Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 17

SEMINAR

ON
Security Issues in Cloud Computing and its Counter measure
Presented by
Brunda N 1KI17CS014

Under the Guidance of


Dr Manoj Kumar D P BE. M Tech .PhD
Assistant Professor , Dept. of CSE
Kalpataru Institute of Technology
Tiptur -572201

1
Contents
 Abstract
 Cloud Computing: Characteristics, types and Service models.
 Data sharing & its issues in cloud
 Literature Review
 Existing system
 Proposed system
 Design Model
 Implementation and Results
 Conclusion
Abstract
 Cloud computing is developing technique in distributed
computing system.

 High flexibility and portability of cloud have caused a no. of


security concerns.

 Security issue is big threat in cloud computing in terms on


confidentiality and integrity.

 Analyze security issues and measure to resolve issues of security


in cloud computing.
Cloud Computing
 Cloud can store the large volume of data , it is one of major
development in computer history.

 Cloud computing is defined as group of distributed and a parallel


computer system containing interconnected resource.

 The cloud computing provides the resources as per the need of


the consumer.

 Cloud Computing is virtual with infinite possibilities and


storage.
Characteristics of Cloud
On demand self service
Resource pooling
Rapid Elasticity
Broad Network Access
Measured Service
Cloud Types
Private cloud:
--Owned or leased by a single organization.
--No public access.
Public cloud:
--Owned by an organization selling cloud service.
Community cloud:
--Shared by several organization.
Hybrid cloud:
--Composition of two or more clouds.
--Enable data and application portability(Eg. cloud bursting)
Services models
Data Sharing in cloud
Issues in CC-IDC enterprise panel
A. Security of Cloud Data
B. Challenges in cloud storage security
Existing System
 Client data owner can upload the data if he accepts the
agreements with the cloud provider and approve for access.
 Any user should send the request to owner of the data for
downloading the data.
 After user get approval he can download data.
 Disadvantages:
 Single security method cannot solve all security.
 It is clear that security in cloud is major issue, it is due to flexibility and
portable nature of cloud.
 Cloud experience issues such security , performance ,availability and so
on.
Proposed Schemes

 A high Effective Security Model in cloud storage.


 OTP concept is used for cloud security.
 Encryption method and cryptography used for ensuring data
confidentiality.
 Advantages:
 Prevents illegal access to stored data in public cloud.
 Prevent backward security.
 Solve the problem of insider threats
Cloud Security Model
Sequence Diagram for Security
Model
 Operations:
Login
Search
Transmit OTP
Approve OTP
Download File
Send SMS
Decryption
Experimental Results
Software and Hardware requirement
Hardware: Software:
 Process-P-IV  OS-windows XP or above
 Speed-1.1GHz  Programming
 RAM-256MB language-Java/J2EE
 HDD-20GB  Java Version-JDK and above
 KB- std. wind. kb
 Mouse -2 or 3 button
 Monitor-SVGA
Conclusion
Discuss security issues related to cloud and the
countermeasure.

A comparison between the various security measure, its


advantages and disadvantages are discussed.

The mechanism of using the OTP for cloud security proved to


be the best model when compared to other.

Discuss overhead.
Thank You!

You might also like