System to Secure Cloud Data
-
Upload
keshireddy-srikanthreddy -
Category
Documents
-
view
216 -
download
0
Transcript of System to Secure Cloud Data
-
7/30/2019 System to Secure Cloud Data
1/34
SYSTEM TO SECURE CLOUD
DATA
VENKATA AKULA
CHANDRAKANTH CHINTAGARI
-
7/30/2019 System to Secure Cloud Data
2/34
OUTLINE
Introduction to cloud computing
Architecture of cloud computing system
Security modules for cloud computing
Problems associated
System analysis
System design
Advantages
Conclusion
References
-
7/30/2019 System to Secure Cloud Data
3/34
INTRODUCTION
Cloud computing is known as Internet based computing, with
shared resources, software and information are provided to
computers and other devices based on requirement.
Cloud computing is a simple concept , software and services are
delivered over the web and through a browser, with no server or
client software to install.
Cloud Computing is a technology used to access services offered
on the Internet cloud.
-
7/30/2019 System to Secure Cloud Data
4/34
HOW IT WORKS
-
7/30/2019 System to Secure Cloud Data
5/34
ARCHITECTURE OF CLOUD COMPUTING
SYSTEM
-
7/30/2019 System to Secure Cloud Data
6/34
SECURITY MODULES FOR CLOUD
COMPUTING
Various security aspects and modules are integrated in to thecloud computing which provides security to the cloud. This
system contains the following modules to provide security for our
cloud computing system.
i)Authentication
ii) Access control
iii) Data security
iv) Mechanism to trace user behavior in the cloud
-
7/30/2019 System to Secure Cloud Data
7/34
AUTHENTICATION:
- The Service provider(administrator) of Cloud computingSystem provide security for the cloud resources and cloud users.
- The service provider can generate the master id to the users tobecome cloud users and provide role. So that cloud users have an
authentication to utilize cloud resources.
- He can trace out the users information, cloud history along
with session information.
- Also he can interact with the cloud users through mail.
-
7/30/2019 System to Secure Cloud Data
8/34
ACCESS CONTROL:
- Cloud users can use the cloud resources based on theiraccess control. Cloud users may have accessibility like
read and write.
- The cloud user who has read accessibility can only use the
resources which are available in the cloud and the cloud userwho has write accessibility can have permissions to
upload files into cloud and also he can utilize the already
available resources.
- These cloud users can interact with cloud service provider
to get change of their accessibility.
-
7/30/2019 System to Secure Cloud Data
9/34
DATA SECURITY:
The Service provider can provide security to the data
(resources of cloud and cloud users).
Encryption key and session keys are used for encryption
of data to sustain the security of data for a session.
Cloud users can provide security through their private
master id.
-
7/30/2019 System to Secure Cloud Data
10/34
TRACING USER BEHAVIOR:
Service provider can view users profile and he can trace
out the cloud users behavior through Cloud history.
Service provider can also view the session information.
-
7/30/2019 System to Secure Cloud Data
11/34
PROBLEM ASSOCIATED
EXISTING SYSTEM:
In the existing system, the authentication and
confidentiality was not provided in a better way.
PROPOSED SYSTEM:
Here a method to provide the security for cloud
computing system by integrating the several security
aspects into cloud computing system. We propose a model system in which cloud computing
system is secured in several stages.
-
7/30/2019 System to Secure Cloud Data
12/34
ANALYSIS OF SYSTEM
To provide flexibility to the users, the interfaces have
been developed that are accessible through a browser. The
GUIS at the top level have been categorized as
1)Administrative user interface
2)The operational or generic user interface
-
7/30/2019 System to Secure Cloud Data
13/34
SYSTEM DESIGN
( CLASS DIAGRAM)
WriteUser
userid
password
masteridname
email
role
phno
viewFiles()
uploadFiles()
CloudServiceProvider
usreid
password
uploadFiles()
traceUserBehavior()
generateMasterKey()
viewSessionInfo()
ReadUser
userid
password
masterid
name
email
role
phno
viewFiles()
-
7/30/2019 System to Secure Cloud Data
14/34
SEQUENCE DIAGRAM
CloudService
Provider
Generate Key ChangeRoleUploadFiles CloudHistory SessionInfo
Generating MasterKey
Uploading Files into Cloud
Maintaining Cloud History
Viewing Session Information
Changing the Role of User
-
7/30/2019 System to Secure Cloud Data
15/34
Admin Home page
-
7/30/2019 System to Secure Cloud Data
16/34
Generating Key
-
7/30/2019 System to Secure Cloud Data
17/34
Key Generation
-
7/30/2019 System to Secure Cloud Data
18/34
Upload a file
-
7/30/2019 System to Secure Cloud Data
19/34
Change of Role
-
7/30/2019 System to Secure Cloud Data
20/34
Registration
-
7/30/2019 System to Secure Cloud Data
21/34
-
7/30/2019 System to Secure Cloud Data
22/34
User Login Page
-
7/30/2019 System to Secure Cloud Data
23/34
Upload File
-
7/30/2019 System to Secure Cloud Data
24/34
View Users in Admin Side:
-
7/30/2019 System to Secure Cloud Data
25/34
Checking no of user in Cloud Area:
-
7/30/2019 System to Secure Cloud Data
26/34
Cloud History Page in Admin:
-
7/30/2019 System to Secure Cloud Data
27/34
Changing the Read or Write permition:
-
7/30/2019 System to Secure Cloud Data
28/34
1)Administrative user interface:
The administrative user interface concentrateson the consistent information that is practically, part
of the organizational activities and which needs
proper authentication for the data collection.
These interfaces help the administrators with all the
transactional states like Data insertion, Data deletionand Date updation along with the extensive data
search capabilities.
SYSTEM DESIGN
-
7/30/2019 System to Secure Cloud Data
29/34
2)operational or generic user interface:
The operational or generic user interface helps the end
users of the system in transactions through the existing
data and required services.
The operational user interface also helps the ordinaryusers in managing their own information in a customized
manner as per the included flexibilities.
-
7/30/2019 System to Secure Cloud Data
30/34
ADVANTAGES
Flexible scaling of resources (resource optimization)
Lower computer cost
Improve performance
Reduce software cost
Unlimited storage capacity
Universal Document access
Easier group collaboration
Easy to access
Portable and secured service provider
Predictable any time, anywhere access to IT resources
Rapid, request-driven provisioning
-
7/30/2019 System to Secure Cloud Data
31/34
CONCLUSION
Here, we analyzed the various security aspects of the
cloud computing systems at various stages and security
threats of the cloud computing system.
We analyzed the various kinds of accessing control andauthentication and tracing the behavior of the users
Mechanism to trace user behavior in the cloud and data
security.
-
7/30/2019 System to Secure Cloud Data
32/34
REFERENCES
1. Balachandra Reddy Kandukuri, Ramacrishna PaturiV, Atanu Rakshi, Cloud
Security Issues, 2009 IEEE International Conference on Services Computing,
pages(s):517-520.
2. Martn Abadi, "Logic in Access Control", Proceedings of the 18th Annual
IEEE Symposium on Logic in Com-puter Science (LICS'03), 2003.
3. Tal Garfinkel, Mendel Rosenblum, and Dan Boneh, "Flexible OS Support
and Applications for Trusted Computing", the 9th Workshop on Hot Topics in
Operating Systems (HotOS IX), USENIX, 2003.
-
7/30/2019 System to Secure Cloud Data
33/34
4. Frank E. Gillett, Future View: The new technology ecosystems of cloud,
cloud services and cloud computing Forrester Report, August 2008.
5. Zhidong Shen , Qiang Tong , The Security of Cloud Computing System
enabled by Trusted Computing Technology 2010 2nd International Conferenceon Signal Processing Systems (ICSPS)
6. Algirds Avizienis, Jean-Claude Laprie, Brian Randell, and Carl Landwehr,
Basic Concepts and Taxonomy of Dependable and Secure Computing, IEEE
transactions on dependable and secure computing, vol.1, No.1, January-March,
2004.
7. Dr.Rao Mikkilineni, Vijay Sarathy, Cloud Computing and the Lessons from
the Past, the 18th IEEE international Workshops on Enabling Technologies:
Infrasturctures for olloaborative Enterises, on page(s):57-62, 2009
-
7/30/2019 System to Secure Cloud Data
34/34
8.W. Kim, Cloud computing: Today and Tomorrow,Journal of Object
Technology,8,2009
9. Zhang et al., Securing elastic applications on mobile devices for cloudcomputing," Proceedings of the 2009 ACM workshop on Cloud computing
security, 2009.
10. C. Wang, Q. Wang, K. Ren, and W. Lou, Privacy-preserving public
auditing for data storage security in cloud computing, in INFOCOM, 2010,
pp. 525533.
11.Cloud Security Alliance, Security Guidance for Critical Areas of Focus
in Cloud Computing V2.1
12. S. Pearson, Taking Account of Privacy when Designing Cloud
Computing Services, CLOUD09, May 23, 2009,Vancouver, Canada.
13. C. Wang, Q. Wang, K. Ren, and W. Lou, Privacy-preserving public
auditing for data storage security in cloud computing, in INFOCOM, 2010,
pp. 525533.