SlideShare a Scribd company logo
P R E S E N T A T I O N O N
ACHIEVING SECURE, SCALABLE,
AND FINE-GRAINED DATA ACCESS
CONTROL IN CLOUD COMPUTING
P.S.G.V.P.M’s
D.N.Patel C.O.E. Shahada
Department Of Computer & IT
GUIDED BY:
PROF.V.T.PATIL
PRESENTED BY:
GIRASE KIRAN V.
RAJPUT NILESH D.
{COMPUTER SCIENCE}
Contents
INTRODUCTION
LITERATURE SURVEY
ARCHITECTURE
WORKING
MODULE DESCRIPTION
UML DIAGRAMS
ADVANTAGES
DISADVANTAGES
CONCLUSION
REFERENCES
2
DEPARTMENT OF COMPUTER & IT 2014-15
INTRODUCTION
 Cloud computing is a promising computing paradigm which
recently has drawn extensive attention from both academia and
industry. By combining a set of existing and new techniques
from research areas such as Service-Oriented Architectures
(SOA) and virtualization, cloud computing is regarded as such
a computing paradigm in which resources in the computing
infrastructure are provided as services over the Internet.
 The proposed scheme enables the data owner to delegate tasks
of data file re-encryption and user secret key update to cloud
servers without disclosing data contents or user access
privilege information.
3
DEPARTMENT OF COMPUTER & IT
2014-15
DEPARTMENT OF COMPUTER & IT
2014-15
4
 Data security, as it exists in many other applications, is among
these challenges that would raise great concerns from users
when they store sensitive information on cloud servers. These
concerns originate from the fact that cloud servers are usually
operated by commercial providers which are very likely to be
outside of the trusted domain of the users.
 The owner enjoy fine-grained access control of data stored on
cloud servers, a feasible solution would be encrypting data
through certain cryptographic primitive(s), and disclosing
decryption keys only to authorized users.
LITERATURE SURVEY
 This paper addresses this challenging open issue by, on one
hand, defining and enforcing access policies based on data
attributes, and, on the other hand, allowing the data owner to
delegate most of the computation tasks involved in fine-
grained data access control to cloud servers without disclosing
the underlying data contents. We achieve this goal by
exploiting and uniquely combining techniques of attribute-
based encryption (ABE), proxy re-encryption, and lazy re-
encryption. Our proposed scheme also has salient properties of
user access privilege confidentiality and user secret key
accountability. This Paper presents more sensitive data is
shared and stored by third-party sites on the Internet, there will
be a need to encrypt data stored at these sites.
5
DEPARTMENT OF COMPUTER & IT
2014-15
ARCHITECTURE OF CLOUD COMPUTING
DEPARTMENT OF COMPUTER & IT
2014-15
6
WORKING
DEPARTMENT OF COMPUTER & IT
2014-15
7
 we consider a cloud data system consisting of data owners,
data users, Cloud Servers, and a third Party Auditor. A data
owner stores his sensitive data on Cloud Servers.
 Users are issued attributes. To access the remote stored data
files shared by the data owner, users need to download the data
files from the Cloud Servers. For simplicity, we assume that
the only access privilege for users is data file reading.
 Cloud Servers are always online and operated by Cloud
Service Provider (CSP). The Third Party Auditor is also an
always online party which audits every file access event. In
addition, we also assume that the data owner can store data
files besides running his own code on Cloud Servers to
manage his data files.
MODULE DESCRIPTION
DEPARTMENT OF COMPUTER & IT
2014-15
8
 KP-ABE(Key Policy-Attribute Based Encryption):-It is a
public key cryptography primitive for one-to-many
communications. In KP-ABE, data are associated with
attributes for each of which a public key component is
defined. it with the corresponding public key components.
Each user is assigned an access structure which is usually
defined as an access tree over data attributes.
DEPARTMENT OF COMPUTER & IT
2014-15
9
 Setup This algorithm takes as input a security parameter κ and the
attribute universe U = {1, 2, . . .,N} of cardinality N. It defines a
bilinear group G1 of prime order p with a generator g, a bilinear
map e : G1 × G1 → G2 which has the properties of bilinearity,
computability, and non-degeneracy.
It returns the public key PK as well as a system master key MK as
follows:
PK = (Y, T1, T2, . . . , TN)
MK = (y, t1, t2, . . . , tN)
where Ti ∈ G1 and ti ∈ Zp are for attribute i, 1 ≤ i ≤ N, and Y ∈ G2
is another public key component. While PK is publicly known to all
the parties in the system, MK is kept as a secret by the authority
party.
DEPARTMENT OF COMPUTER & IT
2014-15
10
 Encryption:
This algorithm takes a message M, the public key PK, and a set of
attributes I as input. It outputs the cipher text E with the following format:
E = (I, ˜ E, {Ei}i )
where ˜E = MY, Ei = Ti.
 Secret key generation:
This algorithm takes as input an access tree T, the master key MK, and the
public key PK. It outputs a user secret key SK as follows.
SK = {ski}
 Decryption:
This algorithm takes as input the cipher text E encrypted under the attribute
set U, the user’s secret key SK for access tree T, and the public key PK. Finally it
output the message M if and only if U satisfies T.
UML Diagrams 1.USE CASE
DEPARTMENT OF COMPUTER & IT
2014-15
11
2.CLASS DIAGRAM
DEPARTMENT OF COMPUTER & IT
2014-15
12
3.SEQUENCE DIAGRAM
DEPARTMENT OF COMPUTER & IT
2014-15
13
ADVANTAGES
DEPARTMENT OF COMPUTER & IT
2014-15
14
 Low initial capital investment
 Shorter start-up time for new services
 Lower maintenance and operation costs
 Higher utilization through virtualization
 Easier disaster recovery
DISADVANTAGES
DEPARTMENT OF COMPUTER & IT
2014-15
15
• Software update could change security settings,
assigning privileges too low
• Security concerns
 Control of your data/system by third-party
Conclusion
DEPARTMENT OF COMPUTER & IT
2014-15
16
 This paper constructs an ABE based cryptography scheme for
implementing fine-grained access control for cloud computing.
The constructed scheme enables user accoutability, which can be
used to prevent illegal key usages.
 we identify the need for fine-grained access control in cloud
computing.
 we achieve user accountability by inserting user specific
information into users’ attribute private keys.
 we perform a comprehensive security analysis with respect to
data confidentiality and finegrained access control.
DEPARTMENT OF COMPUTER & IT
2014-15
17
REFERENCES
DEPARTMENT OF COMPUTER & IT
2014-15
18
 M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A.
Konwinski,G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M.
Zaharia, “Above the clouds: A berkeley view of cloud
computing,” University of California, Berkeley, Tech. Rep. USB-
EECS-2009-28, Feb 2009.
 Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, “Enabling public
verifiability and data dynamics for storage security in cloud
computing,” in Proc. of ESORICS ’09, 2009.
 L. Youseff, M. Butrico, and D. D. Silva, “Toward a unified
ontology of cloud computing,” in Proc. of GCE’08, 2008.
Any Questions ?
DEPARTMENT OF COMPUTER & IT
2014-15
19

More Related Content

What's hot (17)

PPT
Towards secure and dependable storage service in cloud
sibidlegend
 
DOCX
secure data transfer and deletion from counting bloom filter in cloud computing.
Venkat Projects
 
DOCX
Harnessing the cloud for securely outsourcing large scale systems of linear e...
JPINFOTECH JAYAPRAKASH
 
DOCX
Providing user security guarantees in public infrastructure clouds
Kamal Spring
 
PDF
50620130101004
IAEME Publication
 
PDF
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
PDF
Privacy preserving public auditing for regenerating code based cloud storage
kitechsolutions
 
PDF
Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...
IJCERT JOURNAL
 
PDF
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET Journal
 
PPTX
Privacy preserving public auditing for regenerating-code-based cloud storage
Nagamalleswararao Tadikonda
 
PPTX
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
Bharath Nair
 
PDF
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
IJCERT JOURNAL
 
DOCX
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Pvrtechnologies Nellore
 
DOCX
Privacy preserving public auditing for regenerating-code-based cloud storage
parry prabhu
 
PDF
Privacy preserving public auditing for regenerating-code-based cloud storage
LeMeniz Infotech
 
PDF
Cloud Computing Environment using Secured Access Control Technique
IRJET Journal
 
PDF
Improved Secure Cloud Transmission Protocol
neirew J
 
Towards secure and dependable storage service in cloud
sibidlegend
 
secure data transfer and deletion from counting bloom filter in cloud computing.
Venkat Projects
 
Harnessing the cloud for securely outsourcing large scale systems of linear e...
JPINFOTECH JAYAPRAKASH
 
Providing user security guarantees in public infrastructure clouds
Kamal Spring
 
50620130101004
IAEME Publication
 
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
Privacy preserving public auditing for regenerating code based cloud storage
kitechsolutions
 
Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...
IJCERT JOURNAL
 
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET Journal
 
Privacy preserving public auditing for regenerating-code-based cloud storage
Nagamalleswararao Tadikonda
 
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
Bharath Nair
 
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
IJCERT JOURNAL
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Pvrtechnologies Nellore
 
Privacy preserving public auditing for regenerating-code-based cloud storage
parry prabhu
 
Privacy preserving public auditing for regenerating-code-based cloud storage
LeMeniz Infotech
 
Cloud Computing Environment using Secured Access Control Technique
IRJET Journal
 
Improved Secure Cloud Transmission Protocol
neirew J
 

Similar to Achieving Secure And Scalable Cloud computing (20)

PDF
Achieving Secure, sclable and finegrained Cloud computing report
Kiran Girase
 
PDF
A Secure & Scalable Access Method in Cloud Computing
ijsrd.com
 
PDF
Enhancing Security in Dynamic Public Cloud Data Using Encryption
Association of Scientists, Developers and Faculties
 
PDF
IRJET- Integrity Verification and Attribute based Encryption for Cloud Storage
IRJET Journal
 
PDF
IRJET- Securing Cloud Data Under Key Exposure
IRJET Journal
 
PPTX
Attribute Based Encryption with Privacy Preserving In Clouds
Swathi Rampur
 
PDF
IRJET- Audit Free Cloud Via Deniable Attribute based Encryption
IRJET Journal
 
PDF
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET Journal
 
PDF
Kp3419221926
IJERA Editor
 
PDF
IRJET- A Novel and Secure Approach to Control and Access Data in Cloud St...
IRJET Journal
 
PDF
Ieeepro techno solutions 2011 ieee java project -secure role based data
hemanthbbc
 
PDF
Ieeepro techno solutions 2011 ieee dotnet project -secure role based data
ASAITHAMBIRAJAA
 
PDF
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
Migrant Systems
 
PDF
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
IJECEIAES
 
PDF
Control Cloud Data Access Using Attribute-Based Encryption
paperpublications3
 
PDF
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
Editor IJCATR
 
PDF
Paper2
Vikas Khairnar
 
PDF
Enforcing multi user access policies in cloud computing
IAEME Publication
 
PDF
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
eSAT Journals
 
PDF
Two Aspect Validation Control Frameworks for Online Distributed Services
IRJET Journal
 
Achieving Secure, sclable and finegrained Cloud computing report
Kiran Girase
 
A Secure & Scalable Access Method in Cloud Computing
ijsrd.com
 
Enhancing Security in Dynamic Public Cloud Data Using Encryption
Association of Scientists, Developers and Faculties
 
IRJET- Integrity Verification and Attribute based Encryption for Cloud Storage
IRJET Journal
 
IRJET- Securing Cloud Data Under Key Exposure
IRJET Journal
 
Attribute Based Encryption with Privacy Preserving In Clouds
Swathi Rampur
 
IRJET- Audit Free Cloud Via Deniable Attribute based Encryption
IRJET Journal
 
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET Journal
 
Kp3419221926
IJERA Editor
 
IRJET- A Novel and Secure Approach to Control and Access Data in Cloud St...
IRJET Journal
 
Ieeepro techno solutions 2011 ieee java project -secure role based data
hemanthbbc
 
Ieeepro techno solutions 2011 ieee dotnet project -secure role based data
ASAITHAMBIRAJAA
 
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
Migrant Systems
 
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
IJECEIAES
 
Control Cloud Data Access Using Attribute-Based Encryption
paperpublications3
 
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
Editor IJCATR
 
Enforcing multi user access policies in cloud computing
IAEME Publication
 
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
eSAT Journals
 
Two Aspect Validation Control Frameworks for Online Distributed Services
IRJET Journal
 
Ad

Recently uploaded (20)

PDF
Book.pdf01_Intro.ppt algorithm for preperation stu used
archu26
 
PPTX
Snet+Pro+Service+Software_SNET+Pro+2+Instructions.pptx
jenilsatikuvar1
 
PDF
Introduction to Productivity and Quality
মোঃ ফুরকান উদ্দিন জুয়েল
 
PDF
Ethics and Trustworthy AI in Healthcare – Governing Sensitive Data, Profiling...
AlqualsaDIResearchGr
 
PPTX
265587293-NFPA 101 Life safety code-PPT-1.pptx
chandermwason
 
PPTX
Solar Thermal Energy System Seminar.pptx
Gpc Purapuza
 
PPTX
UNIT DAA PPT cover all topics 2021 regulation
archu26
 
PPTX
Shinkawa Proposal to meet Vibration API670.pptx
AchmadBashori2
 
PDF
Reasons for the succes of MENARD PRESSUREMETER.pdf
majdiamz
 
PDF
Pressure Measurement training for engineers and Technicians
AIESOLUTIONS
 
PPTX
GitOps_Repo_Structure for begeinner(Scaffolindg)
DanialHabibi2
 
PPTX
Introduction to Neural Networks and Perceptron Learning Algorithm.pptx
Kayalvizhi A
 
PDF
6th International Conference on Machine Learning Techniques and Data Science ...
ijistjournal
 
PDF
International Journal of Information Technology Convergence and services (IJI...
ijitcsjournal4
 
PPTX
Element 11. ELECTRICITY safety and hazards
merrandomohandas
 
PDF
Unified_Cloud_Comm_Presentation anil singh ppt
anilsingh298751
 
PDF
Set Relation Function Practice session 24.05.2025.pdf
DrStephenStrange4
 
PPTX
Product Development & DevelopmentLecture02.pptx
zeeshanwazir2
 
PPTX
Thermal runway and thermal stability.pptx
godow93766
 
PDF
MAD Unit - 2 Activity and Fragment Management in Android (Diploma IT)
JappanMavani
 
Book.pdf01_Intro.ppt algorithm for preperation stu used
archu26
 
Snet+Pro+Service+Software_SNET+Pro+2+Instructions.pptx
jenilsatikuvar1
 
Introduction to Productivity and Quality
মোঃ ফুরকান উদ্দিন জুয়েল
 
Ethics and Trustworthy AI in Healthcare – Governing Sensitive Data, Profiling...
AlqualsaDIResearchGr
 
265587293-NFPA 101 Life safety code-PPT-1.pptx
chandermwason
 
Solar Thermal Energy System Seminar.pptx
Gpc Purapuza
 
UNIT DAA PPT cover all topics 2021 regulation
archu26
 
Shinkawa Proposal to meet Vibration API670.pptx
AchmadBashori2
 
Reasons for the succes of MENARD PRESSUREMETER.pdf
majdiamz
 
Pressure Measurement training for engineers and Technicians
AIESOLUTIONS
 
GitOps_Repo_Structure for begeinner(Scaffolindg)
DanialHabibi2
 
Introduction to Neural Networks and Perceptron Learning Algorithm.pptx
Kayalvizhi A
 
6th International Conference on Machine Learning Techniques and Data Science ...
ijistjournal
 
International Journal of Information Technology Convergence and services (IJI...
ijitcsjournal4
 
Element 11. ELECTRICITY safety and hazards
merrandomohandas
 
Unified_Cloud_Comm_Presentation anil singh ppt
anilsingh298751
 
Set Relation Function Practice session 24.05.2025.pdf
DrStephenStrange4
 
Product Development & DevelopmentLecture02.pptx
zeeshanwazir2
 
Thermal runway and thermal stability.pptx
godow93766
 
MAD Unit - 2 Activity and Fragment Management in Android (Diploma IT)
JappanMavani
 
Ad

Achieving Secure And Scalable Cloud computing

  • 1. P R E S E N T A T I O N O N ACHIEVING SECURE, SCALABLE, AND FINE-GRAINED DATA ACCESS CONTROL IN CLOUD COMPUTING P.S.G.V.P.M’s D.N.Patel C.O.E. Shahada Department Of Computer & IT GUIDED BY: PROF.V.T.PATIL PRESENTED BY: GIRASE KIRAN V. RAJPUT NILESH D. {COMPUTER SCIENCE}
  • 2. Contents INTRODUCTION LITERATURE SURVEY ARCHITECTURE WORKING MODULE DESCRIPTION UML DIAGRAMS ADVANTAGES DISADVANTAGES CONCLUSION REFERENCES 2 DEPARTMENT OF COMPUTER & IT 2014-15
  • 3. INTRODUCTION  Cloud computing is a promising computing paradigm which recently has drawn extensive attention from both academia and industry. By combining a set of existing and new techniques from research areas such as Service-Oriented Architectures (SOA) and virtualization, cloud computing is regarded as such a computing paradigm in which resources in the computing infrastructure are provided as services over the Internet.  The proposed scheme enables the data owner to delegate tasks of data file re-encryption and user secret key update to cloud servers without disclosing data contents or user access privilege information. 3 DEPARTMENT OF COMPUTER & IT 2014-15
  • 4. DEPARTMENT OF COMPUTER & IT 2014-15 4  Data security, as it exists in many other applications, is among these challenges that would raise great concerns from users when they store sensitive information on cloud servers. These concerns originate from the fact that cloud servers are usually operated by commercial providers which are very likely to be outside of the trusted domain of the users.  The owner enjoy fine-grained access control of data stored on cloud servers, a feasible solution would be encrypting data through certain cryptographic primitive(s), and disclosing decryption keys only to authorized users.
  • 5. LITERATURE SURVEY  This paper addresses this challenging open issue by, on one hand, defining and enforcing access policies based on data attributes, and, on the other hand, allowing the data owner to delegate most of the computation tasks involved in fine- grained data access control to cloud servers without disclosing the underlying data contents. We achieve this goal by exploiting and uniquely combining techniques of attribute- based encryption (ABE), proxy re-encryption, and lazy re- encryption. Our proposed scheme also has salient properties of user access privilege confidentiality and user secret key accountability. This Paper presents more sensitive data is shared and stored by third-party sites on the Internet, there will be a need to encrypt data stored at these sites. 5 DEPARTMENT OF COMPUTER & IT 2014-15
  • 6. ARCHITECTURE OF CLOUD COMPUTING DEPARTMENT OF COMPUTER & IT 2014-15 6
  • 7. WORKING DEPARTMENT OF COMPUTER & IT 2014-15 7  we consider a cloud data system consisting of data owners, data users, Cloud Servers, and a third Party Auditor. A data owner stores his sensitive data on Cloud Servers.  Users are issued attributes. To access the remote stored data files shared by the data owner, users need to download the data files from the Cloud Servers. For simplicity, we assume that the only access privilege for users is data file reading.  Cloud Servers are always online and operated by Cloud Service Provider (CSP). The Third Party Auditor is also an always online party which audits every file access event. In addition, we also assume that the data owner can store data files besides running his own code on Cloud Servers to manage his data files.
  • 8. MODULE DESCRIPTION DEPARTMENT OF COMPUTER & IT 2014-15 8  KP-ABE(Key Policy-Attribute Based Encryption):-It is a public key cryptography primitive for one-to-many communications. In KP-ABE, data are associated with attributes for each of which a public key component is defined. it with the corresponding public key components. Each user is assigned an access structure which is usually defined as an access tree over data attributes.
  • 9. DEPARTMENT OF COMPUTER & IT 2014-15 9  Setup This algorithm takes as input a security parameter κ and the attribute universe U = {1, 2, . . .,N} of cardinality N. It defines a bilinear group G1 of prime order p with a generator g, a bilinear map e : G1 × G1 → G2 which has the properties of bilinearity, computability, and non-degeneracy. It returns the public key PK as well as a system master key MK as follows: PK = (Y, T1, T2, . . . , TN) MK = (y, t1, t2, . . . , tN) where Ti ∈ G1 and ti ∈ Zp are for attribute i, 1 ≤ i ≤ N, and Y ∈ G2 is another public key component. While PK is publicly known to all the parties in the system, MK is kept as a secret by the authority party.
  • 10. DEPARTMENT OF COMPUTER & IT 2014-15 10  Encryption: This algorithm takes a message M, the public key PK, and a set of attributes I as input. It outputs the cipher text E with the following format: E = (I, ˜ E, {Ei}i ) where ˜E = MY, Ei = Ti.  Secret key generation: This algorithm takes as input an access tree T, the master key MK, and the public key PK. It outputs a user secret key SK as follows. SK = {ski}  Decryption: This algorithm takes as input the cipher text E encrypted under the attribute set U, the user’s secret key SK for access tree T, and the public key PK. Finally it output the message M if and only if U satisfies T.
  • 11. UML Diagrams 1.USE CASE DEPARTMENT OF COMPUTER & IT 2014-15 11
  • 12. 2.CLASS DIAGRAM DEPARTMENT OF COMPUTER & IT 2014-15 12
  • 13. 3.SEQUENCE DIAGRAM DEPARTMENT OF COMPUTER & IT 2014-15 13
  • 14. ADVANTAGES DEPARTMENT OF COMPUTER & IT 2014-15 14  Low initial capital investment  Shorter start-up time for new services  Lower maintenance and operation costs  Higher utilization through virtualization  Easier disaster recovery
  • 15. DISADVANTAGES DEPARTMENT OF COMPUTER & IT 2014-15 15 • Software update could change security settings, assigning privileges too low • Security concerns  Control of your data/system by third-party
  • 16. Conclusion DEPARTMENT OF COMPUTER & IT 2014-15 16  This paper constructs an ABE based cryptography scheme for implementing fine-grained access control for cloud computing. The constructed scheme enables user accoutability, which can be used to prevent illegal key usages.  we identify the need for fine-grained access control in cloud computing.  we achieve user accountability by inserting user specific information into users’ attribute private keys.  we perform a comprehensive security analysis with respect to data confidentiality and finegrained access control.
  • 17. DEPARTMENT OF COMPUTER & IT 2014-15 17
  • 18. REFERENCES DEPARTMENT OF COMPUTER & IT 2014-15 18  M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski,G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “Above the clouds: A berkeley view of cloud computing,” University of California, Berkeley, Tech. Rep. USB- EECS-2009-28, Feb 2009.  Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, “Enabling public verifiability and data dynamics for storage security in cloud computing,” in Proc. of ESORICS ’09, 2009.  L. Youseff, M. Butrico, and D. D. Silva, “Toward a unified ontology of cloud computing,” in Proc. of GCE’08, 2008.
  • 19. Any Questions ? DEPARTMENT OF COMPUTER & IT 2014-15 19

Editor's Notes