cloud computing.pdf

NADAR SARASWATHI COLLEGE OF
ARTS AND SCIENCE
SUBMITTED BY:
SECURITY ARCHITECTURE DESIGN AND DATA
SECURITY IN CLOUD COMPUTING
S.SOWNDARYA
II M.SC CS
CLOUD COMPUTING SECURITY
ARCHITECTURE
Security in cloud computing is a major
concern. Proxy and brokerage services
should be employed to restrict a client
from accessing the shared data
directly. Data in the cloud should be
stored in encrypted form.
SECURITY PLANNING
A select resource needs to move to the cloud and analyze
its sensitivity to risk.
Consider cloud service models such as IaaS, PaaS,and
These models require the customer to be responsible for
Security at different service levels.
Consider the cloud type, such as public, private,
community, or
Understand the cloud service provider's system
regarding data storage and its transfer into and out of
the cloud.
The risk in cloud deployment mainly depends upon the
service models and cloud types.
UNDERSTANDING SECURITY OF
CLOUD
The Cloud Security Alliance (CSA) stack
model defines the boundaries between
each service model and shows how
different functional units relate. A
particular service model defines the
boundary between the service
provider's responsibilities and the
customer.
SECURITY BOUNDARIES
CSA STACK MODEL:
DATA SECURITY
access control
audit trail
certification
authority
Since all data is transferred using the
Internet, data security in the cloud is a
major concern. Here are the key
mechanisms to protect the data.
SEPARATE ACCESS TO DATA
A broker has full access to the storage but does not
have access to the client.
A proxy does not have access to storage but has
access to both the client and the broker.
Working on a Brocade cloud storage access system
When the client issues a request to access data:
The client data request goes to the external service
interface of the proxy.
Broker cloud storage is a way of separating storage in
the Access Cloud. In this approach, two services are
created:
1.
2.
3.
4.
5.
ENCODING
Encryption helps to protect the data from being
hacked. It protects the data being transferred and the
data stored in the cloud. Although encryption helps
protect data from unauthorized access, it does not
prevent data loss.
cloud computing.pdf
1 of 9

Recommended

Module 5-cloud computing-SECURITY IN THE CLOUD by
Module 5-cloud computing-SECURITY IN THE CLOUDModule 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDSweta Kumari Barnwal
522 views14 slides
UNIT -V.docx by
UNIT -V.docxUNIT -V.docx
UNIT -V.docxRevathiparamanathan
35 views49 slides
SaaS Security.pptx by
SaaS Security.pptxSaaS Security.pptx
SaaS Security.pptxchelsi33
76 views20 slides
saassecurity-230424030940-08314322.pdf by
saassecurity-230424030940-08314322.pdfsaassecurity-230424030940-08314322.pdf
saassecurity-230424030940-08314322.pdfSahilSingh316535
2 views20 slides
Security Issues in Cloud Computing by rahul abhishek by
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
404 views4 slides
Secure Data Sharing in Cloud (SDSC) by
Secure Data Sharing in Cloud (SDSC)Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)Jishnu Pradeep
3.1K views30 slides

More Related Content

Similar to cloud computing.pdf

Dn35636640 by
Dn35636640Dn35636640
Dn35636640IJERA Editor
482 views5 slides
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE by
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREIJNSA Journal
1.4K views14 slides
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE by
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREIJNSA Journal
15 views14 slides
Security policy enforcement in cloud infrastructure by
Security policy enforcement in cloud infrastructureSecurity policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructurecsandit
547 views9 slides
SECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURE by
SECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURESECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURE
SECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTUREcscpconf
114 views9 slides
Cloud Computing - FUNDAMENTALS by
Cloud Computing - FUNDAMENTALSCloud Computing - FUNDAMENTALS
Cloud Computing - FUNDAMENTALSKANNANKR12
56 views20 slides

Similar to cloud computing.pdf(20)

A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE by IJNSA Journal
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
IJNSA Journal1.4K views
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE by IJNSA Journal
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
IJNSA Journal15 views
Security policy enforcement in cloud infrastructure by csandit
Security policy enforcement in cloud infrastructureSecurity policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructure
csandit547 views
SECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURE by cscpconf
SECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURESECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURE
SECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURE
cscpconf114 views
Cloud Computing - FUNDAMENTALS by KANNANKR12
Cloud Computing - FUNDAMENTALSCloud Computing - FUNDAMENTALS
Cloud Computing - FUNDAMENTALS
KANNANKR1256 views
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR... by IRJET Journal
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
IRJET Journal3 views
A robust and verifiable threshold multi authority access control system in pu... by IJARIIT
A robust and verifiable threshold multi authority access control system in pu...A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...
IJARIIT33 views
Security Issues in Cloud Computing by rahul abhishek by Er. rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
Er. rahul abhishek315 views
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC... by IJCNCJournal
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
IJCNCJournal60 views
A Novel Computing Paradigm for Data Protection in Cloud Computing by IJMER
A Novel Computing Paradigm for Data Protection in Cloud ComputingA Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud Computing
IJMER371 views
Cloud computing security through symmetric cipher model by ijcsit
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher model
ijcsit315 views
Cloud Computing Using Encryption and Intrusion Detection by ijsrd.com
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detection
ijsrd.com241 views
E041212224 by IOSR-JEN
E041212224E041212224
E041212224
IOSR-JEN141 views
Paper id 21201458 by IJRAT
Paper id 21201458Paper id 21201458
Paper id 21201458
IJRAT242 views
A study on security issues in cloud based e learning by Manimaran A
A study on security issues in cloud based e learningA study on security issues in cloud based e learning
A study on security issues in cloud based e learning
Manimaran A565 views

More from soundaryasellapandia

apache hadOop.pdf by
apache hadOop.pdfapache hadOop.pdf
apache hadOop.pdfsoundaryasellapandia
8 views10 slides
Microfinance and entrepreneur skill and competition by
Microfinance and entrepreneur skill and competitionMicrofinance and entrepreneur skill and competition
Microfinance and entrepreneur skill and competitionsoundaryasellapandia
12 views11 slides
Color quantization by
Color quantizationColor quantization
Color quantizationsoundaryasellapandia
13 views10 slides
cloud security challenges and risk.pptx by
cloud security challenges and risk.pptxcloud security challenges and risk.pptx
cloud security challenges and risk.pptxsoundaryasellapandia
9 views9 slides
artificial intelligence.pptx by
artificial intelligence.pptxartificial intelligence.pptx
artificial intelligence.pptxsoundaryasellapandia
7 views8 slides
ARTIFICIAL INTELIGENCE.pdf by
ARTIFICIAL INTELIGENCE.pdfARTIFICIAL INTELIGENCE.pdf
ARTIFICIAL INTELIGENCE.pdfsoundaryasellapandia
10 views9 slides

Recently uploaded

Webinar : Desperately Seeking Transformation - Part 2: Insights from leading... by
Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading...The Digital Insurer
24 views52 slides
Network Source of Truth and Infrastructure as Code revisited by
Network Source of Truth and Infrastructure as Code revisitedNetwork Source of Truth and Infrastructure as Code revisited
Network Source of Truth and Infrastructure as Code revisitedNetwork Automation Forum
32 views45 slides
The Forbidden VPN Secrets.pdf by
The Forbidden VPN Secrets.pdfThe Forbidden VPN Secrets.pdf
The Forbidden VPN Secrets.pdfMariam Shaba
20 views72 slides
Business Analyst Series 2023 - Week 3 Session 5 by
Business Analyst Series 2023 -  Week 3 Session 5Business Analyst Series 2023 -  Week 3 Session 5
Business Analyst Series 2023 - Week 3 Session 5DianaGray10
345 views20 slides
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive by
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveNetwork Automation Forum
43 views35 slides
"Running students' code in isolation. The hard way", Yurii Holiuk by
"Running students' code in isolation. The hard way", Yurii Holiuk "Running students' code in isolation. The hard way", Yurii Holiuk
"Running students' code in isolation. The hard way", Yurii Holiuk Fwdays
24 views34 slides

Recently uploaded(20)

Webinar : Desperately Seeking Transformation - Part 2: Insights from leading... by The Digital Insurer
Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading...
The Forbidden VPN Secrets.pdf by Mariam Shaba
The Forbidden VPN Secrets.pdfThe Forbidden VPN Secrets.pdf
The Forbidden VPN Secrets.pdf
Mariam Shaba20 views
Business Analyst Series 2023 - Week 3 Session 5 by DianaGray10
Business Analyst Series 2023 -  Week 3 Session 5Business Analyst Series 2023 -  Week 3 Session 5
Business Analyst Series 2023 - Week 3 Session 5
DianaGray10345 views
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive by Network Automation Forum
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive
"Running students' code in isolation. The hard way", Yurii Holiuk by Fwdays
"Running students' code in isolation. The hard way", Yurii Holiuk "Running students' code in isolation. The hard way", Yurii Holiuk
"Running students' code in isolation. The hard way", Yurii Holiuk
Fwdays24 views
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ... by Jasper Oosterveld
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
Five Things You SHOULD Know About Postman by Postman
Five Things You SHOULD Know About PostmanFive Things You SHOULD Know About Postman
Five Things You SHOULD Know About Postman
Postman38 views
HTTP headers that make your website go faster - devs.gent November 2023 by Thijs Feryn
HTTP headers that make your website go faster - devs.gent November 2023HTTP headers that make your website go faster - devs.gent November 2023
HTTP headers that make your website go faster - devs.gent November 2023
Thijs Feryn26 views
2024: A Travel Odyssey The Role of Generative AI in the Tourism Universe by Simone Puorto
2024: A Travel Odyssey The Role of Generative AI in the Tourism Universe2024: A Travel Odyssey The Role of Generative AI in the Tourism Universe
2024: A Travel Odyssey The Role of Generative AI in the Tourism Universe
Simone Puorto13 views
Igniting Next Level Productivity with AI-Infused Data Integration Workflows by Safe Software
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Safe Software317 views
"Surviving highload with Node.js", Andrii Shumada by Fwdays
"Surviving highload with Node.js", Andrii Shumada "Surviving highload with Node.js", Andrii Shumada
"Surviving highload with Node.js", Andrii Shumada
Fwdays33 views
Data Integrity for Banking and Financial Services by Precisely
Data Integrity for Banking and Financial ServicesData Integrity for Banking and Financial Services
Data Integrity for Banking and Financial Services
Precisely29 views
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院 by IttrainingIttraining
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N... by James Anderson
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
James Anderson126 views

cloud computing.pdf

  • 1. NADAR SARASWATHI COLLEGE OF ARTS AND SCIENCE SUBMITTED BY: SECURITY ARCHITECTURE DESIGN AND DATA SECURITY IN CLOUD COMPUTING S.SOWNDARYA II M.SC CS
  • 2. CLOUD COMPUTING SECURITY ARCHITECTURE Security in cloud computing is a major concern. Proxy and brokerage services should be employed to restrict a client from accessing the shared data directly. Data in the cloud should be stored in encrypted form.
  • 3. SECURITY PLANNING A select resource needs to move to the cloud and analyze its sensitivity to risk. Consider cloud service models such as IaaS, PaaS,and These models require the customer to be responsible for Security at different service levels. Consider the cloud type, such as public, private, community, or Understand the cloud service provider's system regarding data storage and its transfer into and out of the cloud. The risk in cloud deployment mainly depends upon the service models and cloud types.
  • 4. UNDERSTANDING SECURITY OF CLOUD The Cloud Security Alliance (CSA) stack model defines the boundaries between each service model and shows how different functional units relate. A particular service model defines the boundary between the service provider's responsibilities and the customer. SECURITY BOUNDARIES
  • 6. DATA SECURITY access control audit trail certification authority Since all data is transferred using the Internet, data security in the cloud is a major concern. Here are the key mechanisms to protect the data.
  • 7. SEPARATE ACCESS TO DATA A broker has full access to the storage but does not have access to the client. A proxy does not have access to storage but has access to both the client and the broker. Working on a Brocade cloud storage access system When the client issues a request to access data: The client data request goes to the external service interface of the proxy. Broker cloud storage is a way of separating storage in the Access Cloud. In this approach, two services are created: 1. 2. 3. 4. 5.
  • 8. ENCODING Encryption helps to protect the data from being hacked. It protects the data being transferred and the data stored in the cloud. Although encryption helps protect data from unauthorized access, it does not prevent data loss.