cloud computing-security-from-single-to-multiple-140211071429-phpapp01

50
Cloud Computing Security From Single to Multi-Clouds By: SHIVANANDAR RAI N 4nm11mca66 NMAM IT NITTE

Upload: shivananda-rai

Post on 15-Dec-2014

137 views

Category:

Technology


1 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Cloud computing-security-from-single-to-multiple-140211071429-phpapp01

Cloud Computing Security From Single

to Multi-Clouds

By:SHIVANANDAR RAI N4nm11mca66NMAM IT NITTE

Page 2: Cloud computing-security-from-single-to-multiple-140211071429-phpapp01

Introduction

• Dealing with “single cloud” providers is predicted to become less popular with customers due to risks of service availability failure and the possibility of malicious insiders in the single cloud.

• A movement towards “multi-clouds”, or in other words, “interclouds” or “cloud-of-clouds” has emerged recently.

Page 3: Cloud computing-security-from-single-to-multiple-140211071429-phpapp01

What is Cloud Computing ?

Cloud computing is a model for enabling ubiquitous(present), convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model is composed of five essential characteristics, three service models, and four deployment models.

Page 4: Cloud computing-security-from-single-to-multiple-140211071429-phpapp01

Cloud Computing

Page 5: Cloud computing-security-from-single-to-multiple-140211071429-phpapp01

Deployment Models

Page 6: Cloud computing-security-from-single-to-multiple-140211071429-phpapp01

Delivery Models

Page 7: Cloud computing-security-from-single-to-multiple-140211071429-phpapp01

Difference

Page 8: Cloud computing-security-from-single-to-multiple-140211071429-phpapp01

Finally…….

Page 9: Cloud computing-security-from-single-to-multiple-140211071429-phpapp01

Moving to Clouds• Data is moving to the cloud

• Main reason: costs (pay-per-use model)

Page 10: Cloud computing-security-from-single-to-multiple-140211071429-phpapp01
Page 11: Cloud computing-security-from-single-to-multiple-140211071429-phpapp01

Everything Connected to Cloud

Page 12: Cloud computing-security-from-single-to-multiple-140211071429-phpapp01

What about Cloud Security?

Page 13: Cloud computing-security-from-single-to-multiple-140211071429-phpapp01

EXISTING SYSTEM

• Cloud providers should address privacy and security issues as a matter of high and urgent priority. Dealing with “single cloud” providers is becoming less popular with customers due to potential problems such as service availability failure and the possibility that there are malicious insiders in the single cloud.

Page 14: Cloud computing-security-from-single-to-multiple-140211071429-phpapp01

If It Fails…?

Page 15: Cloud computing-security-from-single-to-multiple-140211071429-phpapp01

DISADVANTAGES OF EXISTING SYSTEM

• Cloud providers should address privacy and security issues as a matter of high and urgent priority.

• Service availability failure and the possibility that there are malicious insiders in the single cloud.

Page 16: Cloud computing-security-from-single-to-multiple-140211071429-phpapp01

PROPOSED SYSTEM

• This Project focuses on the issues related to the data security aspect of cloud computing.

• Moving towards “Cloud of clouds “ or multi clouds technique which improves

Better read performanceData corruptions'Reduces Intrusions ….etc

Page 17: Cloud computing-security-from-single-to-multiple-140211071429-phpapp01

Multi Clouds

Page 18: Cloud computing-security-from-single-to-multiple-140211071429-phpapp01

ADVANTAGES OF PROPOSED SYSTEM

• Data Integrity• Service Availability.• The user runs custom applications using the

service provider’s resources• Cloud service providers should ensure the

security of their customers’ data and should be responsible if any security risk affects their customers’ service infrastructure.

Page 19: Cloud computing-security-from-single-to-multiple-140211071429-phpapp01

ARCHITECTURE

Page 20: Cloud computing-security-from-single-to-multiple-140211071429-phpapp01

HARDWARE REQUIREMENTS

• Processor - Pentium –III & Above• Speed - 1.1 GHz• RAM - 4 GB• Hard Disk - 20 GB

Page 21: Cloud computing-security-from-single-to-multiple-140211071429-phpapp01

SOFTWARE REQUIREMENTS

• Operating System : Windows XP & Above• Application Server : Tomcat5.0/6.X

• Front End : HTML, Java, JSP• Script : JavaScript.• Server side Script : Java Server Pages.• Database : MYSQL

Page 22: Cloud computing-security-from-single-to-multiple-140211071429-phpapp01

Registration

IDOwnerIDPasswordGenderMobileEMailDate

Loginidgenration()CreateAccount()

File Upload

FileIDFileNameFileSizeFilePathFileOwnerMetaDataKeyRequestDownloadStatusModifyStatusVerifyStatus

metadatagenration()fileupload()

File Download

FileIDFileNameFileSizeFilePathFileOwnerMetaDataKeyRequestVerifyStatus

comparemetadata()fileupload()

Class Diagram

Page 23: Cloud computing-security-from-single-to-multiple-140211071429-phpapp01

Use Case Diagram

ADMIN

CLOUDCREATION

CLOUDMAINTENANCE

MEMBERCREATION

FILEUPLOAD

FILEDOWNLOAD

CLOUDSTATUS

REPORTS

USER

Page 24: Cloud computing-security-from-single-to-multiple-140211071429-phpapp01

CLOUDCREATION

CLOUDMAINTAINANCE

MEMBERCREATION

FILEUPLOAD

REPORTS

Clouddetails

Credintials

File Details

File Report

Sequence Diagram

Page 25: Cloud computing-security-from-single-to-multiple-140211071429-phpapp01

Activity Diagram

Page 26: Cloud computing-security-from-single-to-multiple-140211071429-phpapp01

SOFTWARE REQUIREMENTS

• Operating System : Windows XP & Above• Application Server : Tomcat5.0/6.X

• Front End : HTML, Java, JSP• Script : JavaScript.• Server side Script : Java Server Pages.• Database : MYSQL

Page 27: Cloud computing-security-from-single-to-multiple-140211071429-phpapp01

HARDWARE REQUIREMENTS

• Processor - Windows• Speed - 1.1 GHz• RAM - 256 MB(min)• Hard Disk - 20 GB

Page 28: Cloud computing-security-from-single-to-multiple-140211071429-phpapp01

SCREEN SHOTS

 Welcome Page:

Page 29: Cloud computing-security-from-single-to-multiple-140211071429-phpapp01

Client Register:

Page 30: Cloud computing-security-from-single-to-multiple-140211071429-phpapp01

Client Login:

Page 31: Cloud computing-security-from-single-to-multiple-140211071429-phpapp01

File Upload:

Page 32: Cloud computing-security-from-single-to-multiple-140211071429-phpapp01

File Stored in Multi-Cloud:

Page 33: Cloud computing-security-from-single-to-multiple-140211071429-phpapp01

File upload to Multi Cloud:

Page 34: Cloud computing-security-from-single-to-multiple-140211071429-phpapp01

User File:

Page 35: Cloud computing-security-from-single-to-multiple-140211071429-phpapp01

File Verify Owner :

Page 36: Cloud computing-security-from-single-to-multiple-140211071429-phpapp01

File Verified:

Page 37: Cloud computing-security-from-single-to-multiple-140211071429-phpapp01

Client verify File with Key:

Page 38: Cloud computing-security-from-single-to-multiple-140211071429-phpapp01

Client Verify Server 1:

Page 39: Cloud computing-security-from-single-to-multiple-140211071429-phpapp01

Client Verify Server 2:

Page 40: Cloud computing-security-from-single-to-multiple-140211071429-phpapp01

Client Verify Server 3:

Page 41: Cloud computing-security-from-single-to-multiple-140211071429-phpapp01

View Original File and Download:

Page 42: Cloud computing-security-from-single-to-multiple-140211071429-phpapp01

Implémentations

• Data Integrity• Data Intrusion• Service Availability

Page 43: Cloud computing-security-from-single-to-multiple-140211071429-phpapp01

Data Integrity

• One of the most important issues related to cloud security risks is data integrity. The data stored in the cloud may suffer from damage during transition operations from or to the cloud storage provider.

Page 44: Cloud computing-security-from-single-to-multiple-140211071429-phpapp01

Data Intrusion• Another security risk that may occur with a cloud provider, such

as the Amazon cloud service, is a hacked password or data intrusion.

• If someone gains access to an Amazon account password, they will be able to access all of the account’s instances and resources.

• Thus the stolen password allows the hacker to erase all the information inside any virtual machine instance for the stolen user account, modify it, or even disable its services. Furthermore, there is a possibility for the user’s email(Amazon user name) to be hacked, and since Amazon allows a lost password to be reset by email, the hacker may still be able to log in to the account after receiving the new reset password.

Page 45: Cloud computing-security-from-single-to-multiple-140211071429-phpapp01

Service Availability• Another major concern in cloud services is service

availability.• Amazon mentions in its licensing agreement that it is

possible that the service might be unavailable from time to time.

• The user’s web service may terminate for any reason at any time if any user’s files break the cloud storage policy. In addition, if any damage occurs to any Amazon web service and the service fails, in this case there will be no charge to the Amazon Company for this failure. Companies seeking to protect services from such failure need measures such as backups or use of multiple providers.

Page 46: Cloud computing-security-from-single-to-multiple-140211071429-phpapp01

CONCLUSION

• It is clear that although the use of cloud computing has rapidly increased, cloud computing security is still considered the major issue in the cloud computing environment. Customers do not want to lose their private information as a result of malicious insiders in the cloud. In addition, the loss of service availability has caused many problems for a large number of customers recently

Page 47: Cloud computing-security-from-single-to-multiple-140211071429-phpapp01

CONCLUSION (cont…)

• Furthermore, data intrusion leads to many problems for the users of cloud computing.

• We support the migration to multi-clouds due to its ability to decrease security risks that affect the cloud computing user.

Page 48: Cloud computing-security-from-single-to-multiple-140211071429-phpapp01

FUTURE ENHANCEMENTS

• For future work, we aim to provide a framework to supply a secure cloud database that will guarantee to prevent security risks facing the cloud computing community.

• This framework will apply multi-clouds and the secret sharing algorithm to reduce the risk of data intrusion and the loss of service availability in the cloud and ensure data integrity.

Page 49: Cloud computing-security-from-single-to-multiple-140211071429-phpapp01

FUTURE ENHANCEMENTS (cont…)

• In relation to data intrusion and data integrity, assume we want to distribute the data into three different cloud providers, and we apply the secret sharing algorithm on the stored data in the cloud provider.

• An intruder needs to retrieve at least three values to be able to find out the real value that we want to hide from the intruder.

Page 50: Cloud computing-security-from-single-to-multiple-140211071429-phpapp01

Thankyou

By Shivananda Rai N