Cloud computing security from single to multiple
-
Upload
kiran-kumar -
Category
Technology
-
view
2.444 -
download
3
description
Transcript of Cloud computing security from single to multiple
![Page 1: Cloud computing security from single to multiple](https://reader036.fdocuments.in/reader036/viewer/2022062511/54b7310e4a795925408b45a3/html5/thumbnails/1.jpg)
Cloud Computing Security From Single
to Multi-Clouds
ByKiran Kumar
![Page 2: Cloud computing security from single to multiple](https://reader036.fdocuments.in/reader036/viewer/2022062511/54b7310e4a795925408b45a3/html5/thumbnails/2.jpg)
ABSTRACT
• Dealing with “single cloud” providers is predicted to become less popular with customers due to risks of service availability failure and the possibility of malicious insiders in the single cloud.
• A movement towards “multi-clouds”, or in other words, “interclouds” or “cloud-of-clouds” has emerged recently.
![Page 3: Cloud computing security from single to multiple](https://reader036.fdocuments.in/reader036/viewer/2022062511/54b7310e4a795925408b45a3/html5/thumbnails/3.jpg)
What is Cloud Computing ?
• Cloud computing is a model for enabling ubiquitous(present), convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model is composed of five essential characteristics, three service models, and four deployment models.
![Page 4: Cloud computing security from single to multiple](https://reader036.fdocuments.in/reader036/viewer/2022062511/54b7310e4a795925408b45a3/html5/thumbnails/4.jpg)
Cloud Computing
![Page 5: Cloud computing security from single to multiple](https://reader036.fdocuments.in/reader036/viewer/2022062511/54b7310e4a795925408b45a3/html5/thumbnails/5.jpg)
Deployment Models
![Page 6: Cloud computing security from single to multiple](https://reader036.fdocuments.in/reader036/viewer/2022062511/54b7310e4a795925408b45a3/html5/thumbnails/6.jpg)
Delivery Models
![Page 7: Cloud computing security from single to multiple](https://reader036.fdocuments.in/reader036/viewer/2022062511/54b7310e4a795925408b45a3/html5/thumbnails/7.jpg)
Difference
![Page 8: Cloud computing security from single to multiple](https://reader036.fdocuments.in/reader036/viewer/2022062511/54b7310e4a795925408b45a3/html5/thumbnails/8.jpg)
Finally…….
![Page 9: Cloud computing security from single to multiple](https://reader036.fdocuments.in/reader036/viewer/2022062511/54b7310e4a795925408b45a3/html5/thumbnails/9.jpg)
Moving to Clouds• Data is moving to the cloud
• Main reason: costs (pay-per-use model)
![Page 10: Cloud computing security from single to multiple](https://reader036.fdocuments.in/reader036/viewer/2022062511/54b7310e4a795925408b45a3/html5/thumbnails/10.jpg)
![Page 11: Cloud computing security from single to multiple](https://reader036.fdocuments.in/reader036/viewer/2022062511/54b7310e4a795925408b45a3/html5/thumbnails/11.jpg)
Everything Connected to Cloud
![Page 12: Cloud computing security from single to multiple](https://reader036.fdocuments.in/reader036/viewer/2022062511/54b7310e4a795925408b45a3/html5/thumbnails/12.jpg)
What about Cloud Security?
![Page 13: Cloud computing security from single to multiple](https://reader036.fdocuments.in/reader036/viewer/2022062511/54b7310e4a795925408b45a3/html5/thumbnails/13.jpg)
EXISTING SYSTEM
• Cloud providers should address privacy and security issues as a matter of high and urgent priority. Dealing with “single cloud” providers is becoming less popular with customers due to potential problems such as service availability failure and the possibility that there are malicious insiders in the single cloud.
![Page 14: Cloud computing security from single to multiple](https://reader036.fdocuments.in/reader036/viewer/2022062511/54b7310e4a795925408b45a3/html5/thumbnails/14.jpg)
If It Fails…?
![Page 15: Cloud computing security from single to multiple](https://reader036.fdocuments.in/reader036/viewer/2022062511/54b7310e4a795925408b45a3/html5/thumbnails/15.jpg)
DISADVANTAGES OF EXISTING SYSTEM
• Cloud providers should address privacy and security issues as a matter of high and urgent priority.
• Service availability failure and the possibility that there are malicious insiders in the single cloud.
![Page 16: Cloud computing security from single to multiple](https://reader036.fdocuments.in/reader036/viewer/2022062511/54b7310e4a795925408b45a3/html5/thumbnails/16.jpg)
PROPOSED SYSTEM
• This Project focuses on the issues related to the data security aspect of cloud computing.
• Moving towards “Cloud of clouds “ or multi clouds technique which improves
Better read performanceData corruptions'Reduces Intrusions ….etc
![Page 17: Cloud computing security from single to multiple](https://reader036.fdocuments.in/reader036/viewer/2022062511/54b7310e4a795925408b45a3/html5/thumbnails/17.jpg)
Multi Clouds
![Page 18: Cloud computing security from single to multiple](https://reader036.fdocuments.in/reader036/viewer/2022062511/54b7310e4a795925408b45a3/html5/thumbnails/18.jpg)
ADVANTAGES OF PROPOSED SYSTEM
• Data Integrity• Service Availability.• The user runs custom applications using the
service provider’s resources• Cloud service providers should ensure the
security of their customers’ data and should be responsible if any security risk affects their customers’ service infrastructure.
![Page 19: Cloud computing security from single to multiple](https://reader036.fdocuments.in/reader036/viewer/2022062511/54b7310e4a795925408b45a3/html5/thumbnails/19.jpg)
ARCHITECTURE
![Page 20: Cloud computing security from single to multiple](https://reader036.fdocuments.in/reader036/viewer/2022062511/54b7310e4a795925408b45a3/html5/thumbnails/20.jpg)
DepSKy System Model
The DepSky system model contains three parts: readers, writers, and four cloud storage providers, where readers and writers are the client’s tasks.
Readers can fail arbitrarily (for example, they can fail by crashing, they can fail from time to time and then display any behavior) whereas, writers only fail by crashing.
![Page 21: Cloud computing security from single to multiple](https://reader036.fdocuments.in/reader036/viewer/2022062511/54b7310e4a795925408b45a3/html5/thumbnails/21.jpg)
DepSKy System Model
![Page 22: Cloud computing security from single to multiple](https://reader036.fdocuments.in/reader036/viewer/2022062511/54b7310e4a795925408b45a3/html5/thumbnails/22.jpg)
DepSky Design Principles
1. No trust on individual cloud providersDistributed trust is built by using multiple clouds2. Use storage clouds as they areNo server-side code on the replication protocols3. Data is updatableReplication protocols for consistency
![Page 23: Cloud computing security from single to multiple](https://reader036.fdocuments.in/reader036/viewer/2022062511/54b7310e4a795925408b45a3/html5/thumbnails/23.jpg)
Data Model Implementation
![Page 24: Cloud computing security from single to multiple](https://reader036.fdocuments.in/reader036/viewer/2022062511/54b7310e4a795925408b45a3/html5/thumbnails/24.jpg)
DepSky Write
![Page 25: Cloud computing security from single to multiple](https://reader036.fdocuments.in/reader036/viewer/2022062511/54b7310e4a795925408b45a3/html5/thumbnails/25.jpg)
DepSky Read
![Page 26: Cloud computing security from single to multiple](https://reader036.fdocuments.in/reader036/viewer/2022062511/54b7310e4a795925408b45a3/html5/thumbnails/26.jpg)
DepSky Confidentiality
![Page 27: Cloud computing security from single to multiple](https://reader036.fdocuments.in/reader036/viewer/2022062511/54b7310e4a795925408b45a3/html5/thumbnails/27.jpg)
HARDWARE REQUIREMENTS
• Processor - Pentium –III• Speed - 1.1 GHz• RAM - 256 MB(min)• Hard Disk - 20 GB• Floppy Drive - 1.44 MB• Key Board - Standard Keyboard• Monitor - SVGA
![Page 28: Cloud computing security from single to multiple](https://reader036.fdocuments.in/reader036/viewer/2022062511/54b7310e4a795925408b45a3/html5/thumbnails/28.jpg)
SOFTWARE REQUIREMENTS
• Operating System : Windows XP • Application Server : Tomcat5.0/6.X
• Front End : HTML, Java, JSP• Script : JavaScript.• Server side Script : Java Server Pages.• Database : MYSQL
![Page 29: Cloud computing security from single to multiple](https://reader036.fdocuments.in/reader036/viewer/2022062511/54b7310e4a795925408b45a3/html5/thumbnails/29.jpg)
Implémentations
• Data Integrity• Data Intrusion• Service Availability
![Page 30: Cloud computing security from single to multiple](https://reader036.fdocuments.in/reader036/viewer/2022062511/54b7310e4a795925408b45a3/html5/thumbnails/30.jpg)
Data Integrity
• One of the most important issues related to cloud security risks is data integrity. The data stored in the cloud may suffer from damage during transition operations from or to the cloud storage provider.
![Page 31: Cloud computing security from single to multiple](https://reader036.fdocuments.in/reader036/viewer/2022062511/54b7310e4a795925408b45a3/html5/thumbnails/31.jpg)
Data Intrusion• Another security risk that may occur with a cloud provider, such
as the Amazon cloud service, is a hacked password or data intrusion.
• If someone gains access to an Amazon account password, they will be able to access all of the account’s instances and resources.
• Thus the stolen password allows the hacker to erase all the information inside any virtual machine instance for the stolen user account, modify it, or even disable its services. Furthermore, there is a possibility for the user’s email(Amazon user name) to be hacked, and since Amazon allows a lost password to be reset by email, the hacker may still be able to log in to the account after receiving the new reset password.
![Page 32: Cloud computing security from single to multiple](https://reader036.fdocuments.in/reader036/viewer/2022062511/54b7310e4a795925408b45a3/html5/thumbnails/32.jpg)
Service Availability• Another major concern in cloud services is service
availability.• Amazon mentions in its licensing agreement that it is
possible that the service might be unavailable from time to time.
• The user’s web service may terminate for any reason at any time if any user’s files break the cloud storage policy. In addition, if any damage occurs to any Amazon web service and the service fails, in this case there will be no charge to the Amazon Company for this failure. Companies seeking to protect services from such failure need measures such as backups or use of multiple providers.
![Page 33: Cloud computing security from single to multiple](https://reader036.fdocuments.in/reader036/viewer/2022062511/54b7310e4a795925408b45a3/html5/thumbnails/33.jpg)
code #1 getting User Detailstry { conn = (Connection) DbConnector.getConnection(); sql = "select * from user where userid= '" + userid + "' and
password= '" + password+"'"; pst = (PreparedStatement) conn.prepareStatement(sql); ResultSet rs = pst.executeQuery(); if (rs.next()) { available = true; } else { available = false; } } catch (Exception e) { e.printStackTrace(); }
![Page 34: Cloud computing security from single to multiple](https://reader036.fdocuments.in/reader036/viewer/2022062511/54b7310e4a795925408b45a3/html5/thumbnails/34.jpg)
code #2 for Encryptionpublic static String encryptString(String str,String key) { StringBuffer sb = new StringBuffer(str); int lenStr = str.length(); int lenKey = key.length(); // For each character in our string, encrypt it... for (int i = 0, j = 0; i < lenStr; i++, j++) { if (j >= lenKey) { j = 0; // Wrap 'round to beginning of key string. }// XOR the chars together. Must cast back to char to avoid compile error. sb.setCharAt(i, (char) (str.charAt(i) ^ key.charAt(j))); } return sb.toString(); }
![Page 35: Cloud computing security from single to multiple](https://reader036.fdocuments.in/reader036/viewer/2022062511/54b7310e4a795925408b45a3/html5/thumbnails/35.jpg)
code #3 for FileUploadpublic synchronized boolean uploadFile(InputStream is) { try { BufferedInputStream bis = new BufferedInputStream(is); OutputStream os = m_client.getOutputStream(); BufferedOutputStream bos = new BufferedOutputStream(os); byte[] buffer = new byte[1024]; int readCount; while ((readCount = bis.read(buffer)) > 0) { bos.write(buffer, 0, readCount); } bos.close(); this.succMesg = "Uploaded!"; return true; } catch (Exception ex) { ex.printStackTrace(); return false; } }
![Page 36: Cloud computing security from single to multiple](https://reader036.fdocuments.in/reader036/viewer/2022062511/54b7310e4a795925408b45a3/html5/thumbnails/36.jpg)
code #4 for FileDownloadpublic synchronized boolean downloadFile(String localfilename) { try { InputStream is = m_client.getInputStream(); BufferedInputStream bis = new BufferedInputStream(is); System.out.println(">>>>>>>>>>>"+localfilename); OutputStream os = new FileOutputStream(localfilename); BufferedOutputStream bos = new BufferedOutputStream(os); byte[] buffer = new byte[1024]; int readCount; while ((readCount = bis.read(buffer)) > 0) { bos.write(buffer, 0, readCount); } bos.close(); is.close(); // close the FTP inputstream this.succMesg = "Downloaded!"; return true; } catch (Exception ex) { ex.printStackTrace(); return false; } }
![Page 37: Cloud computing security from single to multiple](https://reader036.fdocuments.in/reader036/viewer/2022062511/54b7310e4a795925408b45a3/html5/thumbnails/37.jpg)
Registration
IDOwnerIDPasswordGenderMobileEMailDate
Loginidgenration()CreateAccount()
File Upload
FileIDFileNameFileSizeFilePathFileOwnerMetaDataKeyRequestDownloadStatusModifyStatusVerifyStatus
metadatagenration()fileupload()
File Download
FileIDFileNameFileSizeFilePathFileOwnerMetaDataKeyRequestVerifyStatus
comparemetadata()fileupload()
Class Diagram
![Page 38: Cloud computing security from single to multiple](https://reader036.fdocuments.in/reader036/viewer/2022062511/54b7310e4a795925408b45a3/html5/thumbnails/38.jpg)
ADMIN
CLOUDCREATION
CLOUDMAINTENANCE
MEMBERCREATION
FILEUPLOAD
FILEDOWNLOAD
CLOUDSTATUS
REPORTS
USER
Use Case Diagram
![Page 39: Cloud computing security from single to multiple](https://reader036.fdocuments.in/reader036/viewer/2022062511/54b7310e4a795925408b45a3/html5/thumbnails/39.jpg)
Sequence DiagramCLOUD
CREATIONCLOUD
MAINTAINANCEMEMBER
CREATIONFILE
UPLOADREPORTS
Clouddetails
Credintials
File Details
File Report
![Page 40: Cloud computing security from single to multiple](https://reader036.fdocuments.in/reader036/viewer/2022062511/54b7310e4a795925408b45a3/html5/thumbnails/40.jpg)
LOGIN
ADMIN USER
CLOUD CREATION
CLOUDMAINTENANCE
MEMBERCREATION
REPORTS
NEW?
UPLOADDATA
CLOUDSTATUS
REPORTS
Data Flow Diagram
![Page 41: Cloud computing security from single to multiple](https://reader036.fdocuments.in/reader036/viewer/2022062511/54b7310e4a795925408b45a3/html5/thumbnails/41.jpg)
Activity Diagram
![Page 42: Cloud computing security from single to multiple](https://reader036.fdocuments.in/reader036/viewer/2022062511/54b7310e4a795925408b45a3/html5/thumbnails/42.jpg)
CONCLUSION
• It is clear that although the use of cloud computing has rapidly increased, cloud computing security is still considered the major issue in the cloud computing environment. Customers do not want to lose their private information as a result of malicious insiders in the cloud. In addition, the loss of service availability has caused many problems for a large number of customers recently
![Page 43: Cloud computing security from single to multiple](https://reader036.fdocuments.in/reader036/viewer/2022062511/54b7310e4a795925408b45a3/html5/thumbnails/43.jpg)
CONCLUSION (cont…)
• Furthermore, data intrusion leads to many problems for the users of cloud computing.
• We support the migration to multi-clouds due to its ability to decrease security risks that affect the cloud computing user.
![Page 44: Cloud computing security from single to multiple](https://reader036.fdocuments.in/reader036/viewer/2022062511/54b7310e4a795925408b45a3/html5/thumbnails/44.jpg)
FUTURE ENHANCEMENTS
• For future work, we aim to provide a framework to supply a secure cloud database that will guarantee to prevent security risks facing the cloud computing community.
• This framework will apply multi-clouds and the secret sharing algorithm to reduce the risk of data intrusion and the loss of service availability in the cloud and ensure data integrity.
![Page 45: Cloud computing security from single to multiple](https://reader036.fdocuments.in/reader036/viewer/2022062511/54b7310e4a795925408b45a3/html5/thumbnails/45.jpg)
FUTURE ENHANCEMENTS (cont…)
• In relation to data intrusion and data integrity, assume we want to distribute the data into three different cloud providers, and we apply the secret sharing algorithm on the stored data in the cloud provider.
• An intruder needs to retrieve at least three values to be able to find out the real value that we want to hide from the intruder.
![Page 46: Cloud computing security from single to multiple](https://reader036.fdocuments.in/reader036/viewer/2022062511/54b7310e4a795925408b45a3/html5/thumbnails/46.jpg)
REFERENCES• [1] (NIST), http://www.nist.gov/itl/cloud/. • [2] I. Abraham, G. Chockler, I. Keidar and D. Malkhi, "Byzantine disk paxos: optimal
resilience with Byzantine shared memory", Distributed Computing, 18(5), 2006, pp. 387-408.
• [3] H. Abu-Libdeh, L. Princehouse and H. Weatherspoon, "RACS: a case for cloud storage
diversity", SoCC'10:Proc. 1st ACM symposium on Cloud computing, 2010, pp. 229-240. • [4] D. Agrawal, A. El Abbadi, F. Emekci and A. Metwally, "Database Management as a
Service: Challenges and Opportunities", ICDE'09:Proc.25thIntl. Conf. on Data Engineering, 2009, pp. 1709-1716.
• [5] M.A. AlZain and E. Pardede, "Using Multi Shares for Ensuring Privacy in Database-as-a-
Service", 44th Hawaii Intl. Conf. on System Sciences (HICSS), 2011, pp. 1-9.
![Page 47: Cloud computing security from single to multiple](https://reader036.fdocuments.in/reader036/viewer/2022062511/54b7310e4a795925408b45a3/html5/thumbnails/47.jpg)
Thankyou
By Kiran Kumar