SlideShare a Scribd company logo
Presented By
Dheeraj Katariya (B80428545),
Sandip Karale (B80428544),
Sanket Bora (B80428513),
Ganesh Shejwal (B80428570).
Guided By
Prof. S. D. Babar.
Cloud Computing Security From
Single to Multi-Cloud
CONTENT
 Problem Statement
 Cloud Computing
 Deployment Model
 Cloud Computing Security
 Multi-clouds
 Architecture
 Hardware Requirements
 Software Requirements
 System Design
 Conclusion
 Futures Scope 4/10/2015Sinhgad Institute of Technology , Lonavala 2
PROBLEM STATEMENT
• Dealing with “single cloud” providers is predicted to become
less popular with customers due to risks of service availability
failure and the possibility of malicious insiders in the single
cloud.
• A movement towards “multi-clouds”, or in other words,
“interclouds” or “cloud-of-clouds” has emerged recently.
4/10/2015Sinhgad Institute of Technology , Lonavala 3
WHAT IS CLOUD
COMPUTING ?
• Cloud computing is a model for enabling ubiquitous(present),
convenient, on-demand network access to a shared pool of
configurable computing resources (e.g., networks, servers,
storage, applications, and services) that can be rapidly
provisioned and released with minimal management effort or
service provider interaction.
• This cloud model is composed of five essential characteristics,
three service models, and four deployment models.
4/10/2015Sinhgad Institute of Technology , Lonavala 4
CLOUD COMPUTING
4/10/2015Sinhgad Institute of Technology , Lonavala 5
DEPLOYMENT MODELS
4/10/2015Sinhgad Institute of Technology , Lonavala 6
DIFFERENCE BETWEEN TRADITIONAL DATA
CENTER AND CLOUD COMPUTING SERVICES
 Traditional Data Services:-
-Proprietary Customize
-More Secure
-Economy of Scale: Organization
-Dedicated
 Cloud Computing Services:-
-Standardized
-Secure
-Economy of Scale: Ecosystem
-Share
4/10/2015Sinhgad Institute of Technology , Lonavala 7
MOVING TO CLOUDS
4/10/2015Sinhgad Institute of Technology , Lonavala 8
• Data is moving to the cloud
• Main reason: costs (pay-per-use model)
EVERYTHING
CONNECTED TO CLOUD
4/10/2015Sinhgad Institute of Technology , Lonavala 9
EXISTING SYSTEM
• Cloud providers should address privacy and security issues as a
matter of high and urgent priority.
• Dealing with “single cloud” providers is becoming less popular
with customers due to potential problems such as service
availability failure and the possibility that there are malicious
insiders in the single cloud.
• Byzantine Protocol
4/10/2015Sinhgad Institute of Technology , Lonavala 10
IF IT FAILS…?
4/10/2015Sinhgad Institute of Technology , Lonavala 11
DISADVANTAGES OF
EXISTING SYSTEM
 Cloud providers should address privacy and security issues as a
matter of high and urgent priority.
 Service availability failure and the possibility that there are
malicious insiders in the single cloud.
4/10/2015Sinhgad Institute of Technology , Lonavala 12
CLOUD SECURITY
4/10/2015Sinhgad Institute of Technology , Lonavala 13
PROPOSED SYSTEM
• This Project focuses on the issues related to the data security
aspect of cloud computing.
• Moving towards “Cloud of clouds “ or multi clouds technique
which improves
Better read performance
Data corruptions'
Reduces Intrusions ….etc
4/10/2015Sinhgad Institute of Technology , Lonavala 14
MULTI CLOUDS
4/10/2015Sinhgad Institute of Technology , Lonavala 15
ADVANTAGES OF
PROPOSED SYSTEM
 DepSky System:Multicloud model
 Shamir’s Secret sharing algorithm
 The user runs custom applications using the service provider’s
resources
 Cloud service providers should ensure the security of their
customers’ data and should be responsible if any security risk
affects their customers’ service infrastructure.
4/10/2015Sinhgad Institute of Technology , Lonavala 16
IMPLEMENTATIONS
MODULES
 Data Integrity
 Data Intrusion
 Service Availability
 DepSKy system model
4/10/2015Sinhgad Institute of Technology , Lonavala 17
DEPSKY ADRESSES THREE
IMPORTANT LIMITATIONS
 Loss of availability
 Loss and corruption of data
 Loss of privacy
4/10/2015Sinhgad Institute of Technology , Lonavala 18
DEPSKY-
ARCHITECTURE
4/10/2015Sinhgad Institute of Technology , Lonavala 19
4/10/2015Sinhgad Institute of Technology , Lonavala 20
DEPSKY data unit and 3 abstraction levels
Data Model
HARDWARE REQUIREMENTS
 Processor : Pentium –III
 Speed : 1.1 GHz
 RAM : 256 MB(min)
 Hard Disk : 20 GB
 Floppy Drive : 1.44 MB
 Key Board : Standard Keyboard
 Monitor : SVGA
4/10/2015Sinhgad Institute of Technology , Lonavala 21
SOFTWARE REQUIREMENTS
 Operating System : Windows XP
 Application Server : Tomcat5.0/6.X
 Front End : HTML, Java, JSP
 Script : JavaScript.
 Server side Script : Java Server Pages.
 Database : MYSQL
4/10/2015Sinhgad Institute of Technology , Lonavala 22
4/10/2015Sinhgad Institute of Technology , Lonavala 23
Data Flow Diagram
4/10/2015Sinhgad Institute of Technology , Lonavala 24
ER Diagram
4/10/2015Sinhgad Institute of Technology , Lonavala 25
Class Diagram
4/10/2015Sinhgad Institute of Technology , Lonavala 26
Use Case Diagram
4/10/2015Sinhgad Institute of Technology , Lonavala 27
Sequence Diagram
4/10/2015Sinhgad Institute of Technology , Lonavala 28
Activity Diagram
DEPLOYMENT DIAGRAM
4/10/2015Sinhgad Institute of Technology , Lonavala 29
CONCLUSION
• It is clear that although the use of cloud computing has rapidly
increased, cloud computing security is still considered the major
issue in the cloud computing environment.
• Customers do not want to lose their private information as a
result of malicious insiders in the cloud. In addition, the loss of
service availability has caused many problems for a large
number of customers recently
4/10/2015Sinhgad Institute of Technology , Lonavala 30
FUTURE ENHANCEMENTS
 For future work, we aim to provide a framework to supply a
secure cloud database that will guarantee to prevent security
risks facing the cloud computing community.
 This framework will apply multi-clouds and the secret sharing
algorithm to reduce the risk of data intrusion and the loss of
service availability in the cloud and ensure data integrity.
4/10/2015Sinhgad Institute of Technology , Lonavala 31
REFERENCES
[1] Yashpalsinh Jadeja, and Kirit Modi, "Cloud Computing - Concepts, Architecture and
Challenges ", 2012 International Conference on Computing, Electronics and Electrical
Technologies [ICCEET] .
[2] Wentao Liu , "Research on Cloud Computing Security Problem and Strategy", 978-1-4577-
1415-3/12/ 2012 IEEE.
[3] M.A. AlZain and E. Pardede, “Cloud Computing Security from single to multicloud", 45th
Hawaii Intl. Conf. on System Sciences (HICSS), 2012.
4/10/2015Sinhgad Institute of Technology , Lonavala 32
THANK YOU…..!!!
4/10/2015Sinhgad Institute of Technology , Lonavala 33

More Related Content

What's hot (20)

PPTX
computer forensics
shivi123456
 
PDF
Initial Response and Forensic Duplication
Jyothishmathi Institute of Technology and Science Karimnagar
 
PPT
Virtualization
Birju Tank
 
PPTX
Cloud Computing Presentation
Vivek Ravindran
 
PPT
Cyber-Security-20211013105857 (1).ppt
ssuser8fdae3
 
PPT
Legal, Ethical and professional issues in Information Security
Gamentortc
 
PPTX
Green cloud computing India
akashlaldas
 
PPT
Virtualization in cloud computing ppt
Mehul Patel
 
PDF
Edge computing
Biddut Hossain
 
PPT
Cloud computing ppt
Yogi Dadhich
 
PPT
Virtualization.ppt
vishal choudhary
 
PPTX
Cloud Encryption
RituparnaNag
 
PDF
Vmware overview
Syed Zeeshan
 
PPTX
Role of data mining in cyber security
Pranto26
 
PPT
Cloud computing ppt
Datta Dharanikota
 
PPTX
Impact of Zero Trust Cyber Security on Healthcare 4.0
Glorium Tech
 
PPT
Chapter 6 Presentation
Amy McMullin
 
PPT
Cloud computing
Aditya Dwivedi
 
PPTX
Green cloud computing
Nalini Mehta
 
PDF
Accelerating Hyper-Converged Enterprise Virtualization using Proxmox and Ceph
Bangladesh Network Operators Group
 
computer forensics
shivi123456
 
Initial Response and Forensic Duplication
Jyothishmathi Institute of Technology and Science Karimnagar
 
Virtualization
Birju Tank
 
Cloud Computing Presentation
Vivek Ravindran
 
Cyber-Security-20211013105857 (1).ppt
ssuser8fdae3
 
Legal, Ethical and professional issues in Information Security
Gamentortc
 
Green cloud computing India
akashlaldas
 
Virtualization in cloud computing ppt
Mehul Patel
 
Edge computing
Biddut Hossain
 
Cloud computing ppt
Yogi Dadhich
 
Virtualization.ppt
vishal choudhary
 
Cloud Encryption
RituparnaNag
 
Vmware overview
Syed Zeeshan
 
Role of data mining in cyber security
Pranto26
 
Cloud computing ppt
Datta Dharanikota
 
Impact of Zero Trust Cyber Security on Healthcare 4.0
Glorium Tech
 
Chapter 6 Presentation
Amy McMullin
 
Cloud computing
Aditya Dwivedi
 
Green cloud computing
Nalini Mehta
 
Accelerating Hyper-Converged Enterprise Virtualization using Proxmox and Ceph
Bangladesh Network Operators Group
 

Viewers also liked (20)

DOC
Cloud Computing Security From Sngle to multi Clouds Full Documentaion
Vamshi Chowdary
 
PDF
Cloud computing security from single to multi clouds
Cholavaram Sai
 
DOC
Identity based distributed provable data possession in multi-cloud storage
Shakas Technologies
 
DOCX
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
Nexgen Technology
 
PPTX
Cloud computing-security-from-single-to-multiple-140211071429-phpapp01
Shivananda Rai
 
PDF
Cloud Computing Use Cases Whitepaper
Jason Reed
 
PPT
Computer Resource Management
anusachu .
 
DOCX
Secure auditing and deduplicating data in cloud
Pvrtechnologies Nellore
 
DOCX
Cloud Storage and Security
Shashank Srivastava
 
PPTX
Google Wave
Danielle Kane
 
PPTX
What Is Google Wave?
Mark Fidelman
 
PPT
Cloud computing for agent based urban transportation system vinayss
Vinay Sirivara
 
PPT
Cloud computing ppt
kusum sharma
 
DOCX
Secure auditing and deduplicating data in cloud
CloudTechnologies
 
PPTX
Cloud computing security from single to multiple
Kiran Kumar
 
PPTX
Data security in cloud computing
Prince Chandu
 
PDF
Cloud computing Basics
Sagar Sane
 
PPT
Seminar on cloud computing by Prashant Gupta
Prashant Gupta
 
PPT
Cloud computing simple ppt
Agarwaljay
 
Cloud Computing Security From Sngle to multi Clouds Full Documentaion
Vamshi Chowdary
 
Cloud computing security from single to multi clouds
Cholavaram Sai
 
Identity based distributed provable data possession in multi-cloud storage
Shakas Technologies
 
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
Nexgen Technology
 
Cloud computing-security-from-single-to-multiple-140211071429-phpapp01
Shivananda Rai
 
Cloud Computing Use Cases Whitepaper
Jason Reed
 
Computer Resource Management
anusachu .
 
Secure auditing and deduplicating data in cloud
Pvrtechnologies Nellore
 
Cloud Storage and Security
Shashank Srivastava
 
Google Wave
Danielle Kane
 
What Is Google Wave?
Mark Fidelman
 
Cloud computing for agent based urban transportation system vinayss
Vinay Sirivara
 
Cloud computing ppt
kusum sharma
 
Secure auditing and deduplicating data in cloud
CloudTechnologies
 
Cloud computing security from single to multiple
Kiran Kumar
 
Data security in cloud computing
Prince Chandu
 
Cloud computing Basics
Sagar Sane
 
Seminar on cloud computing by Prashant Gupta
Prashant Gupta
 
Cloud computing simple ppt
Agarwaljay
 
Ad

Similar to Cloud Computing Security From Single To Multicloud (20)

PDF
Dn35636640
IJERA Editor
 
PDF
Security Threat Solution over Single Cloud To Multi-Cloud Using DepSky Model
IOSR Journals
 
PPTX
Cloud security
Niharika Varshney
 
PDF
Iaetsd cloud computing and security challenges
Iaetsd Iaetsd
 
DOC
Cloud security
Mohamed Shalash
 
PDF
Lecture27 cc-security2
Ankit Gupta
 
PPT
Security Issues of Cloud Computing
Falgun Rathod
 
PPT
Cloud computing security and privacy christian goire
goire
 
PDF
Security Issues in Cloud Computing by rahul abhishek
Er. rahul abhishek
 
PPTX
Security in Cloud Computing
Rohit Buddabathina
 
PPTX
Unit -3.pptx cloud Security unit -3 notes
Ramya Nellutla
 
PPTX
Cloud computing
Sonu Khanna
 
PDF
Analysis of Cloud Computing Security Concerns and Methodologies
IRJET Journal
 
PPT
Cloud computing final show
ahmad abdelhafeez
 
PPTX
Myppt1.pptx on ics subject for 6th semester
MayuraD1
 
PDF
A proposed Solution: Data Availability and Error Correction in Cloud Computing
CSCJournals
 
PPT
Security in Cloud Computing
Ashish Patel
 
PDF
SECURITY ISSUES IN CLOUD COMPUTING
International Journal of Technical Research & Application
 
PDF
Cloud security issues and concerns
Mrinal Baowaly
 
PDF
A study on_security_and_privacy_issues_o
Pradeep Muralidhar
 
Dn35636640
IJERA Editor
 
Security Threat Solution over Single Cloud To Multi-Cloud Using DepSky Model
IOSR Journals
 
Cloud security
Niharika Varshney
 
Iaetsd cloud computing and security challenges
Iaetsd Iaetsd
 
Cloud security
Mohamed Shalash
 
Lecture27 cc-security2
Ankit Gupta
 
Security Issues of Cloud Computing
Falgun Rathod
 
Cloud computing security and privacy christian goire
goire
 
Security Issues in Cloud Computing by rahul abhishek
Er. rahul abhishek
 
Security in Cloud Computing
Rohit Buddabathina
 
Unit -3.pptx cloud Security unit -3 notes
Ramya Nellutla
 
Cloud computing
Sonu Khanna
 
Analysis of Cloud Computing Security Concerns and Methodologies
IRJET Journal
 
Cloud computing final show
ahmad abdelhafeez
 
Myppt1.pptx on ics subject for 6th semester
MayuraD1
 
A proposed Solution: Data Availability and Error Correction in Cloud Computing
CSCJournals
 
Security in Cloud Computing
Ashish Patel
 
Cloud security issues and concerns
Mrinal Baowaly
 
A study on_security_and_privacy_issues_o
Pradeep Muralidhar
 
Ad

Recently uploaded (20)

PPTX
Hashing Introduction , hash functions and techniques
sailajam21
 
PDF
PRIZ Academy - Change Flow Thinking Master Change with Confidence.pdf
PRIZ Guru
 
PPTX
MPMC_Module-2 xxxxxxxxxxxxxxxxxxxxx.pptx
ShivanshVaidya5
 
PDF
IoT - Unit 2 (Internet of Things-Concepts) - PPT.pdf
dipakraut82
 
PDF
BioSensors glucose monitoring, cholestrol
nabeehasahar1
 
PDF
MOBILE AND WEB BASED REMOTE BUSINESS MONITORING SYSTEM
ijait
 
PDF
Book.pdf01_Intro.ppt algorithm for preperation stu used
archu26
 
PDF
A presentation on the Urban Heat Island Effect
studyfor7hrs
 
PPTX
artificial intelligence applications in Geomatics
NawrasShatnawi1
 
PPTX
UNIT DAA PPT cover all topics 2021 regulation
archu26
 
PPTX
Green Building & Energy Conservation ppt
Sagar Sarangi
 
PPTX
EC3551-Transmission lines Demo class .pptx
Mahalakshmiprasannag
 
PDF
UNIT-4-FEEDBACK AMPLIFIERS AND OSCILLATORS (1).pdf
Sridhar191373
 
PPT
inherently safer design for engineering.ppt
DhavalShah616893
 
DOCX
8th International Conference on Electrical Engineering (ELEN 2025)
elelijjournal653
 
PPTX
Thermal runway and thermal stability.pptx
godow93766
 
PPTX
Electron Beam Machining for Production Process
Rajshahi University of Engineering & Technology(RUET), Bangladesh
 
PDF
monopile foundation seminar topic for civil engineering students
Ahina5
 
PPTX
Presentation on Foundation Design for Civil Engineers.pptx
KamalKhan563106
 
PDF
Additional Information in midterm CPE024 (1).pdf
abolisojoy
 
Hashing Introduction , hash functions and techniques
sailajam21
 
PRIZ Academy - Change Flow Thinking Master Change with Confidence.pdf
PRIZ Guru
 
MPMC_Module-2 xxxxxxxxxxxxxxxxxxxxx.pptx
ShivanshVaidya5
 
IoT - Unit 2 (Internet of Things-Concepts) - PPT.pdf
dipakraut82
 
BioSensors glucose monitoring, cholestrol
nabeehasahar1
 
MOBILE AND WEB BASED REMOTE BUSINESS MONITORING SYSTEM
ijait
 
Book.pdf01_Intro.ppt algorithm for preperation stu used
archu26
 
A presentation on the Urban Heat Island Effect
studyfor7hrs
 
artificial intelligence applications in Geomatics
NawrasShatnawi1
 
UNIT DAA PPT cover all topics 2021 regulation
archu26
 
Green Building & Energy Conservation ppt
Sagar Sarangi
 
EC3551-Transmission lines Demo class .pptx
Mahalakshmiprasannag
 
UNIT-4-FEEDBACK AMPLIFIERS AND OSCILLATORS (1).pdf
Sridhar191373
 
inherently safer design for engineering.ppt
DhavalShah616893
 
8th International Conference on Electrical Engineering (ELEN 2025)
elelijjournal653
 
Thermal runway and thermal stability.pptx
godow93766
 
Electron Beam Machining for Production Process
Rajshahi University of Engineering & Technology(RUET), Bangladesh
 
monopile foundation seminar topic for civil engineering students
Ahina5
 
Presentation on Foundation Design for Civil Engineers.pptx
KamalKhan563106
 
Additional Information in midterm CPE024 (1).pdf
abolisojoy
 

Cloud Computing Security From Single To Multicloud

  • 1. Presented By Dheeraj Katariya (B80428545), Sandip Karale (B80428544), Sanket Bora (B80428513), Ganesh Shejwal (B80428570). Guided By Prof. S. D. Babar. Cloud Computing Security From Single to Multi-Cloud
  • 2. CONTENT  Problem Statement  Cloud Computing  Deployment Model  Cloud Computing Security  Multi-clouds  Architecture  Hardware Requirements  Software Requirements  System Design  Conclusion  Futures Scope 4/10/2015Sinhgad Institute of Technology , Lonavala 2
  • 3. PROBLEM STATEMENT • Dealing with “single cloud” providers is predicted to become less popular with customers due to risks of service availability failure and the possibility of malicious insiders in the single cloud. • A movement towards “multi-clouds”, or in other words, “interclouds” or “cloud-of-clouds” has emerged recently. 4/10/2015Sinhgad Institute of Technology , Lonavala 3
  • 4. WHAT IS CLOUD COMPUTING ? • Cloud computing is a model for enabling ubiquitous(present), convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. • This cloud model is composed of five essential characteristics, three service models, and four deployment models. 4/10/2015Sinhgad Institute of Technology , Lonavala 4
  • 5. CLOUD COMPUTING 4/10/2015Sinhgad Institute of Technology , Lonavala 5
  • 6. DEPLOYMENT MODELS 4/10/2015Sinhgad Institute of Technology , Lonavala 6
  • 7. DIFFERENCE BETWEEN TRADITIONAL DATA CENTER AND CLOUD COMPUTING SERVICES  Traditional Data Services:- -Proprietary Customize -More Secure -Economy of Scale: Organization -Dedicated  Cloud Computing Services:- -Standardized -Secure -Economy of Scale: Ecosystem -Share 4/10/2015Sinhgad Institute of Technology , Lonavala 7
  • 8. MOVING TO CLOUDS 4/10/2015Sinhgad Institute of Technology , Lonavala 8 • Data is moving to the cloud • Main reason: costs (pay-per-use model)
  • 9. EVERYTHING CONNECTED TO CLOUD 4/10/2015Sinhgad Institute of Technology , Lonavala 9
  • 10. EXISTING SYSTEM • Cloud providers should address privacy and security issues as a matter of high and urgent priority. • Dealing with “single cloud” providers is becoming less popular with customers due to potential problems such as service availability failure and the possibility that there are malicious insiders in the single cloud. • Byzantine Protocol 4/10/2015Sinhgad Institute of Technology , Lonavala 10
  • 11. IF IT FAILS…? 4/10/2015Sinhgad Institute of Technology , Lonavala 11
  • 12. DISADVANTAGES OF EXISTING SYSTEM  Cloud providers should address privacy and security issues as a matter of high and urgent priority.  Service availability failure and the possibility that there are malicious insiders in the single cloud. 4/10/2015Sinhgad Institute of Technology , Lonavala 12
  • 13. CLOUD SECURITY 4/10/2015Sinhgad Institute of Technology , Lonavala 13
  • 14. PROPOSED SYSTEM • This Project focuses on the issues related to the data security aspect of cloud computing. • Moving towards “Cloud of clouds “ or multi clouds technique which improves Better read performance Data corruptions' Reduces Intrusions ….etc 4/10/2015Sinhgad Institute of Technology , Lonavala 14
  • 15. MULTI CLOUDS 4/10/2015Sinhgad Institute of Technology , Lonavala 15
  • 16. ADVANTAGES OF PROPOSED SYSTEM  DepSky System:Multicloud model  Shamir’s Secret sharing algorithm  The user runs custom applications using the service provider’s resources  Cloud service providers should ensure the security of their customers’ data and should be responsible if any security risk affects their customers’ service infrastructure. 4/10/2015Sinhgad Institute of Technology , Lonavala 16
  • 17. IMPLEMENTATIONS MODULES  Data Integrity  Data Intrusion  Service Availability  DepSKy system model 4/10/2015Sinhgad Institute of Technology , Lonavala 17
  • 18. DEPSKY ADRESSES THREE IMPORTANT LIMITATIONS  Loss of availability  Loss and corruption of data  Loss of privacy 4/10/2015Sinhgad Institute of Technology , Lonavala 18
  • 20. 4/10/2015Sinhgad Institute of Technology , Lonavala 20 DEPSKY data unit and 3 abstraction levels Data Model
  • 21. HARDWARE REQUIREMENTS  Processor : Pentium –III  Speed : 1.1 GHz  RAM : 256 MB(min)  Hard Disk : 20 GB  Floppy Drive : 1.44 MB  Key Board : Standard Keyboard  Monitor : SVGA 4/10/2015Sinhgad Institute of Technology , Lonavala 21
  • 22. SOFTWARE REQUIREMENTS  Operating System : Windows XP  Application Server : Tomcat5.0/6.X  Front End : HTML, Java, JSP  Script : JavaScript.  Server side Script : Java Server Pages.  Database : MYSQL 4/10/2015Sinhgad Institute of Technology , Lonavala 22
  • 23. 4/10/2015Sinhgad Institute of Technology , Lonavala 23 Data Flow Diagram
  • 24. 4/10/2015Sinhgad Institute of Technology , Lonavala 24 ER Diagram
  • 25. 4/10/2015Sinhgad Institute of Technology , Lonavala 25 Class Diagram
  • 26. 4/10/2015Sinhgad Institute of Technology , Lonavala 26 Use Case Diagram
  • 27. 4/10/2015Sinhgad Institute of Technology , Lonavala 27 Sequence Diagram
  • 28. 4/10/2015Sinhgad Institute of Technology , Lonavala 28 Activity Diagram
  • 29. DEPLOYMENT DIAGRAM 4/10/2015Sinhgad Institute of Technology , Lonavala 29
  • 30. CONCLUSION • It is clear that although the use of cloud computing has rapidly increased, cloud computing security is still considered the major issue in the cloud computing environment. • Customers do not want to lose their private information as a result of malicious insiders in the cloud. In addition, the loss of service availability has caused many problems for a large number of customers recently 4/10/2015Sinhgad Institute of Technology , Lonavala 30
  • 31. FUTURE ENHANCEMENTS  For future work, we aim to provide a framework to supply a secure cloud database that will guarantee to prevent security risks facing the cloud computing community.  This framework will apply multi-clouds and the secret sharing algorithm to reduce the risk of data intrusion and the loss of service availability in the cloud and ensure data integrity. 4/10/2015Sinhgad Institute of Technology , Lonavala 31
  • 32. REFERENCES [1] Yashpalsinh Jadeja, and Kirit Modi, "Cloud Computing - Concepts, Architecture and Challenges ", 2012 International Conference on Computing, Electronics and Electrical Technologies [ICCEET] . [2] Wentao Liu , "Research on Cloud Computing Security Problem and Strategy", 978-1-4577- 1415-3/12/ 2012 IEEE. [3] M.A. AlZain and E. Pardede, “Cloud Computing Security from single to multicloud", 45th Hawaii Intl. Conf. on System Sciences (HICSS), 2012. 4/10/2015Sinhgad Institute of Technology , Lonavala 32
  • 33. THANK YOU…..!!! 4/10/2015Sinhgad Institute of Technology , Lonavala 33

Editor's Notes

  • #17: Integrity(unity)
  • #26: Composition(own a strong relation Ex. Duck to Pond ) Aggression (has-a relation )