Guided By: Prof. Rajarshree Karande JSPM’S IMPERIAL COLLEGE OF ENGINEERING & RESEARCH WAGHOLI, PUNE -411207 Group MemberRoll No. Abhijeet Aralgundkar03.

Slides:



Advertisements
Similar presentations
Trusted Data Sharing over Untrusted Cloud Storage Provider Gansen Zhao, Chunming Rong, Jin Li, Feng Zhang, and Yong Tang Cloud Computing Technology and.
Advertisements

Secure Data Storage in Cloud Computing Submitted by A.Senthil Kumar( ) C.Karthik( ) H.Sheik mohideen( ) S.Lakshmi rajan( )
Security Prospects through Cloud Computing by Adopting Multiple Clouds Meiko Jensen, Jorg Schwenk Jens-Matthias Bohli, Nils Gruschka Luigi Lo Iacono Presented.
Supervisor : Mr. Hadi Salimi Advanced Topics in Information Systems Mazandaran University of Science and Technology February 4, 2011 Survey on Cloud Computing.
Design of Web-based Systems IS Development: lecture 10.
System Engineering Instructor: Dr. Jerry Gao. System Engineering Jerry Gao, Ph.D. Jan System Engineering Hierarchy - System Modeling - Information.
Database Administration Chapter 16. Need for Databases  Data is used by different people, in different departments, for different reasons  Interpretation.
Optimizing Cloud Resources for Delivering IPTV Services Through Virtualization.
For more notes and topics visit:
Cloud Computing and its Implementation ELYSIUM TECHNOLOGIES PRIVATE LIMITED Madurai | Trichy | Coimbatore | Kollam | Cochin | Tirunelveli T. Udhaya Shankar,
Sinaia, Romania August, TH Workshop “Software Engineering Education and Reverse Engineering” Dhuratë Hyseni, Betim Çiço South East European University.
Construction of efficient PDP scheme for Distributed Cloud Storage. By Manognya Reddy Kondam.
Deploying and Managing Windows Server 2012
A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation.
By Mihir Joshi Nikhil Dixit Limaye Pallavi Bhide Payal Godse.
Secure Encounter-based Mobile Social Networks: Requirements, Designs, and Tradeoffs.
CLOUD COMPUTING  IT is a service provider which provides information.  IT allows the employees to work remotely  IT is a on demand network access.
DATA DYNAMICS AND PUBLIC VERIFIABILITY CHECKING WITHOUT THIRD PARTY AUDITOR GUIDED BY PROJECT MEMBERS: Ms. V.JAYANTHI M.E Assistant Professor V.KARTHIKEYAN.
Privacy-Preserving Public Auditing for Secure Cloud Storage
LOGO Server. Contents Introduction 1 Problem Definition 2 Proposed Solution 3 Architecture Diagram 4 Server Technology 5 Hardware and Software.
PSEUDONYMIZATION TECHNIQUES FOR PRIVACY STUDY WITH CLINICAL DATA 1.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
INTERNAL GUIDE: BALRAJU.M BY: CH MAHESH KUMAR 07D31A1237 B.CHANDRAKANTH 07D31A1209 CH.GOWTHAM 07D31A1217 ARUN KUMAR MISHRA 07D31A1205 M.Tech.
Enterprise Resource Planning(ERP)
Identity-Based Secure Distributed Data Storage Schemes.
Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems.
MOBILITY BILL DEFRAYMENT
Plan  Introduction  What is Cloud Computing?  Why is it called ‘’Cloud Computing’’?  Characteristics of Cloud Computing  Advantages of Cloud Computing.
Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage.
Privacy Preserving Delegated Access Control in Public Clouds.
A Highly Scalable Key Pre- Distribution Scheme for Wireless Sensor Networks.
Project Members: ABHIJITH REDDY MAMIDI SWETHA CHAPARALA TEJASWI DUBBUDU JESURUN PREM KUMAR.
CONTENTS OF THE SRS REPORT. Software Requirements Specification (SRS) template The SRS document describes recommended approaches for the specification.
Database Administration
Software Development Risk Assessment for Clouds National Technical University of Ukraine “Kiev Polytechnic Institute” Heat and energy design faculty Department.
Presenting By CH . MADHURI(12QU1D5806) Under the supervision of
Twitsper: Tweeting Privately. Abstract Although online social networks provide some form of privacy controls to protect a user's shared content from other.
Under The Guidance of Smt. Ch.Ratna Kumari Asst.Professor Submitted by M Ravi Kumar Roll No:10021F0006 M.C.A.
Attribute-Based Encryption With Verifiable Outsourced Decryption.
Rolando Gaytan Clay Schumacher Josh Weisskopf Cory Simon Aaron Steil (Reiman Gardens) – Client Dr. Tien Nguyen - Advisor.
INTERNAL GUIDE: T.BENERJI BY: CH MAHESH KUMAR 07D31A1237 B.CHANDRAKANTH 07D31A1209 CH.GOWTHAM 07D31A1217 ARUN KUMAR MISHRA 07D31A1205 M.Tech( Ph.D )
Web Technologies Lecture 6 State preservation. Motivation How to keep user data while navigating on a website? – Authenticate only once – Store wish list.
Harnessing the Cloud for Securely Outsourcing Large- Scale Systems of Linear Equations.
Implementing Secure IRC App with Elgamal By Hyungki Choi ID : Date :
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud.
Project Undertaken By, Anita.K Subalakshmi.S Suseela.J.S Guide: Mrs.M.J.Jeyasheela Rakkini AP/CSE Third Review.
Waste Management Inspection Tracking System (WMITS)
Library Management System. Aim : To develop a project titled “LIBRARY MANAGEMENT” and is developed to maintain the operation done in a library. To develop.
E-commerce Architecture Ayşe Başar Bener. Client Server Architecture E-commerce is based on client/ server architecture –Client processes requesting service.
  ONLINE DORMITORY RESERVATION SYSTEM By RAMYA VAKITY KOUSHIK KUMAR SURAGONI MOTHE ADITHYA    GRADUATE CAPSTONE SEMINAR PROJECT    Submitted in partial.
Presentation on Online Shopping
INTRODUCTION About Project: About Project: Our project is based of the technology of cloud computing which is offering many pro’s to the world of computers.
Agenda Introduction Literature survey Hardware and software requirements System design System implementation System testing Conclusion and future enhancement.
“Ensuring distributed accountability for data sharing in the cloud”
Speed Cash System. Purpose of the Project  online Banking Transaction Information.  keeping in view of the distributed client server computing technology,
 Abstract  Introduction  Literature Survey  Conclusion on Literature Survey  Threat model and system architecture  Proposed Work  Attack Scenarios.
LEAVE MANAGEMENT SYSTEM. K. SIVA CHANDAN (07D01A05A5) SHEELA ABHILASH (07D01A05A3) V. RAVITEJA (07D01A0595) A PROJECT BY.
CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring.
Secure and Practical Outsourcing of Linear Programming in Cloud Computing.
BY S.S.SUDHEER VARMA (13NT1D5816)
Lan Zhou, Vijay Varadharajan, and Michael Hitchens
INFORMATION RETRIEVAL AND KNOWLEDGE MANAGEMENT SYSTEM
Hybrid Cloud Architecture for Software-as-a-Service Provider to Achieve Higher Privacy and Decrease Securiity Concerns about Cloud Computing P. Reinhold.
Department Of Computer Science Engineering
Cloud Computing and its Implementation
Cloud Web Filtering Platform
Computer Science and Engineering
Salesforce.com Salesforce.com is the world leader in on-demand customer relationship management (CRM) services Manages sales, marketing, customer service,
Practice Management & Patient Health Record sharing system
Problem Statement To transform the traditional system to automated system(ERP). No centralized control. Low data privacy. Huge amount of human resources.
Presentation transcript:

Guided By: Prof. Rajarshree Karande JSPM’S IMPERIAL COLLEGE OF ENGINEERING & RESEARCH WAGHOLI, PUNE Group MemberRoll No. Abhijeet Aralgundkar03 Rohit Karambali32 Tanaji Yetale 74 DEPARTMENT OF COMPUTER ENGINEERING CLASS: BE COMPUTER YEAR: Cloud Computing Security: From Single to Multi-Clouds 1 Group ID - 11

 Introduction  Literature survey  Existing System  problem definition  Software Architecture  S/w & H/w Requirement  UML Diagram  SDLC and project plan  Conclusion  References 2 Automation I-Parking System

What is Cloud Computing ? Why it is term as Cloud ? Problem of service unavailability in single Cloud. This project will help to the end user as well as customer. Cloud Computing Security: From Single to Multi-clouds 3

4

 Cloud ( most probably single cloud ) Makes low cost processing of data. Gives delivery models as PaaS, SaaS, IaaS Disadvantages: 1. Service availability failure 2. Possibility that there are malicious insiders in the single cloud. Cloud Computing Security: From Single to Multi-clouds 5

 Problem Definition : As data storage and processing concern the cloud plays vital role. But along with this advantage develop a system which focus the security for single as well as multi- cloud. So for this purpose we have to develop the system which gives 1. Service Availability 2. Data Security 3. Data Integrity Cloud Computing Security: From Single to Multi-clouds 6

 Service Availability  Ability to run custom application using service providers resources  Data security  Data Integrity Cloud Computing Security: From Single to Multi-clouds 7

 Make the assurance that data is in secure and stable form. Cloud Computing Security: From Single to Multi-clouds 8 Secondary objective : Make service availability even when the one cloud fails Handle Multiple request at a time.

 Secret Sharing Algorithms Encryption: Step1: input- secrete key k, number of participant n. Step2: select random values a1,a2…,an. Step3: Generate polynomial string to share the secrete into parts. Step4: Secrete shared. Decryption: Step1: Generate polynomial string from secrete. Step2: Add the n polynomial. Cloud Computing Security: From Single to Multi-clouds 9

10

 Operating System : Windows95/98/2000/XP  Application Server : Tomcat5.0/6.X  Front End : HTML, Java, JSP,AJAX  Scripts : JavaScript.  Server side Script : Java Server Pages.  Database Connectivity : Mysql. Cloud Computing Security: From Single to Multi-clouds 11

 Processor :Pentium –III  Speed:1.1 GHz  RAM :256 MB(min)  Hard Disk:20 GB  Floppy Drive:1.44 MB  Monitor:SVGA Cloud Computing Security: From Single to Multi-clouds 12

Cloud Computing Security: From Single to Multi-clouds 13 Level 0 Data Flow

Cloud Computing Security: From Single to Multi-clouds 14 Level 1 Data Flow

Cloud Computing Security: From Single to Multi-clouds 15

Cloud Computing Security: From Single to Multi-clouds 16 Cloud ClientCloud Administrator End User 1 : Register() 2 : Request for Space 3 : Space Allocation() 4 : Login() 5 : Session Credentials 6 : Browse service offering 7 : List of service offering auth to user 8 : Get details & request service offering ID 9 : Service Offering, Supported Operation() 10 : Request for service() 11 : Forward Request of end user 12 : Processing() 13 : Reply to request

Cloud Computing Security: From Single to Multi-clouds 17

Cloud Computing Security: From Single to Multi-clouds 18

1. Data Integrity. 2. Service Availability. 3. The user runs custom applications using the service provider’s resources. 4. Cloud service providers should ensure the security of their customers’ data and should be responsible if any security risk affects their customers’ service infrastructure. Cloud Computing Security: From Single to Multi-clouds 19

1. Possibility of loss and change of data if cloud provider is not trusted. 2. privacy and security issues as a matter of high and urgent priority. Cloud Computing Security: From Single to Multi-clouds 20

Sr.noActivityJulyAugustSeptemberOctober 1 Problem statement formation 2 Requirement gathering 3 Requirement analysis 4 Learning Java, J2EE 5 Generation of Use cases 6 Identification of entity relationship 7 Identification of Classes 8 Learning FTP & FileZilla 9Implementation of administrator use case The objective of s/w project planning is to provide a framework that enables to make reasonable estimate of resources, cost and schedule 21 Cloud Computing Security : From single to multi-clouds

 This project focuses on the issues related to the data security aspect of cloud computing. As data and information will be shared with a third party, cloud computing users want to avoid an untrusted cloud provider. Protection of user’s important data is the most significant part of this project. Cloud Computing Security: From Single to Multi-clouds 22

 IEEE Transaction on : 1. Cloud computing security : from single to multi-cloud 2. Security Challenges for public cloud 3. Foundations and Properties of Shamir’s Secret Sharing Scheme Cloud Computing Security: From Single to Multi-clouds 23

24 Automation I-Parking System