Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

Copy of Security in the Cloud

No description
by

ne mo

on 5 July 2015

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Copy of Security in the Cloud

Cloud Computing
security

Cloud Computing Overview.
Security Issues In Cloud Computing.
Encryption.
Search over Encrypted data in Cloud Computing.
Algorithms Implementation.

Outline
Cloud Computing
refers to saving of user’s data to an offsite storage system that is maintained by a third party.
Cloud Security

refers to a set of policies, technologies, and controls deployed to protect data, applications, and the associated infrastructure of cloud computing.
transformation of a cloud service customer's data into cipher text.

Supervisor
Dr. Osama Ouda
Service Models & Deployment Models
Encryption
Problem
how to search over
this encrypted data ??
Solution
Search with Secure Inner Product Evaluation Algorithm.
Search with Efficient Tree-Based Search Algorithm.
Inner-product algorithm
Suppose we have more than one file (f1,f2,f3) for each file making vector(0,1) stored with it.
So that we have two vectors:
(one for file and the other for dictionary)
When search; forming the vector for the dictionary, Matching between vector of file and vector of dictionary
(Index)
.
When the matching achieved…..Retrieve that file.

Efficient Tree-Based
Search Algorithm
How To Build Index??
Suppose we have 3 text files containing words,
Select all words from all text files and then collect words without redundant in single text file.

Matching Process

From the name of the search algorithm (Dot Produt)
Matching process is required to product vector's file by vector's text search

implementation
Encryption form
Encryption form ...
Inner_product form
Inner_product form ...
Inner_product form ...
Implementation ...
Implementation
Implementation
Searching over Encrypted data ...
Exact Keyword Search.
Fuzzy Keyword Search.

Exact Keyword Search vs. Fuzzy Keyword Search.
Privacy-Preserving Multi-keyword Ranked Search.

Secure Index.
Index Structure.
by keywords.
per document.
Similarity-Based Ranking.
implementation
Binary search tree.
Characteristics.
Operations(insertion -search-delete).
Inner-product based Algorithm
Tree-Based
Search Algorithm
More flexible
Can updatefiles.
More efficient
Time Complexity
Average case: O(logn)
Worst case: O(n)
Size of file is constant.
Can not update files.

Time Complexity
O(n)
As: n for multiplications
n+1 for additions
O(n)+O(n)=O(n)
comparison
Cloud Security ...
1/data breaches
2/account or service traffic hijacking
3/denial of service
solution
1/strong encryption system
2/effictive key management
3/access control
Full transcript