cloud computing security from single to multi-clouds

24
Cloud Computing Security From Single to Multi-Clouds Guided By: Prof. NAVEEN Govt Sri Krishna Rajendra Silver Jubliee Technological Institute K.R CIRCLE Bangalore-560 001 Group Member Usn srinivas.p 1sk09cs048 srinivas 1sk09cs047 Sharath.g.s 1sk09cs038 shashikanth 1sk09cs41 DEPARTMENT OF COMPUTER ENGINEERING Cloud Computing Security: From Single to Multi-Clouds 1 Group ID - 6

Upload: raghavendra-swamy

Post on 20-Oct-2015

130 views

Category:

Documents


3 download

DESCRIPTION

Cloud Computing Security From Single to Multi-Clouds

TRANSCRIPT

Page 1: Cloud Computing Security From Single to Multi-Clouds

1

Cloud Computing Security From

Single to Multi-Clouds

Guided By: Prof. NAVEEN

Govt Sri Krishna Rajendra Silver Jubliee Technological InstituteK.R CIRCLE

Bangalore-560 001

Group Member Usn

srinivas.p 1sk09cs048

srinivas 1sk09cs047

Sharath.g.s 1sk09cs038

shashikanth 1sk09cs41

DEPARTMENT OF COMPUTER ENGINEERING

Cloud Computing Security: From Single to Multi-Clouds

Group ID - 6

Page 2: Cloud Computing Security From Single to Multi-Clouds

2

Contents :IntroductionLiterature surveyExisting System problem definitionSoftware Architecture S/w & H/w RequirementUML DiagramSDLC and project planConclusion References

Page 3: Cloud Computing Security From Single to Multi-Clouds

3

Introduction What is Cloud Computing ?

Why it is term as Cloud ?

Problem of service unavailability in single Cloud.

This project will help to the end user as well as customer.

Cloud Computing Security: From Single to Multi-clouds

Page 4: Cloud Computing Security From Single to Multi-Clouds

4

Literature Survey :Name, Author and

PublicationMethodologi

esAdvantages Disadvantages

A Practical Guide to cloud computing SecurityBy- Carl AlmondAugust 2009

Giving risk and mitigation

Security about the single cloud is maintained

efficiently

Points only the security of single

cloud

Security Challenges for public cloudBy- Kui Ren, Cong WangJan 2012

Outlineing Challangs &

motivate further

investigation

Address several security

challenges That current

research aren’t addressing

As maintaining security in public cloud ,urgency of

data not comes into picture

Foundations and Properties of Shamir’s Secret Sharing SchemeBy- Dan Bogdanov May 2007

Encryption &

Decryption

Excellent Framework

From Proofs and Application

Properties related to Shamir’s Secrete

Sharing

Cloud Computing Security: From Single to Multi-clouds

Page 5: Cloud Computing Security From Single to Multi-Clouds

5

Existing SystemCloud ( most probably single cloud )

Makes low cost processing of data.

Gives delivery models as PaaS, SaaS, IaaS

Disadvantages:

1. Service availability failure

2. Possibility that there are malicious insiders in the single

cloud.

Cloud Computing Security: From Single to Multi-clouds

Page 6: Cloud Computing Security From Single to Multi-Clouds

6

Proposed SystemProblem Definition :

As data storage and processing concern the

cloud plays vital role. But along with this advantage

develop a system which focus the security for single as well

as multi-cloud. So for this purpose we have to develop the

system which gives

1. Service Availability

2. Data Security

3. Data Integrity

Cloud Computing Security: From Single to Multi-clouds

Page 7: Cloud Computing Security From Single to Multi-Clouds

7

Features :Service Availability

Ability to run custom application using service

providers resources

Data security

Data Integrity

Cloud Computing Security: From Single to Multi-clouds

Page 8: Cloud Computing Security From Single to Multi-Clouds

8

Primary Objective : Make the assurance that data is in secure and stable form.

Cloud Computing Security: From Single to Multi-clouds

Secondary objective : Make service availability even when the one cloud fails

Handle Multiple request at a time.

Page 9: Cloud Computing Security From Single to Multi-Clouds

9

Algorithm Analysis :Secret Sharing Algorithms

Encryption:

Step1: input- secrete key k, number of participant n.

Step2: select random values a1,a2…,an.

Step3: Generate polynomial string to share the secrete into parts.

Step4: Secrete shared.

Decryption:

Step1: Generate polynomial string from secrete .

Step2: Add the n polynomial.Cloud Computing Security: From Single to Multi-clouds

Page 10: Cloud Computing Security From Single to Multi-Clouds

Cloud Computing Security: From Single to Multi-clouds

10

System Architecture :

Page 11: Cloud Computing Security From Single to Multi-Clouds

Cloud Computing Security: From Single to Multi-clouds

11

S/W Requirement : Operating System : Windows95/98/2000/XP Application Server : Tomcat5.0/6.X

Front End : HTML, Java,

JSP,AJAX Scripts : JavaScript.Server side Script : Java Server Pages. Database Connectivity : Mysql.

Page 12: Cloud Computing Security From Single to Multi-Clouds

12

H/W System Configuration :Processor : Pentium –IIISpeed : 1.1 GHzRAM : 256 MB(min)Hard Disk : 20 GBFloppy Drive : 1.44 MBMonitor : SVGA

Cloud Computing Security: From Single to Multi-clouds

Page 13: Cloud Computing Security From Single to Multi-Clouds

13

Data Flow Diagrams :

Cloud Computing Security: From Single to Multi-clouds

Level 0 Data Flow

Page 14: Cloud Computing Security From Single to Multi-Clouds

Cloud Computing Security: From Single to Multi-clouds

14

Level 1 Data Flow

Page 15: Cloud Computing Security From Single to Multi-Clouds

Cloud Computing Security: From Single to Multi-clouds

15

ER Diagram :

Page 16: Cloud Computing Security From Single to Multi-Clouds

16

Sequence Diagram :

Cloud Computing Security: From Single to Multi-clouds

Cloud Client Cloud AdministratorEnd User

1 : Register()

2 : Request for Space

3 : Space Allocation()

4 : Login()

5 : Session Credentials

6 : Browse service offering

7 : List of service offering auth to user

8 : Get details & request service offering ID

9 : Service Offering, Supported Operation()

10 : Request for service()

11 : Forward Request of end user

12 : Processing()

13 : Reply to request

Page 17: Cloud Computing Security From Single to Multi-Clouds

17

Class Diagram : Contract

+id: String+name: String+description: String+creator: String+acceptanceDate: Date+ServiceStartDate: Date+ServiceEndDate: Date+billingInfo: String+RenewalInfo: String+ProviderId: StringIDRef+ConsumerId: StringIDRef+OfferingId: StringIDRef

+GetInfo()+ShowInfo()+UpdateInfo()+DeleteInfo()

Provider Information

+ProviderId: String+name: String+address: String+ContactInformation: StringAgreesTo

ConsumerInformation

+ConsumerId: String+name: String+address: String+billingInfo: String+ContactInformation: String

+GetInfo()+ShowInfo()

AgreesTo

Relationship

+Id: String+name: String+Description: String+ProviderId: StringIDRef+ConsumerID: StringIDRef

Is Consumer0..1

*

Provider

*

0...1

Service Request

+Id: String+name: String+description: String+Status: StringEnumeration+ConsumerId: StringIdRef+contractId: StringIdRef

Requested Under

*

1

Service Offering

+Id: StringId+name: String+description: String+creator: String+version: String+CreateDate: Date+providerId: StringIdRef

* Contract For

1

Service Catalog

+Id: String+name: String+description: String+URL: anyURL+ProviderId: StringIdRef

*Contains

Contains*

Contains

*

Cloud Computing Security: From Single to Multi-clouds

Page 18: Cloud Computing Security From Single to Multi-Clouds

18

Life Cycle :

Cloud Computing Security: From Single to Multi-clouds

Page 19: Cloud Computing Security From Single to Multi-Clouds

19

Advantages :1. Data Integrity.

2. Service Availability.

3. The user runs custom applications using the service provider’s

resources.

4. Cloud service providers should ensure the security of their

customers’ data and should be responsible if any security risk

affects their customers’ service infrastructure.

Cloud Computing Security: From Single to Multi-clouds

Page 20: Cloud Computing Security From Single to Multi-Clouds

20

Disadvantages1. Possibility of loss and change of data if cloud provider is

not trusted.

2. privacy and security issues as a matter of high and urgent priority.

Cloud Computing Security: From Single to Multi-clouds

Page 21: Cloud Computing Security From Single to Multi-Clouds

21

Project Plan

Cloud Computing Security : From single to multi-clouds

Sr.no Activity feb march april October

1Problem statement formation

2 Requirement gathering

3 Requirement analysis

4 Learning Java, J2EE

5 Generation of Use cases

6 Identification of entity relationship

7 Identification of Classes

8 Learning FTP & FileZilla

9 Implementation of administrator use case

The objective of s/w project planning is to provide a framework that enables to make reasonable estimate of resources, cost and schedule

Page 22: Cloud Computing Security From Single to Multi-Clouds

22

Conclusion : This project focuses on the issues related to the data

security aspect of cloud computing. As data and

information will be shared with a third party, cloud

computing users want to avoid an untrusted cloud provider.

Protection of user’s important data is the most significant

part of this project.

Cloud Computing Security: From Single to Multi-clouds

Page 23: Cloud Computing Security From Single to Multi-Clouds

23

References : IEEE Transaction on :

1. Cloud computing security : from single to multi-cloud

2. Security Challenges for public cloud

3. Foundations and Properties of Shamir’s Secret Sharing

Scheme

Cloud Computing Security: From Single to Multi-clouds

Page 24: Cloud Computing Security From Single to Multi-Clouds

Automation I-Parking System 24

Thank You….!