Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Do you really want to delete this prezi?
Neither you, nor the coeditors you shared it with will be able to recover it again.
Make your likes visible on Facebook?
You can change this under Settings & Account at any time.
Transcript of Cloud Security
From Single to Multiclouds ... small Abstract Guided By: Mrs.MANI MOZHI
CMR Institute Of Technology. Presented by: Puja Kumari
(1CR09CS073 8th SEM ‘B’) Shruti Shivaramakrishnan
(1CR09CS096 8th SEM ‘B’ ) Srividya V.
(1CR09CS103 8th SEM ‘B’ ) Supriya R.
(1CR09CS104 8th SEM ‘B’ ) Introduction Literature Survey Existing System Proposed System Output SRS Modules affecting Proposed System Data Integrity Data Intrusion Service Availability DepSky System Model Advantages of Proposed System Functional Requirements Non-Functional Requirements References Future Enhancements Conclusion Thank You!! Existing System -> The use of cloud computing has increased rapidly
in many organizations -> Ensuring the security of cloud computing is a major factor in the cloud computing environment -> -> Dealing with “single cloud” providers is predicted to become less popular with customers This paper surveys recent research related to single and multi-cloud security and addresses possible solutions -> This work aims to promote the use of multi-clouds Significance It is not limited to Large Organizations Better Protection of private and sensitive information On Demand Self Service Scalability and Flexibility Measured Service Resource Pooling Types of clouds Delivery models  A. Bessani, M. Correia, B. Quaresma, F. André and P. Sousa, "DepSky: dependable and secure storage in a cloud-of-clouds", EuroSys'11:Proc. 6thConf. on Computer systems, 2011, pp. 31-46.  S. Kamara and K. Lauter, "Cryptographic cloudstorage", FC'10: Proc. 14thIntl.Conf. on Financial cryptograpy and data security,2010, pp. 136-149.  K.D. Bowers, A. Juels and A. Oprea, "HAIL: A high-availability and integrity layer for cloud storage", CCS'09: Proc. 16th ACM Conf. on Computer and communications security, 2009, pp.
187-198.  G. Ateniese, R. Burns, R. Curtmola, J. Herring, L.Kissner, Z. Peterson and D. Song, "Provable data possession at untrusted stores", Proc. 14th ACM Conf. on Computer and communications security,2007, pp. 598-609. It mainly consists of a single cloud with its service providers and clientele. -> Since all information is on a single cloud, corruption might lead to loss of data. Furthermore, capacities of a single cloud are bounded and not optimized for a maximized future use. Data security is comparatively lesser -> -> -> The data stored in the cloud may suffer from damage during transition operations to or from the cloud storage provider. When multiple clients use cloud storage or when multiple devices are synchronized by one user, it is difficult to address the data corruption issue. Examples of recent attacks: 2009 Google Docs attack Amazon S3 Data Corruption  K. Birman, G. Chockler and R. van Renesse,"Toward a cloud computing research agenda", SIGACT News, 40, 2009, pp. 68-80.
 C. Cachin, R. Haas and M. Vukolic, "Dependable storage in the Intercloud", Research Report RZ, 3783, 2010.
 C. Cachin, I. Keidar and A. Shraer, "Trusting the cloud", ACM SIGACT News, 40, 2009, pp. 81-86.  (NIST), http://www.nist.gov/itl/cloud/.
 H. Abu-Libdeh, L. Princehouse and H. Weatherspoon, "RACS: a case for cloud storage diversity", SoCC'10:Proc. 1st ACM symposium on
Cloud computing, 2010, pp. 229-240.
Wikipedia. A framework could be provided to supply a secure cloud database that will guarantee to prevent security risks facing the cloud computing community. Application of the secret-sharing algorithm on the stored data in the cloud provider. An intruder needs to retrieve at least three values to be able to find out the real value that we want to hide from the intruder. Enhanced GUI could be provided to emulate the multicloud interfaces,thus encouraging flexibility. The purpose of this work is to survey the recent research on single clouds and multi-clouds to address the security risks and solutions.
We have found that much research has been done to ensure the security of the single cloud and cloud storage whereas multiclouds have received less attention in the area of security.
We support the migration to multi-clouds due to its ability to decrease security risks that affect the cloud computing user. Real Time representation of the multicloud security is displayed. The DepSky system model contains three parts:
Four cloud storage providers Algorithms Used: Depsky A Depsky CA Optimisation 1. Data Integrity
2. Service Availability.
3. The user runs custom applications using the service provider’s resources
4. Cloud service providers should ensure the security of their customers’ data and should be responsible if any security risk affects their customers’ service infrastructure. A major security risk that may occur with a cloud provider, such as the Amazon cloud service, is a hacked password or data intrusion. If someone gains access to an Amazon account password, they will be able to access all of the account’s instances and resources. Thus the stolen password allows the hacker to erase all the information inside any virtual machine instance for the stolen user account, modify it, or even disable its services. Furthermore, there is a possibility for the user’s email (Amazon user name) to be hacked Data authentication which assures that the returned data is the same as the stored data is extremely important. Companies seeking to protect services from such failure need measures such as backups or use of multiple providers. Both Google Mail and Hotmail experienced service downtime recently Another major concern in cloud services is service availability. Agenda Abstract
Conclusion *The entire Multicloud security environment must be simulated.
*The user must be able to access the multiclouds to initiate transactions.
*The Depsky Model ensures the safest trusted clouds are chosen for this purpose.
*The output will be displayed on a real time environment.
Product Requirements Correctness:data Integrity is maintained while ensuring transactions among multiclouds.
Ease of Use:The front end is designed in such a way that it provides an interface which allows the user to interact in an easy manner.
Modularity:The complete product is broken up into many modules and well defined interfaces are developed to explore the benefit of reliability of the product.
Robustness:The multicloud ensures that the users data is maintained in a robust manner.
Process standards:IEEE Standards are used to develop the application which is the standard used by most of the standard software developers all over the world. Organizational Requirements User Requirements *There is a need for user interface through a browser.
*There must be an option for the user to ensure the required transactions to and from the cloud and an option for which cloud.
*An option to view the safest cloud status.
*An internet connection is required to maintain connectivity to the safe cloud.