The document discusses developing a system for smart cloud security from single to multi-clouds. It outlines the introduction, literature survey, existing systems, problem definition, software architecture, requirements, UML diagrams, SDLC process, and conclusions. The problem is ensuring security and availability when data is stored and processed across single or multiple cloud systems. The goal is to develop a system that provides features like availability even during cloud failures, ability to handle multiple requests, and data security across single or multi-cloud environments.
Integrating network virtualization security in OpenStack Deployments.pdf
Smart cloud - single to multi cloud
1. RRASE COLLEGE OF ENGINEERING
TAMBARAM, CHENNAI -601301
Group Member Year
Abdul Rasheed Feroz Khan.J 03
Smart Cloud Security: From Single to Multi-Clouds 1
2. Introduction
Literature survey
Existing System
problem definition
Software Architecture
S/w & H/w Requirement
UML Diagram
SDLC and project plan
Conclusion
References
2
3. What is Cloud Computing ?
Why it is term as Smart Cloud ?
Problem of service unavailability in single Cloud.
3
Smart Cloud Security: From Single to Multi-clouds
4. Name, Author and Methodologies Advantages Disadvantages
Publication
A Practical Giving risk and Security about Points only the
Guide to cloud mitigation the single cloud security of single
computing Security is maintained cloud
By- Carl Almond efficiently
August 2009
Security Challenges Outlining Address several As maintaining
for public cloud Challenges & security security in public
By- Kui Ren, Cong motivate challenges cloud ,urgency of
Wang further That current data not comes into
Jan 2012 investigation research aren’t picture
addressing
Foundations and Encryption Excellent Properties related to
Properties of Shamir’s & Framework From Shamir’s Secrete
Secret Sharing Decryption Proofs and Sharing
Scheme Application
By- Dan Bogdanov
May 2007
4
Smart Cloud Security: From Single to Multi-clouds
5. Smart Cloud ( most probably single cloud )
Makes low cost processing of data.
Gives delivery models as PaaS, SaaS, IaaS
Disadvantages:
1. Service availability failure
2. Possibility that there are malicious insiders in the single
cloud.
5
Smart Cloud Security: From Single to Multi-clouds
6. Load
Forecast
CAPACITY
CLOUD
Service failure
& Security
attacks
TIME
7. Problem Definition :
As data storage and processing concern the
cloud plays vital role. But along with this advantage develop
a system which focus the security for single as well as multi-
cloud. So for this purpose we have to develop the system
which gives many features
Smart Cloud
7
Security: From Single to Multi-clouds
8. Service Availability
Ability to run custom application using service providers
resources
Data security
Data Integrity
8
Smart Cloud Security: From Single to Multi-clouds
9. Make the assurance that data is in secure and stable form.
Secondary objective :
Make service availability even when the one cloud fails
Handle Multiple request at a time.
9
Cloud Computing Security: From Single to Multi-clouds
10. Secret Sharing Algorithms
Encryption:
Step1: input- secrete key k, number of participant n.
Step2: select random values a1,a2…,an.
Step3: Generate polynomial string to share the secrete
into parts.
Step4: Secrete shared.
Decryption:
Step1: Generate polynomial string from secrete .
Step2: Add the n polynomial.
10
Cloud Computing Security: From Single to Multi-clouds
12. Operating System : Windows95/98/2000/XP
Application Server : Tomcat5.0/6.X
Front End : HTML, Java,
JSP,AJAX
Scripts : JavaScript.
Server side Script : Java Server Pages.
Database Connectivity : Mysql.
Cloud Computing Security: From Single to Multi-clouds 12
13. Processor : Pentium –III
Speed : 1.1 GHz
RAM : 256 MB(min)
Hard Disk : 20 GB
Floppy Drive : 1.44 MB
Monitor : SVGA
13
Cloud Computing Security: From Single to Multi-clouds
14. Level 0 Data Flow
14
Cloud Computing Security: From Single to Multi-clouds
15. Level 1 Data Flow
Cloud Computing Security: From Single to Multi-clouds 15
17. End User
Cloud Client Cloud Administrator
1 : Register()
2 : Request for Space
3 : Space Allocation()
4 : Login()
5 : Session Credentials
6 : Browse service offering
7 : List of service offering auth to user
8 : Get details & request service offering ID
9 : Service Offering, Supported Operation()
10 : Request for service()
11 : Forward Request of end user
12 : Processing()
13 : Reply to request
17
Cloud Computing Security: From Single to Multi-clouds
18. * Contract For
Contract Provider Information
+id: String +ProviderId: String 0...1
+name: String +name: String
+description: String +address: String
+creator: String AgreesTo +ContactInformation: String
+acceptanceDate: Date
+ServiceStartDate: Date
1 +ServiceEndDate: Date
+billingInfo: String
+RenewalInfo: String
+ProviderId: StringIDRef ConsumerInformation
+ConsumerId: StringIDRef
+OfferingId: StringIDRef +ConsumerId: String
AgreesTo
+name: String
+GetInfo() +address: String Provider
Requested +ShowInfo() +billingInfo: String
Under +UpdateInfo() +ContactInformation: String
+DeleteInfo()
+GetInfo()
+ShowInfo()
*
0..1
Is Consumer
*
Relationship
+Id: String
*
+name: String
+Description: String
+ProviderId: StringIDRef *
Contains +ConsumerID: StringIDRef
1
Service Offering
Service Request
Service Catalog +Id: StringId
+Id: String +name: String
Contains
+name: String * Contains +Id: String * +description: String
+description: String +name: String
+creator: String
+Status: StringEnumeration +description: String
+version: String
+ConsumerId: StringIdRef +URL: anyURL
+CreateDate: Date
+contractId: StringIdRef +ProviderId: StringIdRef
+providerId: StringIdRef
18
Cloud Computing Security: From Single to Multi-clouds
20. 1. Data Integrity.
2. Service Availability.
3. The user runs custom applications using the service provider’s
resources.
4. Cloud service providers should ensure the security of their
customers’ data and should be responsible if any security risk
affects their customers’ service infrastructure.
20
Cloud Computing Security: From Single to Multi-clouds
21. The objective of s/w project planning is to provide a framework that enables
to make reasonable estimate of resources, cost and schedule
Sr.no Activity July August September October
Problem statement
1 formation
2 Requirement gathering
3 Requirement analysis
4 Learning Java, J2EE
5 Generation of Use cases
6 Identification of entity
relationship
7 Identification of Classes
8 Learning FTP & FileZilla
9 Implementation of
administrator use case
21
Cloud Computing Security : From single to multi-clouds
22. This project focuses on the issues related to the data security
aspect of cloud computing. As data and information will be
shared with a third party, cloud computing users want to
avoid an untrusted cloud provider. Protection of user’s
important data is the most significant part of this project.
22
Cloud Computing Security: From Single to Multi-clouds
23. IBM Transaction on :
1. Smart Cloud security : from single to multi-cloud
2. Security Challenges for public cloud
3. Foundations and Properties of Shamir’s Secret Sharing
Scheme
23
Cloud Computing Security: From Single to Multi-clouds
Cloud computing – dealing in a global server rather than a local server – computation, storage, processing, etc., - avoiding of storage devices.Smart Cloud – advanced level of computing could also be said as an child tech of cloud computingService unavailability on single cloud – security issues.
Giving risk & mitigation – security issues in public cloud
The industry has defined three categories of services:IaaS – a set of infrastructure level capabilities such as an operating system, network connectivity, etc. that are delivered as pay for use services and can be used to host applications. PaaS – higher level sets of functionality that are delivered as consumable services for developers who are building applications. PaaS is about abstracting developers from the underlying infrastructure to enable applications to quickly be composed. SaaS – applications that are delivered using a service delivery model where organizations can simply consume and use the application. Typically an organization would pay for the use of the application or the application could be monetized through ad revenue.
Service availability – information or data must be well refined to access at any time and any whereData Security – Data must be well secured from e-bombs, malicious attacks at multi – clouds