventing player abuse in file
syncing and sharing services in the cloud. We highlight the
development of a group-oriented cryptosystem with
especially for tracing and revoking methods that can
ensure the security of player/editor.
• In our future work, we are planning to introduce a
comprehensive anomaly detection, using audit, pattern
matching, and risk assessment, for identifying the
suspected players
PROPOSED TECHNIQUE:
 Threats and mitigation
FUTURE TECHNIQUE:
 Threats and mitigation enhanced
ITDCC05.ppt

More Related Content

Similar to ITDCC05.ppt

Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
Yashwanth Reddy
 
Attribute based encryption with verifiable outsourced decryption
Attribute based encryption with verifiable outsourced decryptionAttribute based encryption with verifiable outsourced decryption
Attribute based encryption with verifiable outsourced decryption
JPINFOTECH JAYAPRAKASH
 
IRJET- Secure Data Protection in Cloud Computing
IRJET-  	  Secure Data Protection in Cloud ComputingIRJET-  	  Secure Data Protection in Cloud Computing
IRJET- Secure Data Protection in Cloud Computing
IRJET Journal
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storageKey aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage
Mugesh Mukkandan
 
Ensuring d.s
Ensuring d.sEnsuring d.s
Ensuring d.s
karthi j
 
C04932125
C04932125C04932125
C04932125
IOSR-JEN
 
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
IRJET Journal
 
Privacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storagePrivacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storage
Nagamalleswararao Tadikonda
 
Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01Nitish Bhardwaj
 
82ugszwcqn29itkwai2q 140424034504-phpapp01
82ugszwcqn29itkwai2q 140424034504-phpapp0182ugszwcqn29itkwai2q 140424034504-phpapp01
82ugszwcqn29itkwai2q 140424034504-phpapp01Nitish Bhardwaj
 
Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01Nitish Bhardwaj
 
Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01Nitish Bhardwaj
 
Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01Nitish Bhardwaj
 

Similar to ITDCC05.ppt (20)

Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
 
Attribute based encryption with verifiable outsourced decryption
Attribute based encryption with verifiable outsourced decryptionAttribute based encryption with verifiable outsourced decryption
Attribute based encryption with verifiable outsourced decryption
 
IRJET- Secure Data Protection in Cloud Computing
IRJET-  	  Secure Data Protection in Cloud ComputingIRJET-  	  Secure Data Protection in Cloud Computing
IRJET- Secure Data Protection in Cloud Computing
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storageKey aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage
 
Ensuring d.s
Ensuring d.sEnsuring d.s
Ensuring d.s
 
C04932125
C04932125C04932125
C04932125
 
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
 
Privacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storagePrivacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storage
 
Pp1t
Pp1tPp1t
Pp1t
 
Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01
 
Pp1t
Pp1tPp1t
Pp1t
 
Pp1t
Pp1tPp1t
Pp1t
 
Pp1t
Pp1tPp1t
Pp1t
 
82ugszwcqn29itkwai2q 140424034504-phpapp01
82ugszwcqn29itkwai2q 140424034504-phpapp0182ugszwcqn29itkwai2q 140424034504-phpapp01
82ugszwcqn29itkwai2q 140424034504-phpapp01
 
Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01
 
Pp1t
Pp1tPp1t
Pp1t
 
Pp1t
Pp1tPp1t
Pp1t
 
Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01
 
Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01
 
Pp1t
Pp1tPp1t
Pp1t
 

More from Maruthi Jâcs

ITDNS03.ppt
ITDNS03.pptITDNS03.ppt
ITDNS03.ppt
Maruthi Jâcs
 
ITIMP40.pptx
ITIMP40.pptxITIMP40.pptx
ITIMP40.pptx
Maruthi Jâcs
 
PPT.pptx
PPT.pptxPPT.pptx
PPT.pptx
Maruthi Jâcs
 
ITIMP35.pptx
ITIMP35.pptxITIMP35.pptx
ITIMP35.pptx
Maruthi Jâcs
 
PPT.pptx
PPT.pptxPPT.pptx
PPT.pptx
Maruthi Jâcs
 
ITIMP07.pptx
ITIMP07.pptxITIMP07.pptx
ITIMP07.pptx
Maruthi Jâcs
 
Doc.pptx
Doc.pptxDoc.pptx
Doc.pptx
Maruthi Jâcs
 
HUMAN FOLLOWING SUITCASE.pptx
HUMAN FOLLOWING SUITCASE.pptxHUMAN FOLLOWING SUITCASE.pptx
HUMAN FOLLOWING SUITCASE.pptx
Maruthi Jâcs
 
BRAILLE LANGUAGE TEXT CONVERSION FOR THE VISUALLY-IMPAIRED.pptx
BRAILLE LANGUAGE TEXT CONVERSION FOR THE VISUALLY-IMPAIRED.pptxBRAILLE LANGUAGE TEXT CONVERSION FOR THE VISUALLY-IMPAIRED.pptx
BRAILLE LANGUAGE TEXT CONVERSION FOR THE VISUALLY-IMPAIRED.pptx
Maruthi Jâcs
 
Grid connetecd hybrid EV charging.pptx
Grid connetecd hybrid EV charging.pptxGrid connetecd hybrid EV charging.pptx
Grid connetecd hybrid EV charging.pptx
Maruthi Jâcs
 
PPT.pptx
PPT.pptxPPT.pptx
PPT.pptx
Maruthi Jâcs
 

More from Maruthi Jâcs (14)

ITDNS03.ppt
ITDNS03.pptITDNS03.ppt
ITDNS03.ppt
 
ITDNS02.ppt
ITDNS02.pptITDNS02.ppt
ITDNS02.ppt
 
ITIMP40.pptx
ITIMP40.pptxITIMP40.pptx
ITIMP40.pptx
 
PPT.pptx
PPT.pptxPPT.pptx
PPT.pptx
 
ITIMP35.pptx
ITIMP35.pptxITIMP35.pptx
ITIMP35.pptx
 
PPT.pptx
PPT.pptxPPT.pptx
PPT.pptx
 
ITIMP07.pptx
ITIMP07.pptxITIMP07.pptx
ITIMP07.pptx
 
ITCM-10 ZR.pptx
ITCM-10 ZR.pptxITCM-10 ZR.pptx
ITCM-10 ZR.pptx
 
Doc.pptx
Doc.pptxDoc.pptx
Doc.pptx
 
HUMAN FOLLOWING SUITCASE.pptx
HUMAN FOLLOWING SUITCASE.pptxHUMAN FOLLOWING SUITCASE.pptx
HUMAN FOLLOWING SUITCASE.pptx
 
ITIOT01.pptx
ITIOT01.pptxITIOT01.pptx
ITIOT01.pptx
 
BRAILLE LANGUAGE TEXT CONVERSION FOR THE VISUALLY-IMPAIRED.pptx
BRAILLE LANGUAGE TEXT CONVERSION FOR THE VISUALLY-IMPAIRED.pptxBRAILLE LANGUAGE TEXT CONVERSION FOR THE VISUALLY-IMPAIRED.pptx
BRAILLE LANGUAGE TEXT CONVERSION FOR THE VISUALLY-IMPAIRED.pptx
 
Grid connetecd hybrid EV charging.pptx
Grid connetecd hybrid EV charging.pptxGrid connetecd hybrid EV charging.pptx
Grid connetecd hybrid EV charging.pptx
 
PPT.pptx
PPT.pptxPPT.pptx
PPT.pptx
 

Recently uploaded

Water treatment study ,a method to purify waste water
Water treatment study ,a method to purify waste waterWater treatment study ,a method to purify waste water
Water treatment study ,a method to purify waste water
tmdtufayel
 
Best hotel in keerthy hotel manage ment
Best hotel in keerthy hotel manage   mentBest hotel in keerthy hotel manage   ment
Best hotel in keerthy hotel manage ment
keerthyhotelmangemen
 
Food Spoilage Agents Enzymtic spoilage.pptx
Food Spoilage Agents Enzymtic spoilage.pptxFood Spoilage Agents Enzymtic spoilage.pptx
Food Spoilage Agents Enzymtic spoilage.pptx
ShafaatHussain20
 
MS Wine Day 2024 Arapitsas Advancements in Wine Metabolomics Research
MS Wine Day 2024 Arapitsas Advancements in Wine Metabolomics ResearchMS Wine Day 2024 Arapitsas Advancements in Wine Metabolomics Research
MS Wine Day 2024 Arapitsas Advancements in Wine Metabolomics Research
Panagiotis Arapitsas
 
Vietnam Mushroom Market Growth, Demand and Challenges of the Key Industry Pla...
Vietnam Mushroom Market Growth, Demand and Challenges of the Key Industry Pla...Vietnam Mushroom Market Growth, Demand and Challenges of the Key Industry Pla...
Vietnam Mushroom Market Growth, Demand and Challenges of the Key Industry Pla...
IMARC Group
 
Food and beverage service Restaurant Services notes V1.pptx
Food and beverage service Restaurant Services notes V1.pptxFood and beverage service Restaurant Services notes V1.pptx
Food and beverage service Restaurant Services notes V1.pptx
mangenatendaishe
 
Kitchen Audit at restaurant as per FSSAI act
Kitchen Audit at restaurant as per FSSAI actKitchen Audit at restaurant as per FSSAI act
Kitchen Audit at restaurant as per FSSAI act
MuthuMK13
 
Food Processing and Preservation Presentation.pptx
Food Processing and Preservation Presentation.pptxFood Processing and Preservation Presentation.pptx
Food Processing and Preservation Presentation.pptx
dengejnr13
 

Recently uploaded (8)

Water treatment study ,a method to purify waste water
Water treatment study ,a method to purify waste waterWater treatment study ,a method to purify waste water
Water treatment study ,a method to purify waste water
 
Best hotel in keerthy hotel manage ment
Best hotel in keerthy hotel manage   mentBest hotel in keerthy hotel manage   ment
Best hotel in keerthy hotel manage ment
 
Food Spoilage Agents Enzymtic spoilage.pptx
Food Spoilage Agents Enzymtic spoilage.pptxFood Spoilage Agents Enzymtic spoilage.pptx
Food Spoilage Agents Enzymtic spoilage.pptx
 
MS Wine Day 2024 Arapitsas Advancements in Wine Metabolomics Research
MS Wine Day 2024 Arapitsas Advancements in Wine Metabolomics ResearchMS Wine Day 2024 Arapitsas Advancements in Wine Metabolomics Research
MS Wine Day 2024 Arapitsas Advancements in Wine Metabolomics Research
 
Vietnam Mushroom Market Growth, Demand and Challenges of the Key Industry Pla...
Vietnam Mushroom Market Growth, Demand and Challenges of the Key Industry Pla...Vietnam Mushroom Market Growth, Demand and Challenges of the Key Industry Pla...
Vietnam Mushroom Market Growth, Demand and Challenges of the Key Industry Pla...
 
Food and beverage service Restaurant Services notes V1.pptx
Food and beverage service Restaurant Services notes V1.pptxFood and beverage service Restaurant Services notes V1.pptx
Food and beverage service Restaurant Services notes V1.pptx
 
Kitchen Audit at restaurant as per FSSAI act
Kitchen Audit at restaurant as per FSSAI actKitchen Audit at restaurant as per FSSAI act
Kitchen Audit at restaurant as per FSSAI act
 
Food Processing and Preservation Presentation.pptx
Food Processing and Preservation Presentation.pptxFood Processing and Preservation Presentation.pptx
Food Processing and Preservation Presentation.pptx
 

ITDCC05.ppt

  • 1. Providing User Security Guarantees in Public Infrastructure Clouds
  • 2. ABSTRACT One such mechanism is platform integrity verification for figure hosts that support the virtualized cloud infrastructure. Several giant cloud vendors have signaled sensible implementations of this mechanism, primarily to safeguard the cloud infrastructure from corporate executive threats and advanced persistent threats. we tend to see 2 major improvement vectors regarding these implementations. First, details of such proprietary solutions aren't disclosed and may therefore not be enforced and improved by alternative cloud platforms. Second, to the most effective of our information, none of the solutions provides cloud tenants a symbol concerning the integrity of figure hosts supporting their slice of the cloud infrastructure. To address this, we tend to propose a group of protocols for sure launch of virtual machines (VM) in IaaS, which give tenants with a symbol that the requested VM instances were launched on a number with associate degree expected code stack.
  • 3. EXISTING SYSTEM PROPOSED SYSTEM EXISTING CONCEPT:-  While providers may offer security enhancements such as protection of data at rest, end-users have limited or no control over such mechanisms. There is a clear need for usable and cost-effective cloud platform security mechanisms suitable for organizations that rely on cloud infrastructure. A role may be assigned to multiple users who share the same secret-key. That means there is no way to distinguish those assigned users and the secret-key derivation is not able to support functions, such as user revocation and traitor tracing. PROPOSED CONCEPT:- • Presented experimental results demonstrate the validity and efficiency of the proposed protocols. The framework prototype was implemented on a test bed operating a public electronic health record system, showing that the proposed protocols can be integrated into existing cloud environments. EXISTING TECHNIQUE:- • Role-Based Access Control (RBAC) PROPOSED TECHNIQUE:- • Partially-ordered Hierarchical Encryption (PHE)
  • 4. TECHNIQUE DEFNITION:- • Control (RBAC) in place to maintain the privacy and confidentiality of data for collaboration with teams. Cloud providers have access to the data stored in the cloud, and can control access to it by outside entities the confidentiality of data and limiting privileged user access to it. TECHNIQUE DEFNITION:-  PHE is more effective than traditional cryptosystem for tracing-and-revoking because it can organize all decryption keys into a hierarchical key structure according to partially ordering relation of role hierarchy in RBAC. DRAWBACKS:- • Time taken for data load • Data is not secured ADVANTAGES:- • Low power resource only used • Data is secured for storing in cloud
  • 5. SOFTWARE REQUIREMENT  Operating system :- Windows 7,8.1  Front End :- Microsoft Visual Studio .NET 2013  Coding Language :- C#  Backend :- DB2 HARDWARE REQUIREMENT  Processor : Pentium Dual Core 2.00GHZ  Hard disk : 50 GB  Mouse : Optical Mouse  RAM : 2GB(minimum) • Keyboard : Standard Keyboard (102 keys)
  • 6. PROPOSED SYSTEM: • Proposed a user secret-key must be unique and is accompanied by the user identity. In addition, the derivation of secret-key in such a construction should be avoided. • Advantage of our key structure is that it could be seamlessly integrated into the existing RBAC systems. Consequently, an RBAC system can directly use the public role key to encrypt resources in terms of users’ assigned roles, and then the users owned the senior roles can use their privacy keys to decrypt the encrypted resources. FUTURE WORK: • Future system we focus on protection the privacy of outsourcing data and preventing player abuse in file syncing and sharing services in the cloud. We highlight the development of a group-oriented cryptosystem with especially for tracing and revoking methods that can ensure the security of player/editor. • In our future work, we are planning to introduce a comprehensive anomaly detection, using audit, pattern matching, and risk assessment, for identifying the suspected players PROPOSED TECHNIQUE:  Threats and mitigation FUTURE TECHNIQUE:  Threats and mitigation enhanced