System to Secure Cloud Data

download System to Secure Cloud Data

of 34

Transcript of System to Secure Cloud Data

  • 7/30/2019 System to Secure Cloud Data

    1/34

    SYSTEM TO SECURE CLOUD

    DATA

    VENKATA AKULA

    CHANDRAKANTH CHINTAGARI

  • 7/30/2019 System to Secure Cloud Data

    2/34

    OUTLINE

    Introduction to cloud computing

    Architecture of cloud computing system

    Security modules for cloud computing

    Problems associated

    System analysis

    System design

    Advantages

    Conclusion

    References

  • 7/30/2019 System to Secure Cloud Data

    3/34

    INTRODUCTION

    Cloud computing is known as Internet based computing, with

    shared resources, software and information are provided to

    computers and other devices based on requirement.

    Cloud computing is a simple concept , software and services are

    delivered over the web and through a browser, with no server or

    client software to install.

    Cloud Computing is a technology used to access services offered

    on the Internet cloud.

  • 7/30/2019 System to Secure Cloud Data

    4/34

    HOW IT WORKS

  • 7/30/2019 System to Secure Cloud Data

    5/34

    ARCHITECTURE OF CLOUD COMPUTING

    SYSTEM

  • 7/30/2019 System to Secure Cloud Data

    6/34

    SECURITY MODULES FOR CLOUD

    COMPUTING

    Various security aspects and modules are integrated in to thecloud computing which provides security to the cloud. This

    system contains the following modules to provide security for our

    cloud computing system.

    i)Authentication

    ii) Access control

    iii) Data security

    iv) Mechanism to trace user behavior in the cloud

  • 7/30/2019 System to Secure Cloud Data

    7/34

    AUTHENTICATION:

    - The Service provider(administrator) of Cloud computingSystem provide security for the cloud resources and cloud users.

    - The service provider can generate the master id to the users tobecome cloud users and provide role. So that cloud users have an

    authentication to utilize cloud resources.

    - He can trace out the users information, cloud history along

    with session information.

    - Also he can interact with the cloud users through mail.

  • 7/30/2019 System to Secure Cloud Data

    8/34

    ACCESS CONTROL:

    - Cloud users can use the cloud resources based on theiraccess control. Cloud users may have accessibility like

    read and write.

    - The cloud user who has read accessibility can only use the

    resources which are available in the cloud and the cloud userwho has write accessibility can have permissions to

    upload files into cloud and also he can utilize the already

    available resources.

    - These cloud users can interact with cloud service provider

    to get change of their accessibility.

  • 7/30/2019 System to Secure Cloud Data

    9/34

    DATA SECURITY:

    The Service provider can provide security to the data

    (resources of cloud and cloud users).

    Encryption key and session keys are used for encryption

    of data to sustain the security of data for a session.

    Cloud users can provide security through their private

    master id.

  • 7/30/2019 System to Secure Cloud Data

    10/34

    TRACING USER BEHAVIOR:

    Service provider can view users profile and he can trace

    out the cloud users behavior through Cloud history.

    Service provider can also view the session information.

  • 7/30/2019 System to Secure Cloud Data

    11/34

    PROBLEM ASSOCIATED

    EXISTING SYSTEM:

    In the existing system, the authentication and

    confidentiality was not provided in a better way.

    PROPOSED SYSTEM:

    Here a method to provide the security for cloud

    computing system by integrating the several security

    aspects into cloud computing system. We propose a model system in which cloud computing

    system is secured in several stages.

  • 7/30/2019 System to Secure Cloud Data

    12/34

    ANALYSIS OF SYSTEM

    To provide flexibility to the users, the interfaces have

    been developed that are accessible through a browser. The

    GUIS at the top level have been categorized as

    1)Administrative user interface

    2)The operational or generic user interface

  • 7/30/2019 System to Secure Cloud Data

    13/34

    SYSTEM DESIGN

    ( CLASS DIAGRAM)

    WriteUser

    userid

    password

    masteridname

    email

    role

    phno

    viewFiles()

    uploadFiles()

    CloudServiceProvider

    usreid

    password

    uploadFiles()

    traceUserBehavior()

    generateMasterKey()

    viewSessionInfo()

    ReadUser

    userid

    password

    masterid

    name

    email

    role

    phno

    viewFiles()

  • 7/30/2019 System to Secure Cloud Data

    14/34

    SEQUENCE DIAGRAM

    CloudService

    Provider

    Generate Key ChangeRoleUploadFiles CloudHistory SessionInfo

    Generating MasterKey

    Uploading Files into Cloud

    Maintaining Cloud History

    Viewing Session Information

    Changing the Role of User

  • 7/30/2019 System to Secure Cloud Data

    15/34

    Admin Home page

  • 7/30/2019 System to Secure Cloud Data

    16/34

    Generating Key

  • 7/30/2019 System to Secure Cloud Data

    17/34

    Key Generation

  • 7/30/2019 System to Secure Cloud Data

    18/34

    Upload a file

  • 7/30/2019 System to Secure Cloud Data

    19/34

    Change of Role

  • 7/30/2019 System to Secure Cloud Data

    20/34

    Registration

  • 7/30/2019 System to Secure Cloud Data

    21/34

  • 7/30/2019 System to Secure Cloud Data

    22/34

    User Login Page

  • 7/30/2019 System to Secure Cloud Data

    23/34

    Upload File

  • 7/30/2019 System to Secure Cloud Data

    24/34

    View Users in Admin Side:

  • 7/30/2019 System to Secure Cloud Data

    25/34

    Checking no of user in Cloud Area:

  • 7/30/2019 System to Secure Cloud Data

    26/34

    Cloud History Page in Admin:

  • 7/30/2019 System to Secure Cloud Data

    27/34

    Changing the Read or Write permition:

  • 7/30/2019 System to Secure Cloud Data

    28/34

    1)Administrative user interface:

    The administrative user interface concentrateson the consistent information that is practically, part

    of the organizational activities and which needs

    proper authentication for the data collection.

    These interfaces help the administrators with all the

    transactional states like Data insertion, Data deletionand Date updation along with the extensive data

    search capabilities.

    SYSTEM DESIGN

  • 7/30/2019 System to Secure Cloud Data

    29/34

    2)operational or generic user interface:

    The operational or generic user interface helps the end

    users of the system in transactions through the existing

    data and required services.

    The operational user interface also helps the ordinaryusers in managing their own information in a customized

    manner as per the included flexibilities.

  • 7/30/2019 System to Secure Cloud Data

    30/34

    ADVANTAGES

    Flexible scaling of resources (resource optimization)

    Lower computer cost

    Improve performance

    Reduce software cost

    Unlimited storage capacity

    Universal Document access

    Easier group collaboration

    Easy to access

    Portable and secured service provider

    Predictable any time, anywhere access to IT resources

    Rapid, request-driven provisioning

  • 7/30/2019 System to Secure Cloud Data

    31/34

    CONCLUSION

    Here, we analyzed the various security aspects of the

    cloud computing systems at various stages and security

    threats of the cloud computing system.

    We analyzed the various kinds of accessing control andauthentication and tracing the behavior of the users

    Mechanism to trace user behavior in the cloud and data

    security.

  • 7/30/2019 System to Secure Cloud Data

    32/34

    REFERENCES

    1. Balachandra Reddy Kandukuri, Ramacrishna PaturiV, Atanu Rakshi, Cloud

    Security Issues, 2009 IEEE International Conference on Services Computing,

    pages(s):517-520.

    2. Martn Abadi, "Logic in Access Control", Proceedings of the 18th Annual

    IEEE Symposium on Logic in Com-puter Science (LICS'03), 2003.

    3. Tal Garfinkel, Mendel Rosenblum, and Dan Boneh, "Flexible OS Support

    and Applications for Trusted Computing", the 9th Workshop on Hot Topics in

    Operating Systems (HotOS IX), USENIX, 2003.

  • 7/30/2019 System to Secure Cloud Data

    33/34

    4. Frank E. Gillett, Future View: The new technology ecosystems of cloud,

    cloud services and cloud computing Forrester Report, August 2008.

    5. Zhidong Shen , Qiang Tong , The Security of Cloud Computing System

    enabled by Trusted Computing Technology 2010 2nd International Conferenceon Signal Processing Systems (ICSPS)

    6. Algirds Avizienis, Jean-Claude Laprie, Brian Randell, and Carl Landwehr,

    Basic Concepts and Taxonomy of Dependable and Secure Computing, IEEE

    transactions on dependable and secure computing, vol.1, No.1, January-March,

    2004.

    7. Dr.Rao Mikkilineni, Vijay Sarathy, Cloud Computing and the Lessons from

    the Past, the 18th IEEE international Workshops on Enabling Technologies:

    Infrasturctures for olloaborative Enterises, on page(s):57-62, 2009

  • 7/30/2019 System to Secure Cloud Data

    34/34

    8.W. Kim, Cloud computing: Today and Tomorrow,Journal of Object

    Technology,8,2009

    9. Zhang et al., Securing elastic applications on mobile devices for cloudcomputing," Proceedings of the 2009 ACM workshop on Cloud computing

    security, 2009.

    10. C. Wang, Q. Wang, K. Ren, and W. Lou, Privacy-preserving public

    auditing for data storage security in cloud computing, in INFOCOM, 2010,

    pp. 525533.

    11.Cloud Security Alliance, Security Guidance for Critical Areas of Focus

    in Cloud Computing V2.1

    12. S. Pearson, Taking Account of Privacy when Designing Cloud

    Computing Services, CLOUD09, May 23, 2009,Vancouver, Canada.

    13. C. Wang, Q. Wang, K. Ren, and W. Lou, Privacy-preserving public

    auditing for data storage security in cloud computing, in INFOCOM, 2010,

    pp. 525533.