SlideShare a Scribd company logo
RRASE COLLEGE OF ENGINEERING
          TAMBARAM, CHENNAI -601301




                                                    Group Member                 Year
                                                    Abdul Rasheed Feroz Khan.J       03




Smart Cloud Security: From Single to Multi-Clouds                                1
   Introduction
   Literature survey
   Existing System
   problem definition
   Software Architecture
   S/w & H/w Requirement
   UML Diagram
   SDLC and project plan
   Conclusion
   References
                            2
What is Cloud Computing ?

 Why it is term as Smart Cloud ?

 Problem of service unavailability in single Cloud.




                                                      3
Smart Cloud Security: From Single to Multi-clouds
Name, Author and                     Methodologies       Advantages          Disadvantages
   Publication
A Practical                            Giving risk and    Security about       Points only the
Guide to cloud                           mitigation      the single cloud     security of single
computing Security                                         is maintained           cloud
By- Carl Almond                                               efficiently
August 2009
Security Challenges                       Outlining      Address several      As maintaining
for public cloud                        Challenges &         security        security in public
By- Kui Ren, Cong                         motivate          challenges       cloud ,urgency of
Wang                                       further         That current     data not comes into
Jan 2012                                investigation    research aren’t          picture
                                                            addressing
 Foundations and                          Encryption         Excellent      Properties related to
Properties of Shamir’s                        &          Framework From       Shamir’s Secrete
Secret Sharing                            Decryption        Proofs and            Sharing
Scheme                                                      Application
By- Dan Bogdanov
 May 2007
                                                                                      4
    Smart Cloud Security: From Single to Multi-clouds
    Smart Cloud ( most probably single cloud )
                         Makes low cost processing of data.
                         Gives delivery models as PaaS, SaaS, IaaS


Disadvantages:
1.    Service availability failure
2.    Possibility that there are malicious insiders in the single
      cloud.


                                                                5
       Smart Cloud Security: From Single to Multi-clouds
Load
                                    Forecast
CAPACITY
 CLOUD




           Service failure
            & Security
              attacks
                             TIME
   Problem Definition :
                    As data storage and processing concern the

    cloud plays vital role. But along with this advantage develop
    a system which focus the security for single as well as multi-
    cloud. So for this purpose we have to develop the system
    which gives many features




                                  Smart Cloud
                                                              7
          Security: From Single to Multi-clouds
     Service Availability

               Ability to run custom application using service providers
                resources

               Data security

               Data Integrity




                                                                8
Smart Cloud Security: From Single to Multi-clouds
    Make the assurance that data is in secure and stable form.




    Secondary objective :
      Make service availability even when the one cloud fails

      Handle Multiple request at a time.




                                                            9
    Cloud Computing Security: From Single to Multi-clouds
      Secret Sharing Algorithms


     Encryption:
            Step1: input- secrete key k, number of participant n.
            Step2: select random values a1,a2…,an.
            Step3: Generate polynomial string to share the secrete
            into parts.
            Step4: Secrete shared.


     Decryption:
            Step1: Generate polynomial string from secrete .
            Step2: Add the n polynomial.

                                                                    10
Cloud Computing Security: From Single to Multi-clouds
Cloud Computing Security: From Single to Multi-clouds   11
 Operating System :                                         Windows95/98/2000/XP
 Application Server :                                       Tomcat5.0/6.X
 Front End          :                                       HTML, Java,
                                                             JSP,AJAX
 Scripts            :                                       JavaScript.
 Server side Script :                                       Java Server Pages.
 Database Connectivity                                     : Mysql.


    Cloud Computing Security: From Single to Multi-clouds                    12
 Processor                                                 :   Pentium –III
 Speed                                                     :   1.1 GHz
 RAM                                                       :   256 MB(min)
 Hard Disk                                                 :   20 GB
 Floppy Drive                                              :   1.44 MB
 Monitor                                                   :   SVGA



                                                                         13
    Cloud Computing Security: From Single to Multi-clouds
Level 0 Data Flow
                                                                    14
Cloud Computing Security: From Single to Multi-clouds
Level 1 Data Flow


Cloud Computing Security: From Single to Multi-clouds   15
Cloud Computing Security: From Single to Multi-clouds   16
End User
            Cloud Client                                               Cloud Administrator




                                           1 : Register()


                                      2 : Request for Space


                                        3 : Space Allocation()


                                              4 : Login()


                                      5 : Session Credentials


                                   6 : Browse service offering


                           7 : List of service offering auth to user

                     8 : Get details & request service offering ID


                      9 : Service Offering, Supported Operation()


                                                                                  10 : Request for service()


                              11 : Forward Request of end user




                                                                                        12 : Processing()

                                                                                                        13 : Reply to request




                                                                                                                                           17
Cloud Computing Security: From Single to Multi-clouds
*                                                                       Contract For




                                               Contract                                               Provider Information
                                     +id: String                                                +ProviderId: String                         0...1
                                     +name: String                                              +name: String
                                     +description: String                                       +address: String
                                     +creator: String                     AgreesTo              +ContactInformation: String
                                     +acceptanceDate: Date
                                     +ServiceStartDate: Date
                            1        +ServiceEndDate: Date
                                     +billingInfo: String
                                     +RenewalInfo: String
                                     +ProviderId: StringIDRef                                        ConsumerInformation
                                     +ConsumerId: StringIDRef
                                     +OfferingId: StringIDRef                                   +ConsumerId: String
                                                                         AgreesTo
                                                                                                +name: String
                                     +GetInfo()                                                 +address: String                     Provider
                Requested            +ShowInfo()                                                +billingInfo: String
                Under                +UpdateInfo()                                              +ContactInformation: String
                                     +DeleteInfo()
                                                                                                +GetInfo()
                                                                                                +ShowInfo()
                                                                *
                                                                                                           0..1
                                                                                                                   Is Consumer
                                                                                                           *
                                                                                                          Relationship
                                                                                                +Id: String
                       *
                                                                                                +name: String
                                                                                                +Description: String
                                                                                                +ProviderId: StringIDRef                    *
                                                          Contains                              +ConsumerID: StringIDRef




                                                                                                                                                          1


                                                                                                                                                Service Offering
                   Service Request
                                                                             Service Catalog                                        +Id: StringId
             +Id: String                                                                                                            +name: String
                                                                                                                  Contains
             +name: String                 *     Contains            +Id: String                                                *   +description: String
             +description: String                                    +name: String
                                                                                                                                    +creator: String
             +Status: StringEnumeration                              +description: String
                                                                                                                                    +version: String
             +ConsumerId: StringIdRef                                +URL: anyURL
                                                                                                                                    +CreateDate: Date
             +contractId: StringIdRef                                +ProviderId: StringIdRef
                                                                                                                                    +providerId: StringIdRef




                                                                                                                                                          18
Cloud Computing Security: From Single to Multi-clouds
19
Cloud Computing Security: From Single to Multi-clouds
1.      Data Integrity.


2.      Service Availability.


3.      The user runs custom applications using the service provider’s
        resources.


4.      Cloud service providers should ensure the security of their
        customers’ data and should be responsible if any security risk
        affects their customers’ service infrastructure.
                                                                  20
     Cloud Computing Security: From Single to Multi-clouds
The objective of s/w project planning is to provide a framework that enables
to make reasonable estimate of resources, cost and schedule


    Sr.no    Activity                             July       August   September   October
             Problem statement
    1        formation
    2        Requirement gathering
    3        Requirement analysis
    4        Learning Java, J2EE
    5        Generation of Use cases
    6        Identification of entity
             relationship
    7        Identification of Classes
    8        Learning FTP & FileZilla
    9        Implementation of
             administrator use case
                                                                                     21
    Cloud Computing Security : From single to multi-clouds
    This project focuses on the issues related to the data security
     aspect of cloud computing. As data and information will be
     shared with a third party, cloud computing users want to
     avoid an untrusted cloud provider. Protection of user’s
     important data is the most significant part of this project.




                                                               22
Cloud Computing Security: From Single to Multi-clouds
    IBM Transaction on :

1.     Smart Cloud security : from single to multi-cloud

2.     Security Challenges for public cloud

3.     Foundations and Properties of Shamir’s Secret Sharing
       Scheme




                                                               23
Cloud Computing Security: From Single to Multi-clouds
Automation I-Parking System   24

More Related Content

What's hot

Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]Mahmuda Rahman
 
Ensuring data storage security in cloud computing
Ensuring data storage security in cloud computingEnsuring data storage security in cloud computing
Ensuring data storage security in cloud computingUday Wankar
 
security Issues of cloud computing
security Issues of cloud computingsecurity Issues of cloud computing
security Issues of cloud computingprachupanchal
 
Cloud computing security and privacy
Cloud computing security and privacyCloud computing security and privacy
Cloud computing security and privacyAdeel Javaid
 
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
SOME SECURITY CHALLENGES  IN CLOUD COMPUTINGSOME SECURITY CHALLENGES  IN CLOUD COMPUTING
SOME SECURITY CHALLENGES IN CLOUD COMPUTINGHoang Nguyen
 
Data storage security in cloud computing
Data storage security in cloud computingData storage security in cloud computing
Data storage security in cloud computingSonali Jain
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing SecurityDhaval Dave
 
Data Confidentiality in Cloud Computing
Data Confidentiality in Cloud ComputingData Confidentiality in Cloud Computing
Data Confidentiality in Cloud ComputingRitesh Dwivedi
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computingveena venugopal
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud ComputingFalgun Rathod
 
SecRBAC: Secure data in the Clouds
SecRBAC: Secure data in the CloudsSecRBAC: Secure data in the Clouds
SecRBAC: Secure data in the CloudsNexgen Technology
 
Lecture01: Introduction to Security and Privacy in Cloud Computing
Lecture01: Introduction to Security and Privacy in Cloud ComputingLecture01: Introduction to Security and Privacy in Cloud Computing
Lecture01: Introduction to Security and Privacy in Cloud Computingragibhasan
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environmentsijfcstjournal
 
Attaining data security in cloud computing
Attaining data security in cloud computingAttaining data security in cloud computing
Attaining data security in cloud computingGopinath Muthusamy
 
TWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEM
TWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEMTWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEM
TWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEMNexgen Technology
 
Cloud Computing Security Issues
Cloud Computing Security IssuesCloud Computing Security Issues
Cloud Computing Security IssuesStelios Krasadakis
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingJim Geovedi
 
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing and Security - ISACA Hyderabad Chapter PresentationCloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing and Security - ISACA Hyderabad Chapter PresentationVenkateswar Reddy Melachervu
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challengesDheeraj Negi
 

What's hot (20)

Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
 
Ensuring data storage security in cloud computing
Ensuring data storage security in cloud computingEnsuring data storage security in cloud computing
Ensuring data storage security in cloud computing
 
security Issues of cloud computing
security Issues of cloud computingsecurity Issues of cloud computing
security Issues of cloud computing
 
Cloud computing security and privacy
Cloud computing security and privacyCloud computing security and privacy
Cloud computing security and privacy
 
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
SOME SECURITY CHALLENGES  IN CLOUD COMPUTINGSOME SECURITY CHALLENGES  IN CLOUD COMPUTING
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
 
Data storage security in cloud computing
Data storage security in cloud computingData storage security in cloud computing
Data storage security in cloud computing
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computing
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Data Confidentiality in Cloud Computing
Data Confidentiality in Cloud ComputingData Confidentiality in Cloud Computing
Data Confidentiality in Cloud Computing
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computing
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 
SecRBAC: Secure data in the Clouds
SecRBAC: Secure data in the CloudsSecRBAC: Secure data in the Clouds
SecRBAC: Secure data in the Clouds
 
Lecture01: Introduction to Security and Privacy in Cloud Computing
Lecture01: Introduction to Security and Privacy in Cloud ComputingLecture01: Introduction to Security and Privacy in Cloud Computing
Lecture01: Introduction to Security and Privacy in Cloud Computing
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environments
 
Attaining data security in cloud computing
Attaining data security in cloud computingAttaining data security in cloud computing
Attaining data security in cloud computing
 
TWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEM
TWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEMTWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEM
TWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEM
 
Cloud Computing Security Issues
Cloud Computing Security IssuesCloud Computing Security Issues
Cloud Computing Security Issues
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud Computing
 
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing and Security - ISACA Hyderabad Chapter PresentationCloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 

Viewers also liked

Cloud Computing Security From Sngle to multi Clouds Full Documentaion
Cloud Computing Security From Sngle to multi Clouds Full DocumentaionCloud Computing Security From Sngle to multi Clouds Full Documentaion
Cloud Computing Security From Sngle to multi Clouds Full DocumentaionVamshi Chowdary
 
Online Voting System - Project
Online Voting System - ProjectOnline Voting System - Project
Online Voting System - ProjectSubhashis Das
 
Online voting system
Online voting systemOnline voting system
Online voting systemPooja Jain
 
Online voting system project
Online voting system projectOnline voting system project
Online voting system projectsnauriyal1994
 
Online Voting System Project File
Online Voting System Project FileOnline Voting System Project File
Online Voting System Project FileNitin Bhasin
 

Viewers also liked (8)

Cloud Storage and Security
Cloud Storage and SecurityCloud Storage and Security
Cloud Storage and Security
 
Online Voting System
Online Voting SystemOnline Voting System
Online Voting System
 
Cloud Computing Security From Sngle to multi Clouds Full Documentaion
Cloud Computing Security From Sngle to multi Clouds Full DocumentaionCloud Computing Security From Sngle to multi Clouds Full Documentaion
Cloud Computing Security From Sngle to multi Clouds Full Documentaion
 
Online Voting System - Project
Online Voting System - ProjectOnline Voting System - Project
Online Voting System - Project
 
Online voting system
Online voting systemOnline voting system
Online voting system
 
Online voting system project
Online voting system projectOnline voting system project
Online voting system project
 
Online Voting System Project File
Online Voting System Project FileOnline Voting System Project File
Online Voting System Project File
 
Hospital management system
Hospital management systemHospital management system
Hospital management system
 

Similar to Smart cloud - single to multi cloud

Cloud security Deep Dive 2011
Cloud security Deep Dive 2011Cloud security Deep Dive 2011
Cloud security Deep Dive 2011Kim Jensen
 
Cloud security deep dive infoworld jan 2011
Cloud security deep dive infoworld jan 2011Cloud security deep dive infoworld jan 2011
Cloud security deep dive infoworld jan 2011Kim Jensen
 
ClassCloud: switch your PC Classroom into Cloud Testbed
ClassCloud: switch your PC Classroom into Cloud TestbedClassCloud: switch your PC Classroom into Cloud Testbed
ClassCloud: switch your PC Classroom into Cloud TestbedJazz Yao-Tsung Wang
 
Presenter manual cloud computing (specially for summer interns)
Presenter manual   cloud computing (specially for summer interns)Presenter manual   cloud computing (specially for summer interns)
Presenter manual cloud computing (specially for summer interns)XPERT INFOTECH
 
Lss implementing cyber security in the cloud, and from the cloud-feb14
Lss implementing cyber security in the cloud, and from the cloud-feb14Lss implementing cyber security in the cloud, and from the cloud-feb14
Lss implementing cyber security in the cloud, and from the cloud-feb14L S Subramanian
 
Forecast 2012 Panel: Security POC NAB, Terremark, Trapezoid
Forecast 2012 Panel: Security POC NAB, Terremark, TrapezoidForecast 2012 Panel: Security POC NAB, Terremark, Trapezoid
Forecast 2012 Panel: Security POC NAB, Terremark, TrapezoidOpen Data Center Alliance
 
Cloud computing
Cloud computingCloud computing
Cloud computingsaralaanuj
 
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performanceDeepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performanceUNIT4 IT Solutions
 
Safe Net: Cloud Security Solutions
Safe Net: Cloud Security SolutionsSafe Net: Cloud Security Solutions
Safe Net: Cloud Security SolutionsASBIS SK
 
Clearing the air on Cloud Computing
Clearing the air on Cloud ComputingClearing the air on Cloud Computing
Clearing the air on Cloud ComputingKarthik Sankar
 
Enterprise Security in Cloud
Enterprise Security in CloudEnterprise Security in Cloud
Enterprise Security in CloudLenin Aboagye
 
Cloudcomputingoct2009 100301142544-phpapp02
Cloudcomputingoct2009 100301142544-phpapp02Cloudcomputingoct2009 100301142544-phpapp02
Cloudcomputingoct2009 100301142544-phpapp02abhisheknayak29
 
CloudPassage Overview
CloudPassage OverviewCloudPassage Overview
CloudPassage OverviewCloudPassage
 
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAmazon Web Services
 
Integrating network virtualization security in OpenStack Deployments.pdf
Integrating network virtualization security in OpenStack Deployments.pdfIntegrating network virtualization security in OpenStack Deployments.pdf
Integrating network virtualization security in OpenStack Deployments.pdfOpenStack Foundation
 

Similar to Smart cloud - single to multi cloud (20)

Cloud security Deep Dive 2011
Cloud security Deep Dive 2011Cloud security Deep Dive 2011
Cloud security Deep Dive 2011
 
Cloud security deep dive infoworld jan 2011
Cloud security deep dive infoworld jan 2011Cloud security deep dive infoworld jan 2011
Cloud security deep dive infoworld jan 2011
 
ClassCloud: switch your PC Classroom into Cloud Testbed
ClassCloud: switch your PC Classroom into Cloud TestbedClassCloud: switch your PC Classroom into Cloud Testbed
ClassCloud: switch your PC Classroom into Cloud Testbed
 
Presenter manual cloud computing (specially for summer interns)
Presenter manual   cloud computing (specially for summer interns)Presenter manual   cloud computing (specially for summer interns)
Presenter manual cloud computing (specially for summer interns)
 
Lss implementing cyber security in the cloud, and from the cloud-feb14
Lss implementing cyber security in the cloud, and from the cloud-feb14Lss implementing cyber security in the cloud, and from the cloud-feb14
Lss implementing cyber security in the cloud, and from the cloud-feb14
 
Forecast 2012 Panel: Security POC NAB, Terremark, Trapezoid
Forecast 2012 Panel: Security POC NAB, Terremark, TrapezoidForecast 2012 Panel: Security POC NAB, Terremark, Trapezoid
Forecast 2012 Panel: Security POC NAB, Terremark, Trapezoid
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performanceDeepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Security of,for & by cloud
Security of,for & by cloudSecurity of,for & by cloud
Security of,for & by cloud
 
Safe Net: Cloud Security Solutions
Safe Net: Cloud Security SolutionsSafe Net: Cloud Security Solutions
Safe Net: Cloud Security Solutions
 
489 493
489 493489 493
489 493
 
Clearing the air on Cloud Computing
Clearing the air on Cloud ComputingClearing the air on Cloud Computing
Clearing the air on Cloud Computing
 
Enterprise Security in Cloud
Enterprise Security in CloudEnterprise Security in Cloud
Enterprise Security in Cloud
 
Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012
 
Cloudcomputingoct2009 100301142544-phpapp02
Cloudcomputingoct2009 100301142544-phpapp02Cloudcomputingoct2009 100301142544-phpapp02
Cloudcomputingoct2009 100301142544-phpapp02
 
CloudPassage Overview
CloudPassage OverviewCloudPassage Overview
CloudPassage Overview
 
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Integrating network virtualization security in OpenStack Deployments.pdf
Integrating network virtualization security in OpenStack Deployments.pdfIntegrating network virtualization security in OpenStack Deployments.pdf
Integrating network virtualization security in OpenStack Deployments.pdf
 

Smart cloud - single to multi cloud

  • 1. RRASE COLLEGE OF ENGINEERING TAMBARAM, CHENNAI -601301 Group Member Year Abdul Rasheed Feroz Khan.J 03 Smart Cloud Security: From Single to Multi-Clouds 1
  • 2. Introduction  Literature survey  Existing System  problem definition  Software Architecture  S/w & H/w Requirement  UML Diagram  SDLC and project plan  Conclusion  References 2
  • 3. What is Cloud Computing ? Why it is term as Smart Cloud ? Problem of service unavailability in single Cloud. 3 Smart Cloud Security: From Single to Multi-clouds
  • 4. Name, Author and Methodologies Advantages Disadvantages Publication A Practical Giving risk and Security about Points only the Guide to cloud mitigation the single cloud security of single computing Security is maintained cloud By- Carl Almond efficiently August 2009 Security Challenges Outlining Address several As maintaining for public cloud Challenges & security security in public By- Kui Ren, Cong motivate challenges cloud ,urgency of Wang further That current data not comes into Jan 2012 investigation research aren’t picture addressing Foundations and Encryption Excellent Properties related to Properties of Shamir’s & Framework From Shamir’s Secrete Secret Sharing Decryption Proofs and Sharing Scheme Application By- Dan Bogdanov May 2007 4 Smart Cloud Security: From Single to Multi-clouds
  • 5. Smart Cloud ( most probably single cloud ) Makes low cost processing of data. Gives delivery models as PaaS, SaaS, IaaS Disadvantages: 1. Service availability failure 2. Possibility that there are malicious insiders in the single cloud. 5 Smart Cloud Security: From Single to Multi-clouds
  • 6. Load Forecast CAPACITY CLOUD Service failure & Security attacks TIME
  • 7. Problem Definition : As data storage and processing concern the cloud plays vital role. But along with this advantage develop a system which focus the security for single as well as multi- cloud. So for this purpose we have to develop the system which gives many features Smart Cloud 7 Security: From Single to Multi-clouds
  • 8. Service Availability  Ability to run custom application using service providers resources  Data security  Data Integrity 8 Smart Cloud Security: From Single to Multi-clouds
  • 9. Make the assurance that data is in secure and stable form. Secondary objective : Make service availability even when the one cloud fails Handle Multiple request at a time. 9 Cloud Computing Security: From Single to Multi-clouds
  • 10. Secret Sharing Algorithms Encryption: Step1: input- secrete key k, number of participant n. Step2: select random values a1,a2…,an. Step3: Generate polynomial string to share the secrete into parts. Step4: Secrete shared. Decryption: Step1: Generate polynomial string from secrete . Step2: Add the n polynomial. 10 Cloud Computing Security: From Single to Multi-clouds
  • 11. Cloud Computing Security: From Single to Multi-clouds 11
  • 12.  Operating System : Windows95/98/2000/XP  Application Server : Tomcat5.0/6.X  Front End : HTML, Java, JSP,AJAX  Scripts : JavaScript.  Server side Script : Java Server Pages.  Database Connectivity : Mysql. Cloud Computing Security: From Single to Multi-clouds 12
  • 13.  Processor : Pentium –III  Speed : 1.1 GHz  RAM : 256 MB(min)  Hard Disk : 20 GB  Floppy Drive : 1.44 MB  Monitor : SVGA 13 Cloud Computing Security: From Single to Multi-clouds
  • 14. Level 0 Data Flow 14 Cloud Computing Security: From Single to Multi-clouds
  • 15. Level 1 Data Flow Cloud Computing Security: From Single to Multi-clouds 15
  • 16. Cloud Computing Security: From Single to Multi-clouds 16
  • 17. End User Cloud Client Cloud Administrator 1 : Register() 2 : Request for Space 3 : Space Allocation() 4 : Login() 5 : Session Credentials 6 : Browse service offering 7 : List of service offering auth to user 8 : Get details & request service offering ID 9 : Service Offering, Supported Operation() 10 : Request for service() 11 : Forward Request of end user 12 : Processing() 13 : Reply to request 17 Cloud Computing Security: From Single to Multi-clouds
  • 18. * Contract For Contract Provider Information +id: String +ProviderId: String 0...1 +name: String +name: String +description: String +address: String +creator: String AgreesTo +ContactInformation: String +acceptanceDate: Date +ServiceStartDate: Date 1 +ServiceEndDate: Date +billingInfo: String +RenewalInfo: String +ProviderId: StringIDRef ConsumerInformation +ConsumerId: StringIDRef +OfferingId: StringIDRef +ConsumerId: String AgreesTo +name: String +GetInfo() +address: String Provider Requested +ShowInfo() +billingInfo: String Under +UpdateInfo() +ContactInformation: String +DeleteInfo() +GetInfo() +ShowInfo() * 0..1 Is Consumer * Relationship +Id: String * +name: String +Description: String +ProviderId: StringIDRef * Contains +ConsumerID: StringIDRef 1 Service Offering Service Request Service Catalog +Id: StringId +Id: String +name: String Contains +name: String * Contains +Id: String * +description: String +description: String +name: String +creator: String +Status: StringEnumeration +description: String +version: String +ConsumerId: StringIdRef +URL: anyURL +CreateDate: Date +contractId: StringIdRef +ProviderId: StringIdRef +providerId: StringIdRef 18 Cloud Computing Security: From Single to Multi-clouds
  • 19. 19 Cloud Computing Security: From Single to Multi-clouds
  • 20. 1. Data Integrity. 2. Service Availability. 3. The user runs custom applications using the service provider’s resources. 4. Cloud service providers should ensure the security of their customers’ data and should be responsible if any security risk affects their customers’ service infrastructure. 20 Cloud Computing Security: From Single to Multi-clouds
  • 21. The objective of s/w project planning is to provide a framework that enables to make reasonable estimate of resources, cost and schedule Sr.no Activity July August September October Problem statement 1 formation 2 Requirement gathering 3 Requirement analysis 4 Learning Java, J2EE 5 Generation of Use cases 6 Identification of entity relationship 7 Identification of Classes 8 Learning FTP & FileZilla 9 Implementation of administrator use case 21 Cloud Computing Security : From single to multi-clouds
  • 22. This project focuses on the issues related to the data security aspect of cloud computing. As data and information will be shared with a third party, cloud computing users want to avoid an untrusted cloud provider. Protection of user’s important data is the most significant part of this project. 22 Cloud Computing Security: From Single to Multi-clouds
  • 23. IBM Transaction on : 1. Smart Cloud security : from single to multi-cloud 2. Security Challenges for public cloud 3. Foundations and Properties of Shamir’s Secret Sharing Scheme 23 Cloud Computing Security: From Single to Multi-clouds

Editor's Notes

  1. Cloud computing – dealing in a global server rather than a local server – computation, storage, processing, etc., - avoiding of storage devices.Smart Cloud – advanced level of computing could also be said as an child tech of cloud computingService unavailability on single cloud – security issues.
  2. Giving risk & mitigation – security issues in public cloud
  3. The industry has defined three categories of services:IaaS – a set of infrastructure level capabilities such as an operating system, network connectivity, etc. that are delivered as pay for use services and can be used to host applications. PaaS – higher level sets of functionality that are delivered as consumable services for developers who are building applications. PaaS is about abstracting developers from the underlying infrastructure to enable applications to quickly be composed. SaaS – applications that are delivered using a service delivery model where organizations can simply consume and use the application. Typically an organization would pay for the use of the application or the application could be monetized through ad revenue.
  4. Service availability – information or data must be well refined to access at any time and any whereData Security – Data must be well secured from e-bombs, malicious attacks at multi – clouds