SlideShare uma empresa Scribd logo
1 de 40
Cloudsweeper
Safeguarding your cloud based storage
By
Harini.A
CSE-Final Year
SMVEC
@harinianand
AGENDA
Introduction to cloud computing
Cloud storage
Examples
Concern for cloud storage
Talk of the town
Cloud sweeper
Email Tools
Authorization 2.0 Protocol
Q.R Code
Conclusion
INTRODUCTION TO CLOUD COMPUTING
Cloud computing is actually a resource delivery and usage
model.
Network of providing resource is called cloud.
It is an internet based computing where virtual shared
servers provide
Software,Infrastructure,Platform,Devices and other
resources and hosting to
customers on “pay as you use basis”.
CLOUD STORAGE
Cloud storage is a model of networked enterprise storage
where data is stored not only in the user's computer, but in
virtualized pools of storage which are generally hosted by third
parties.
Hosting companies operate large data centers, and people who
require their data to be hosted buy or lease storage capacity
from them.
Cloud storage services may be ccaccessed through a web service
Application programming interface or any web based user
interface
WORKING OF CLOUD STORAGE
WORKING OF CLOUD STORAGE
 It stores Web e-mail messages or digital pictures or any other
digital data.
 The facilities that house cloud storage systems are called data
centers.
 A cloud storage system needs just one data server connected to
the Internet.
 A client (e.g., a computer user subscribing to a cloud storage
service)sends copies of files over the Internet to the
dataserver, which then records the information.
CONTD…
Cloud storage systems generally -rely on hundreds of data
servers because computers occasionally require
maintenance or repair, it's important to store the same
information on multiple machines.
This is called redundancy.
Most systems store the same data on servers that use
different power supplies.
They use cloud storage as a way to create backups of data.
If something happens to the client's computer
system, the data survives off-site.
EXAMPLES
Google Docs allows users to upload documents,
spreadsheets and presentations to Google's data servers.
Web e-mail providers like Gmail, Hotmail and Yahoo!
Mail store e-mail messages on their own servers.
Sites like Flickr and Picasa host millions of photographs
YouTube hosts millions of user-uploaded video file.
Social networking sites like Facebook and MySpace allow
members to post pictures and other content.
Services like Xdrive, MediaMax and Strongspace offer
storage space for any kind of digital data.
CONCERNS ABOUT CLOUD STORAGE
The two biggest concerns about cloud storage is security.
To secure data, most systems use a combination of
techniques, including:
Encryption, which means they use a complex algorithm to
encode information. To decode the encrypted files, a user
needs the encryption key.
Authentication processes, which require to create a user
name and password.
Authorization practices -- the client lists the people who are
authorized to access information stored on the cloud system.
Many corporations have multiple levels of authorization.
MY GMAIL IS PRICED $23…FOR A HACKER
To safeguard our personal data from falling into wrong hands a
service called CLOUDSWEEPER was launched.
This is done by putting price tag on our Gmail account.
This is a research project conducted by Peter Snyder and Chris
Kanich at the University of ILLINOIS at Chicago published in
THE HINDU Newspaper on JULY 4th 2013.
Cloudsweeper aims to help users understand the risks they face
Online and how it works at a systemic level.
OAUTH 2
OAuth is an open standard for authorization.
OAuth provides a method for clients
to access Server resources on behalf
of a resource owner.
It also provides a process for end-users to authorize third-party
access to their server resources without sharing their credentials (a
username and password pair), using user-agent redirections.
It allows the User, to grant access to your private resources on one
site to another site .
OpenID is all about using a single identity to sign into many sites.
OAuth is about giving access to your stuff without sharing your
identity (secret data).
HISTORY OF OAUTH2
OAuth began in November 2006 when Blaine Cook was
developing the Twitter OpenID implementation.
The OAuth 1.0 Protocol was published in April 2010, an
informational request for Comments.
Since August 31, 2010, all third party Twitter applications have
been required to use OAuth.
The OAuth 2.0 Framework published standards to
track Requests for Comments, in October 2012.
WORKING OF OAUTH 2.0
PROTOCOL EXAMPLE
Request Token URL:
https://photos.example.net/request_token, using HTTP POST
User Authorization URL:
http://photos.example.net/authorize, using HTTP GET
Access Token URL:
https://photos.example.net/access_token, using HTTP POST
Photo (Protected Resource) URL:
http://photos.example.net/photo with required
parameter file and optional parameter size
Consumer Key :dpf43f3p2l4k3l03
Consumer Secret :kd94hf93k423kf44
Protected Resource
All together, the Consumer request for the photo is:
http://photos.example.net/photos?file=vacation.jpg&size=original
Authorization: OAuth realm="http://photos.example.net/",
oauth_consumer_key="dpf43f3p2l4k3l03",
oauth_token ="nnch734d00sl2jdk",
oauth_signature_method="HMAC-SHA1",
oauth_signature ="tR3%2BTy81lMeYAr%2FFid0kMTYa%2FWM%3D",
oauth_timestamp="1191242096",
ACCOUNT THEFT AUDITS
The account theft audit places a hypothetical worth for accessing a
Gmail account based on information gleaned from cybercriminal
marketplaces.
If you were to lose your phone, leave your computer logged in,
or have your account hacked, the possible harm might extend far
further than you expect.
Account theft audit tool can help you get a handle on just how
Much a cybercriminal could access were they to take over your
Email account.
This tool will scan your account and give you a visualization of
how many of your accounts hackers could take over if they got
access to your email account.
STEPS OF ACCOUNT THEFT AUDITS
1.Temporary Limited Access
Cloudsweeper uses OAuth2 to connect to your
GMail account, so that they never have to ask for your
Google credentials. OAuth means you stay in control of
your account, can revoke access anytime you'd like, and
your username and password stay secure and private.
2. Scanning for Risks
This system programtically checks your email
archives, looking for the kinds of things that hackers
are interested in. This includes things like access to
other accounts, account credentials, and other things
attackers are interested in stealing. Humans never see
your data, and statistics about your account are only
kept if you opt in.
3. Threat Report
Once the scan is complete, the audit will show
what was found, and what other accounts you use an
attacker could gain access to through your GMail
account.
Recent underground prices for these accounts
will let you know a rough estimate of what your email
account is worth to these attackers.
STEPS FOR CLEAR TEXT PASSWORD
AUDITS
1. Temporary Gmail Access
Cloudsweeper uses OAuth2 to connect to your
GMail account, so that you never have to share your
GMail credentials. OAuth means you stay in control of
your account, can revoke access anytime you'd like, and
your username and password stay secure and private.
2. Scanning for Passwords
Our system programtically looks through your
email to find plain text passwords in the same way a
hacker or spy might. You'll then be presented with a list
of found passwords that you can, optionally, redact
from your account or encrypt.
3. Encrypt or Redact
 If you choose, they will remove or encrypt any of
the passwords found in your account. If you choose to
encrypt the found passwords, they use strong
encryption to secure these credentials, and then
present you with a key and a QR code you can use to
later decrypt this information.
 Only you will have the key, so only you will be
able to access these credentials in the future, keeping
your account safer from hackers, spys and malicious
users.
How Does IT WORK?
 Considering the intersection between security and long-term
cloud-based data storage the tool has been developed to help users
identify and redact private information.
 You can log in with the following information:
Username: chrisk
Password: hunter3
 By using this tool, you can preserve the useful but non-sensitive
text of an email like that pictured above while removing the private
information. After using this tool, the same email will still be in your
archive
 Username: chrisk
Password: [wImYDaM5DBJZqgLrSYekjQ==
ZmwDVbzid7+7LQ6R3uDj+xPnDt1nuxEFDJTxhKPh5T0=]
Q.R CODE
Quick Response Code is the trademark for a
type of matrix barcode(or two-dimensional
barcode) .
First designed for the automotive industry in Japan;
a barcode is an optically machine-readable label that is
attached to an item and that records information related
to that item
The information encoded by a QR code may be made up
of four standardized types of data namely numeric,
alphanumeric, byte / binary, kanji (漢字).
DECRYPT MESSAGES
DECRYPT THE MESSAGE
REVIEW PERMISSIONS
REVOKE ACCESS
Safeguard your cloud storage with Cloudsweeper
Safeguard your cloud storage with Cloudsweeper

Mais conteúdo relacionado

Mais procurados

Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...Pvrtechnologies Nellore
 
Attribute-Based Data Sharing
Attribute-Based Data SharingAttribute-Based Data Sharing
Attribute-Based Data SharingIJERA Editor
 
Keystroke with Data Leakage Detection for Secure Email Authentication
Keystroke with Data Leakage Detection for Secure Email AuthenticationKeystroke with Data Leakage Detection for Secure Email Authentication
Keystroke with Data Leakage Detection for Secure Email AuthenticationYogeshIJTSRD
 
4.authentication and key agreement based on anonymous identity for peer to-pe...
4.authentication and key agreement based on anonymous identity for peer to-pe...4.authentication and key agreement based on anonymous identity for peer to-pe...
4.authentication and key agreement based on anonymous identity for peer to-pe...Venkat Projects
 
Organize Cloud Data Access Privilege and Anonymity with Fully Nameless Attrib...
Organize Cloud Data Access Privilege and Anonymity with Fully Nameless Attrib...Organize Cloud Data Access Privilege and Anonymity with Fully Nameless Attrib...
Organize Cloud Data Access Privilege and Anonymity with Fully Nameless Attrib...rahulmonikasharma
 
Cloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge PrivacyCloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge PrivacyIJERA Editor
 
IRJET- Key Exchange Privacy Preserving Technique in Cloud Computing
IRJET-  	  Key Exchange Privacy Preserving Technique in Cloud ComputingIRJET-  	  Key Exchange Privacy Preserving Technique in Cloud Computing
IRJET- Key Exchange Privacy Preserving Technique in Cloud ComputingIRJET Journal
 
Flaws in Oauth 2.0 Can Oauth be used as a Security Server
Flaws in Oauth 2.0 Can Oauth be used as a Security ServerFlaws in Oauth 2.0 Can Oauth be used as a Security Server
Flaws in Oauth 2.0 Can Oauth be used as a Security Serverijtsrd
 
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...IJCERT JOURNAL
 
Cloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditabilityCloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditabilityIGEEKS TECHNOLOGIES
 
Integrity Privacy to Public Auditing for Shared Data in Cloud Computing
Integrity Privacy to Public Auditing for Shared Data in Cloud ComputingIntegrity Privacy to Public Auditing for Shared Data in Cloud Computing
Integrity Privacy to Public Auditing for Shared Data in Cloud ComputingIJERA Editor
 
Appraisal of the Most Prominent Attacks due to Vulnerabilities in Cloud Compu...
Appraisal of the Most Prominent Attacks due to Vulnerabilities in Cloud Compu...Appraisal of the Most Prominent Attacks due to Vulnerabilities in Cloud Compu...
Appraisal of the Most Prominent Attacks due to Vulnerabilities in Cloud Compu...Salam Shah
 
Secure Data Sharing in Cloud through Limiting Trust in Third Party/Server
Secure Data Sharing in Cloud through Limiting Trust in Third Party/ServerSecure Data Sharing in Cloud through Limiting Trust in Third Party/Server
Secure Data Sharing in Cloud through Limiting Trust in Third Party/ServerIRJET Journal
 
Cam cloud assisted privacy preserving mobile health monitoring
Cam cloud assisted privacy preserving mobile health monitoringCam cloud assisted privacy preserving mobile health monitoring
Cam cloud assisted privacy preserving mobile health monitoringIEEEFINALYEARPROJECTS
 
Control cloud data access privilege and anonymity with fully anonymous attrib...
Control cloud data access privilege and anonymity with fully anonymous attrib...Control cloud data access privilege and anonymity with fully anonymous attrib...
Control cloud data access privilege and anonymity with fully anonymous attrib...Pvrtechnologies Nellore
 
Fog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
Fog Computing:The Justifying Insider Data Stealing Attacks in the CloudFog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
Fog Computing:The Justifying Insider Data Stealing Attacks in the CloudIJSRD
 
Cloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditabilityCloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditabilityShakas Technologies
 

Mais procurados (20)

Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...
 
Attribute-Based Data Sharing
Attribute-Based Data SharingAttribute-Based Data Sharing
Attribute-Based Data Sharing
 
Keystroke with Data Leakage Detection for Secure Email Authentication
Keystroke with Data Leakage Detection for Secure Email AuthenticationKeystroke with Data Leakage Detection for Secure Email Authentication
Keystroke with Data Leakage Detection for Secure Email Authentication
 
4.authentication and key agreement based on anonymous identity for peer to-pe...
4.authentication and key agreement based on anonymous identity for peer to-pe...4.authentication and key agreement based on anonymous identity for peer to-pe...
4.authentication and key agreement based on anonymous identity for peer to-pe...
 
Organize Cloud Data Access Privilege and Anonymity with Fully Nameless Attrib...
Organize Cloud Data Access Privilege and Anonymity with Fully Nameless Attrib...Organize Cloud Data Access Privilege and Anonymity with Fully Nameless Attrib...
Organize Cloud Data Access Privilege and Anonymity with Fully Nameless Attrib...
 
Cloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge PrivacyCloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge Privacy
 
IRJET- Key Exchange Privacy Preserving Technique in Cloud Computing
IRJET-  	  Key Exchange Privacy Preserving Technique in Cloud ComputingIRJET-  	  Key Exchange Privacy Preserving Technique in Cloud Computing
IRJET- Key Exchange Privacy Preserving Technique in Cloud Computing
 
J018145862
J018145862J018145862
J018145862
 
Flaws in Oauth 2.0 Can Oauth be used as a Security Server
Flaws in Oauth 2.0 Can Oauth be used as a Security ServerFlaws in Oauth 2.0 Can Oauth be used as a Security Server
Flaws in Oauth 2.0 Can Oauth be used as a Security Server
 
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...
 
Cloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditabilityCloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditability
 
Integrity Privacy to Public Auditing for Shared Data in Cloud Computing
Integrity Privacy to Public Auditing for Shared Data in Cloud ComputingIntegrity Privacy to Public Auditing for Shared Data in Cloud Computing
Integrity Privacy to Public Auditing for Shared Data in Cloud Computing
 
Appraisal of the Most Prominent Attacks due to Vulnerabilities in Cloud Compu...
Appraisal of the Most Prominent Attacks due to Vulnerabilities in Cloud Compu...Appraisal of the Most Prominent Attacks due to Vulnerabilities in Cloud Compu...
Appraisal of the Most Prominent Attacks due to Vulnerabilities in Cloud Compu...
 
Security Basics
Security BasicsSecurity Basics
Security Basics
 
Secure Data Sharing in Cloud through Limiting Trust in Third Party/Server
Secure Data Sharing in Cloud through Limiting Trust in Third Party/ServerSecure Data Sharing in Cloud through Limiting Trust in Third Party/Server
Secure Data Sharing in Cloud through Limiting Trust in Third Party/Server
 
Cam cloud assisted privacy preserving mobile health monitoring
Cam cloud assisted privacy preserving mobile health monitoringCam cloud assisted privacy preserving mobile health monitoring
Cam cloud assisted privacy preserving mobile health monitoring
 
Enhancing Security in Dynamic Public Cloud Data Using Encryption
Enhancing Security in Dynamic Public Cloud Data Using EncryptionEnhancing Security in Dynamic Public Cloud Data Using Encryption
Enhancing Security in Dynamic Public Cloud Data Using Encryption
 
Control cloud data access privilege and anonymity with fully anonymous attrib...
Control cloud data access privilege and anonymity with fully anonymous attrib...Control cloud data access privilege and anonymity with fully anonymous attrib...
Control cloud data access privilege and anonymity with fully anonymous attrib...
 
Fog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
Fog Computing:The Justifying Insider Data Stealing Attacks in the CloudFog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
Fog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
 
Cloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditabilityCloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditability
 

Semelhante a Safeguard your cloud storage with Cloudsweeper

Carrying out safe exploration short of the actual data of codes and trapdoors
Carrying out safe exploration short of the actual data of codes and trapdoorsCarrying out safe exploration short of the actual data of codes and trapdoors
Carrying out safe exploration short of the actual data of codes and trapdoorsIaetsd Iaetsd
 
Chapter 2 System Security.pptx
Chapter 2 System Security.pptxChapter 2 System Security.pptx
Chapter 2 System Security.pptxRushikeshChikane2
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocolIaetsd Iaetsd
 
Web 20 Security - Vordel
Web 20 Security - VordelWeb 20 Security - Vordel
Web 20 Security - Vordelguest2a1135
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudIJERA Editor
 
attacks-oauth-secure-oauth-implementation-33644.pdf
attacks-oauth-secure-oauth-implementation-33644.pdfattacks-oauth-secure-oauth-implementation-33644.pdf
attacks-oauth-secure-oauth-implementation-33644.pdfMohitRampal5
 
Achieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing reportAchieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing reportKiran Girase
 
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...Editor IJMTER
 
Secure File Sharing In Cloud Using Encryption with Digital Signature
Secure File Sharing In Cloud Using Encryption with Digital  Signature Secure File Sharing In Cloud Using Encryption with Digital  Signature
Secure File Sharing In Cloud Using Encryption with Digital Signature IJMER
 
A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...
A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...
A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...Editor IJCATR
 
An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...IJECEIAES
 
IJSRED-V2I5P16
IJSRED-V2I5P16IJSRED-V2I5P16
IJSRED-V2I5P16IJSRED
 
A novel way of integrating voice recognition and one time passwords to preven...
A novel way of integrating voice recognition and one time passwords to preven...A novel way of integrating voice recognition and one time passwords to preven...
A novel way of integrating voice recognition and one time passwords to preven...ijdpsjournal
 
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...ijtsrd
 
O auth2 with angular js
O auth2 with angular jsO auth2 with angular js
O auth2 with angular jsBixlabs
 
TM112 Meeting10-Dangerous Data.pptx
TM112 Meeting10-Dangerous Data.pptxTM112 Meeting10-Dangerous Data.pptx
TM112 Meeting10-Dangerous Data.pptxMohammedYusuf609377
 
IRJET - Providing High Securtiy for Encrypted Data in Cloud
IRJET -  	  Providing High Securtiy for Encrypted Data in CloudIRJET -  	  Providing High Securtiy for Encrypted Data in Cloud
IRJET - Providing High Securtiy for Encrypted Data in CloudIRJET Journal
 
Cloud_security.pptx
Cloud_security.pptxCloud_security.pptx
Cloud_security.pptxSofiyaKhan49
 
KeyNote - Intro to Azure
KeyNote - Intro to AzureKeyNote - Intro to Azure
KeyNote - Intro to AzureJasjit Chopra
 

Semelhante a Safeguard your cloud storage with Cloudsweeper (20)

Carrying out safe exploration short of the actual data of codes and trapdoors
Carrying out safe exploration short of the actual data of codes and trapdoorsCarrying out safe exploration short of the actual data of codes and trapdoors
Carrying out safe exploration short of the actual data of codes and trapdoors
 
Chapter 2 System Security.pptx
Chapter 2 System Security.pptxChapter 2 System Security.pptx
Chapter 2 System Security.pptx
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocol
 
Web 20 Security - Vordel
Web 20 Security - VordelWeb 20 Security - Vordel
Web 20 Security - Vordel
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
 
attacks-oauth-secure-oauth-implementation-33644.pdf
attacks-oauth-secure-oauth-implementation-33644.pdfattacks-oauth-secure-oauth-implementation-33644.pdf
attacks-oauth-secure-oauth-implementation-33644.pdf
 
Achieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing reportAchieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing report
 
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
 
Secure File Sharing In Cloud Using Encryption with Digital Signature
Secure File Sharing In Cloud Using Encryption with Digital  Signature Secure File Sharing In Cloud Using Encryption with Digital  Signature
Secure File Sharing In Cloud Using Encryption with Digital Signature
 
A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...
A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...
A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...
 
An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...
 
IJSRED-V2I5P16
IJSRED-V2I5P16IJSRED-V2I5P16
IJSRED-V2I5P16
 
A novel way of integrating voice recognition and one time passwords to preven...
A novel way of integrating voice recognition and one time passwords to preven...A novel way of integrating voice recognition and one time passwords to preven...
A novel way of integrating voice recognition and one time passwords to preven...
 
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
 
O auth2 with angular js
O auth2 with angular jsO auth2 with angular js
O auth2 with angular js
 
TM112 Meeting10-Dangerous Data.pptx
TM112 Meeting10-Dangerous Data.pptxTM112 Meeting10-Dangerous Data.pptx
TM112 Meeting10-Dangerous Data.pptx
 
IRJET - Providing High Securtiy for Encrypted Data in Cloud
IRJET -  	  Providing High Securtiy for Encrypted Data in CloudIRJET -  	  Providing High Securtiy for Encrypted Data in Cloud
IRJET - Providing High Securtiy for Encrypted Data in Cloud
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud_security.pptx
Cloud_security.pptxCloud_security.pptx
Cloud_security.pptx
 
KeyNote - Intro to Azure
KeyNote - Intro to AzureKeyNote - Intro to Azure
KeyNote - Intro to Azure
 

Último

AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxPoojaSen20
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 

Último (20)

AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 

Safeguard your cloud storage with Cloudsweeper

  • 1. Cloudsweeper Safeguarding your cloud based storage By Harini.A CSE-Final Year SMVEC @harinianand
  • 2. AGENDA Introduction to cloud computing Cloud storage Examples Concern for cloud storage Talk of the town Cloud sweeper Email Tools Authorization 2.0 Protocol Q.R Code Conclusion
  • 3. INTRODUCTION TO CLOUD COMPUTING Cloud computing is actually a resource delivery and usage model. Network of providing resource is called cloud. It is an internet based computing where virtual shared servers provide Software,Infrastructure,Platform,Devices and other resources and hosting to customers on “pay as you use basis”.
  • 4. CLOUD STORAGE Cloud storage is a model of networked enterprise storage where data is stored not only in the user's computer, but in virtualized pools of storage which are generally hosted by third parties. Hosting companies operate large data centers, and people who require their data to be hosted buy or lease storage capacity from them. Cloud storage services may be ccaccessed through a web service Application programming interface or any web based user interface
  • 6. WORKING OF CLOUD STORAGE  It stores Web e-mail messages or digital pictures or any other digital data.  The facilities that house cloud storage systems are called data centers.  A cloud storage system needs just one data server connected to the Internet.  A client (e.g., a computer user subscribing to a cloud storage service)sends copies of files over the Internet to the dataserver, which then records the information.
  • 7. CONTD… Cloud storage systems generally -rely on hundreds of data servers because computers occasionally require maintenance or repair, it's important to store the same information on multiple machines. This is called redundancy. Most systems store the same data on servers that use different power supplies. They use cloud storage as a way to create backups of data. If something happens to the client's computer system, the data survives off-site.
  • 8. EXAMPLES Google Docs allows users to upload documents, spreadsheets and presentations to Google's data servers. Web e-mail providers like Gmail, Hotmail and Yahoo! Mail store e-mail messages on their own servers. Sites like Flickr and Picasa host millions of photographs YouTube hosts millions of user-uploaded video file. Social networking sites like Facebook and MySpace allow members to post pictures and other content. Services like Xdrive, MediaMax and Strongspace offer storage space for any kind of digital data.
  • 9. CONCERNS ABOUT CLOUD STORAGE The two biggest concerns about cloud storage is security. To secure data, most systems use a combination of techniques, including: Encryption, which means they use a complex algorithm to encode information. To decode the encrypted files, a user needs the encryption key. Authentication processes, which require to create a user name and password. Authorization practices -- the client lists the people who are authorized to access information stored on the cloud system. Many corporations have multiple levels of authorization.
  • 10. MY GMAIL IS PRICED $23…FOR A HACKER To safeguard our personal data from falling into wrong hands a service called CLOUDSWEEPER was launched. This is done by putting price tag on our Gmail account. This is a research project conducted by Peter Snyder and Chris Kanich at the University of ILLINOIS at Chicago published in THE HINDU Newspaper on JULY 4th 2013. Cloudsweeper aims to help users understand the risks they face Online and how it works at a systemic level.
  • 11.
  • 12. OAUTH 2 OAuth is an open standard for authorization. OAuth provides a method for clients to access Server resources on behalf of a resource owner. It also provides a process for end-users to authorize third-party access to their server resources without sharing their credentials (a username and password pair), using user-agent redirections. It allows the User, to grant access to your private resources on one site to another site . OpenID is all about using a single identity to sign into many sites. OAuth is about giving access to your stuff without sharing your identity (secret data).
  • 13. HISTORY OF OAUTH2 OAuth began in November 2006 when Blaine Cook was developing the Twitter OpenID implementation. The OAuth 1.0 Protocol was published in April 2010, an informational request for Comments. Since August 31, 2010, all third party Twitter applications have been required to use OAuth. The OAuth 2.0 Framework published standards to track Requests for Comments, in October 2012.
  • 15. PROTOCOL EXAMPLE Request Token URL: https://photos.example.net/request_token, using HTTP POST User Authorization URL: http://photos.example.net/authorize, using HTTP GET Access Token URL: https://photos.example.net/access_token, using HTTP POST Photo (Protected Resource) URL: http://photos.example.net/photo with required parameter file and optional parameter size Consumer Key :dpf43f3p2l4k3l03 Consumer Secret :kd94hf93k423kf44
  • 16. Protected Resource All together, the Consumer request for the photo is: http://photos.example.net/photos?file=vacation.jpg&size=original Authorization: OAuth realm="http://photos.example.net/", oauth_consumer_key="dpf43f3p2l4k3l03", oauth_token ="nnch734d00sl2jdk", oauth_signature_method="HMAC-SHA1", oauth_signature ="tR3%2BTy81lMeYAr%2FFid0kMTYa%2FWM%3D", oauth_timestamp="1191242096",
  • 17.
  • 18.
  • 19.
  • 20. ACCOUNT THEFT AUDITS The account theft audit places a hypothetical worth for accessing a Gmail account based on information gleaned from cybercriminal marketplaces. If you were to lose your phone, leave your computer logged in, or have your account hacked, the possible harm might extend far further than you expect. Account theft audit tool can help you get a handle on just how Much a cybercriminal could access were they to take over your Email account. This tool will scan your account and give you a visualization of how many of your accounts hackers could take over if they got access to your email account.
  • 21. STEPS OF ACCOUNT THEFT AUDITS 1.Temporary Limited Access Cloudsweeper uses OAuth2 to connect to your GMail account, so that they never have to ask for your Google credentials. OAuth means you stay in control of your account, can revoke access anytime you'd like, and your username and password stay secure and private. 2. Scanning for Risks This system programtically checks your email archives, looking for the kinds of things that hackers are interested in. This includes things like access to other accounts, account credentials, and other things attackers are interested in stealing. Humans never see your data, and statistics about your account are only kept if you opt in.
  • 22. 3. Threat Report Once the scan is complete, the audit will show what was found, and what other accounts you use an attacker could gain access to through your GMail account. Recent underground prices for these accounts will let you know a rough estimate of what your email account is worth to these attackers.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27. STEPS FOR CLEAR TEXT PASSWORD AUDITS 1. Temporary Gmail Access Cloudsweeper uses OAuth2 to connect to your GMail account, so that you never have to share your GMail credentials. OAuth means you stay in control of your account, can revoke access anytime you'd like, and your username and password stay secure and private. 2. Scanning for Passwords Our system programtically looks through your email to find plain text passwords in the same way a hacker or spy might. You'll then be presented with a list of found passwords that you can, optionally, redact from your account or encrypt.
  • 28. 3. Encrypt or Redact  If you choose, they will remove or encrypt any of the passwords found in your account. If you choose to encrypt the found passwords, they use strong encryption to secure these credentials, and then present you with a key and a QR code you can use to later decrypt this information.  Only you will have the key, so only you will be able to access these credentials in the future, keeping your account safer from hackers, spys and malicious users.
  • 29. How Does IT WORK?  Considering the intersection between security and long-term cloud-based data storage the tool has been developed to help users identify and redact private information.  You can log in with the following information: Username: chrisk Password: hunter3  By using this tool, you can preserve the useful but non-sensitive text of an email like that pictured above while removing the private information. After using this tool, the same email will still be in your archive  Username: chrisk Password: [wImYDaM5DBJZqgLrSYekjQ== ZmwDVbzid7+7LQ6R3uDj+xPnDt1nuxEFDJTxhKPh5T0=]
  • 30.
  • 31.
  • 32.
  • 33. Q.R CODE Quick Response Code is the trademark for a type of matrix barcode(or two-dimensional barcode) . First designed for the automotive industry in Japan; a barcode is an optically machine-readable label that is attached to an item and that records information related to that item The information encoded by a QR code may be made up of four standardized types of data namely numeric, alphanumeric, byte / binary, kanji (漢字).
  • 34.
  • 36.