SlideShare uma empresa Scribd logo
1 de 14
DATA
CONFIDENTIALITY IN
CLOUD COMPUTING
RITESH DWIVEDI GUIDED BY:
9911103528 MR. BANSIDHAR JOSHI
What is Cloud?
 Cloud computing involves deploying groups of remote servers and
software networked that allow centralized data storage and online
access to computer services or resources.
 Cloud computing continues to be one of the most hyped subjects in
IT, but it is becoming more and more an integral concept in IT
overall.
 Cloud computing providers offer their services according to several
fundamental models.
Cloud Services
 Cloud infrastructure services, known as Infrastructure as a Service
(IaaS), are self-service models for accessing, monitoring, and
managing remote data center infrastructures, such as compute,
storage, networking, and networking services.
 Cloud platform services, or Platform as a Service (PaaS), are used for
applications, and other development, while providing cloud
components to software.
 Cloud application services, or Software as a Service (SaaS), uses the
web to deliver applications that are managed by a third-party
vendor and whose interface is accessed on the clients’ side.
Cloud Computing Types
 A cloud is called a "public cloud" when the services are rendered
over a network that is open for public use. They may be free or
offered on a pay-per-usage model.
 Private cloud is cloud infrastructure operated solely for a single
organization, whether managed internally or by a third-party, and
hosted either internally or externally.
 Hybrid cloud is a composition of two or more clouds (private,
community or public) that remain distinct entities but are bound
together, offering the benefits of multiple deployment models.
Why did I chose Private Cloud?
 In case of public cloud you may not know where your data is stored,
if or how it is backed up, and whether unauthorized users can get to
it.
 Public cloud vendors provide their own services, so you can’t
control them or modify them.
 Your business is your data and your applications. Therefore, control
and security are paramount.
 You have to abide by the privacy policy, terms and conditions of
the vendor of public cloud.
What have I used?
 I have used Ubuntu Server OS for my private cloud as Ubuntu is most
preferred OS worldwide.
 For cloud deployment I have used OpenStack, which is a free and
open-source cloud computing software platform.
 I have used two-node architecture with legacy networking (nova-
network) having primarily Controller node and Compute node.
Legacy Network (Nova Network)
My Project
 Clouds are sometimes used to manage sensitive information, the
aim of my project is to secure that sensitive data within the cloud.
 This is known as Data Confidentiality.
 It can be defined as, Data Confidentiality is whether the information
stored on a system is protected against unintended or unauthorized
access.
 Data Confidentiality is often a measure of the ability of the system to
protect its data. Accordingly, this is an integral component of
Security.
What are the threats?
 Unauthorized users
 Operating system break-in
 Unauthorized access to data
 Data mining is a threat to privacy
 Eavesdropping on communications
Solutions are many
 Data obfuscation
 Data Fragmentation
 Protecting Data with Encryption
 Intrusion Protection Against Malicious Traffic
 Authentication, Authorization, and Access Control
My Contribution
 In this project I have proposed the idea of two level security of data
on cloud.
 Firstly, fragmentation of data into sensitive and non-sensitive part.
 On second level data encryption and obfuscation.
 Finally saving this data on different servers.
User Interface
Get unclassified
Data
K-NN Classification
Algorithm
Sensitive
Data
Blowfish Encryption
Yes
Non
Sensitive
Data
Yes
No
Obfuscation
VM1 VM2
Flow Diagram of the Project
Conclusion
 Data security in the cloud is ensured by the confidentiality of
sensitive data.
 That can be done with the help of storing encrypted data on
storage servers.
 Along with encryption, storage of data in the cloud environment is
based on fragmentation.
Thank You!

Mais conteúdo relacionado

Mais procurados

Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architectureVladimir Jirasek
 
Cloud computing understanding security risk and management
Cloud computing   understanding security risk and managementCloud computing   understanding security risk and management
Cloud computing understanding security risk and managementShamsundar Machale (CISSP, CEH)
 
Cloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksCloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksWilliam McBorrough
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud ComputingFalgun Rathod
 
Cloud platforms - Cloud Computing
Cloud platforms - Cloud ComputingCloud platforms - Cloud Computing
Cloud platforms - Cloud ComputingAditi Rai
 
Data storage security in cloud computing
Data storage security in cloud computingData storage security in cloud computing
Data storage security in cloud computingSonali Jain
 
Cloud security Presentation
Cloud security PresentationCloud security Presentation
Cloud security PresentationAjay p
 
Cloud computing security
Cloud computing security Cloud computing security
Cloud computing security Akhila Param
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computingveena venugopal
 
Zero Trust Model
Zero Trust ModelZero Trust Model
Zero Trust ModelYash
 
Storage Area Network (San)
Storage Area Network (San)Storage Area Network (San)
Storage Area Network (San)sankcomp
 
Cloud computing
Cloud computingCloud computing
Cloud computingstudent
 

Mais procurados (20)

Cloud computing
Cloud computingCloud computing
Cloud computing
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
 
Cloud computing understanding security risk and management
Cloud computing   understanding security risk and managementCloud computing   understanding security risk and management
Cloud computing understanding security risk and management
 
Cloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksCloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and Risks
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 
Cloud platforms - Cloud Computing
Cloud platforms - Cloud ComputingCloud platforms - Cloud Computing
Cloud platforms - Cloud Computing
 
Data storage security in cloud computing
Data storage security in cloud computingData storage security in cloud computing
Data storage security in cloud computing
 
Cloud security Presentation
Cloud security PresentationCloud security Presentation
Cloud security Presentation
 
Cloud Computing
Cloud Computing Cloud Computing
Cloud Computing
 
Cloud computing security
Cloud computing security Cloud computing security
Cloud computing security
 
Cloud computing presentation
Cloud computing presentationCloud computing presentation
Cloud computing presentation
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computing
 
Cloud security
Cloud securityCloud security
Cloud security
 
cloud security ppt
cloud security ppt cloud security ppt
cloud security ppt
 
Public cloud
Public cloudPublic cloud
Public cloud
 
cloud computing basics
cloud computing basicscloud computing basics
cloud computing basics
 
Zero Trust Model
Zero Trust ModelZero Trust Model
Zero Trust Model
 
Storage Area Network (San)
Storage Area Network (San)Storage Area Network (San)
Storage Area Network (San)
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 

Destaque

Data Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model RulesData Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model Rulessaurnou
 
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing and Security - ISACA Hyderabad Chapter PresentationCloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing and Security - ISACA Hyderabad Chapter PresentationVenkateswar Reddy Melachervu
 
Disaster Recovery Center and Disaster Recovery Plan
Disaster Recovery Center and Disaster Recovery PlanDisaster Recovery Center and Disaster Recovery Plan
Disaster Recovery Center and Disaster Recovery PlanFarid Er
 
Ensuring data security in cloud computing. - Anusha Tuke
Ensuring data security in  cloud computing. - Anusha TukeEnsuring data security in  cloud computing. - Anusha Tuke
Ensuring data security in cloud computing. - Anusha TukeAnusha Chavan
 
Nelly ayala velasquez
Nelly  ayala velasquezNelly  ayala velasquez
Nelly ayala velasquezNala Ayala
 
Power alfabet.digital
Power alfabet.digitalPower alfabet.digital
Power alfabet.digitalester889
 
Otp authentication scheme based on ECC
Otp authentication scheme based on ECCOtp authentication scheme based on ECC
Otp authentication scheme based on ECCPOOJA MEHTA
 
Thi cong ctb ii danh cho sv-1
Thi cong ctb ii   danh cho sv-1Thi cong ctb ii   danh cho sv-1
Thi cong ctb ii danh cho sv-1Thanh Tran
 
Group 4 sight sound and motion
Group 4 sight sound and motion Group 4 sight sound and motion
Group 4 sight sound and motion robindai
 
The Avalon Media System: Implementation and Community
The Avalon Media System: Implementation and CommunityThe Avalon Media System: Implementation and Community
The Avalon Media System: Implementation and CommunityAvalon Media System
 
American fantasy drama
American fantasy dramaAmerican fantasy drama
American fantasy dramatimeclarke94
 
1 sesion tecnologia educativa
1 sesion tecnologia educativa1 sesion tecnologia educativa
1 sesion tecnologia educativaV3RSO
 
American fantasy drama
American fantasy dramaAmerican fantasy drama
American fantasy dramatimeclarke94
 

Destaque (19)

Data Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model RulesData Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model Rules
 
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing and Security - ISACA Hyderabad Chapter PresentationCloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
 
Disaster Recovery Center and Disaster Recovery Plan
Disaster Recovery Center and Disaster Recovery PlanDisaster Recovery Center and Disaster Recovery Plan
Disaster Recovery Center and Disaster Recovery Plan
 
Ensuring data security in cloud computing. - Anusha Tuke
Ensuring data security in  cloud computing. - Anusha TukeEnsuring data security in  cloud computing. - Anusha Tuke
Ensuring data security in cloud computing. - Anusha Tuke
 
Nelly ayala velasquez
Nelly  ayala velasquezNelly  ayala velasquez
Nelly ayala velasquez
 
Power alfabet.digital
Power alfabet.digitalPower alfabet.digital
Power alfabet.digital
 
Ekonomi
EkonomiEkonomi
Ekonomi
 
My work experience
My work experienceMy work experience
My work experience
 
Otp authentication scheme based on ECC
Otp authentication scheme based on ECCOtp authentication scheme based on ECC
Otp authentication scheme based on ECC
 
Apa references (bbs)
Apa references (bbs)Apa references (bbs)
Apa references (bbs)
 
Modelo OSI
Modelo OSIModelo OSI
Modelo OSI
 
Thi cong ctb ii danh cho sv-1
Thi cong ctb ii   danh cho sv-1Thi cong ctb ii   danh cho sv-1
Thi cong ctb ii danh cho sv-1
 
Group 4 sight sound and motion
Group 4 sight sound and motion Group 4 sight sound and motion
Group 4 sight sound and motion
 
The Avalon Media System: Implementation and Community
The Avalon Media System: Implementation and CommunityThe Avalon Media System: Implementation and Community
The Avalon Media System: Implementation and Community
 
American fantasy drama
American fantasy dramaAmerican fantasy drama
American fantasy drama
 
1 sesion tecnologia educativa
1 sesion tecnologia educativa1 sesion tecnologia educativa
1 sesion tecnologia educativa
 
American fantasy drama
American fantasy dramaAmerican fantasy drama
American fantasy drama
 
The Walking Dead 01
The Walking Dead 01The Walking Dead 01
The Walking Dead 01
 
My work experience
My work experienceMy work experience
My work experience
 

Semelhante a Data Confidentiality in Cloud Computing

Fog computing document
Fog computing documentFog computing document
Fog computing documentsravya raju
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detectionijsrd.com
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloudpriyanka reddy
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 
Cloud computing and Cloud Security - Basics and Terminologies
Cloud computing and Cloud Security - Basics and TerminologiesCloud computing and Cloud Security - Basics and Terminologies
Cloud computing and Cloud Security - Basics and TerminologiesTechsparks
 
A survey on cloud security issues and techniques
A survey on cloud security issues and techniquesA survey on cloud security issues and techniques
A survey on cloud security issues and techniquesijcsa
 
CLOUD COMPUTING.pdf
CLOUD COMPUTING.pdfCLOUD COMPUTING.pdf
CLOUD COMPUTING.pdfProtelion
 
CLOUD COMPUTING.pdf
CLOUD COMPUTING.pdfCLOUD COMPUTING.pdf
CLOUD COMPUTING.pdfProtelion
 
CLOUD COMPUTING kk.pptx
CLOUD COMPUTING kk.pptxCLOUD COMPUTING kk.pptx
CLOUD COMPUTING kk.pptxMohdArbazraza
 
Splendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptxSplendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptxssuserea0dfe
 
Implementing security groups in open stack
Implementing security groups in open stackImplementing security groups in open stack
Implementing security groups in open stackRishabh Agarwal
 
Literature Review: Security on cloud computing
Literature Review: Security on cloud computingLiterature Review: Security on cloud computing
Literature Review: Security on cloud computingSuranga Nisiwasala
 
Cloud Security POV_Final (by KM)
Cloud Security POV_Final (by KM)Cloud Security POV_Final (by KM)
Cloud Security POV_Final (by KM)Khiro Mishra
 
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd Iaetsd
 
Introduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptxIntroduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptxojaswiniwagh
 

Semelhante a Data Confidentiality in Cloud Computing (20)

Fog computing document
Fog computing documentFog computing document
Fog computing document
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detection
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
 
Fog doc
Fog doc Fog doc
Fog doc
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
Cloud computing and Cloud Security - Basics and Terminologies
Cloud computing and Cloud Security - Basics and TerminologiesCloud computing and Cloud Security - Basics and Terminologies
Cloud computing and Cloud Security - Basics and Terminologies
 
A survey on cloud security issues and techniques
A survey on cloud security issues and techniquesA survey on cloud security issues and techniques
A survey on cloud security issues and techniques
 
CLOUD COMPUTING.pdf
CLOUD COMPUTING.pdfCLOUD COMPUTING.pdf
CLOUD COMPUTING.pdf
 
CLOUD COMPUTING.pdf
CLOUD COMPUTING.pdfCLOUD COMPUTING.pdf
CLOUD COMPUTING.pdf
 
CLOUD COMPUTING kk.pptx
CLOUD COMPUTING kk.pptxCLOUD COMPUTING kk.pptx
CLOUD COMPUTING kk.pptx
 
Splendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptxSplendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptx
 
UNIT -V.docx
UNIT -V.docxUNIT -V.docx
UNIT -V.docx
 
Implementing security groups in open stack
Implementing security groups in open stackImplementing security groups in open stack
Implementing security groups in open stack
 
Literature Review: Security on cloud computing
Literature Review: Security on cloud computingLiterature Review: Security on cloud computing
Literature Review: Security on cloud computing
 
Cloud Security POV_Final (by KM)
Cloud Security POV_Final (by KM)Cloud Security POV_Final (by KM)
Cloud Security POV_Final (by KM)
 
Cloud security
Cloud securityCloud security
Cloud security
 
Cloud security
Cloud securityCloud security
Cloud security
 
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd cloud computing and security challenges
Iaetsd cloud computing and security challenges
 
Introduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptxIntroduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptx
 

Último

Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 

Último (20)

Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 

Data Confidentiality in Cloud Computing

  • 1. DATA CONFIDENTIALITY IN CLOUD COMPUTING RITESH DWIVEDI GUIDED BY: 9911103528 MR. BANSIDHAR JOSHI
  • 2. What is Cloud?  Cloud computing involves deploying groups of remote servers and software networked that allow centralized data storage and online access to computer services or resources.  Cloud computing continues to be one of the most hyped subjects in IT, but it is becoming more and more an integral concept in IT overall.  Cloud computing providers offer their services according to several fundamental models.
  • 3. Cloud Services  Cloud infrastructure services, known as Infrastructure as a Service (IaaS), are self-service models for accessing, monitoring, and managing remote data center infrastructures, such as compute, storage, networking, and networking services.  Cloud platform services, or Platform as a Service (PaaS), are used for applications, and other development, while providing cloud components to software.  Cloud application services, or Software as a Service (SaaS), uses the web to deliver applications that are managed by a third-party vendor and whose interface is accessed on the clients’ side.
  • 4. Cloud Computing Types  A cloud is called a "public cloud" when the services are rendered over a network that is open for public use. They may be free or offered on a pay-per-usage model.  Private cloud is cloud infrastructure operated solely for a single organization, whether managed internally or by a third-party, and hosted either internally or externally.  Hybrid cloud is a composition of two or more clouds (private, community or public) that remain distinct entities but are bound together, offering the benefits of multiple deployment models.
  • 5. Why did I chose Private Cloud?  In case of public cloud you may not know where your data is stored, if or how it is backed up, and whether unauthorized users can get to it.  Public cloud vendors provide their own services, so you can’t control them or modify them.  Your business is your data and your applications. Therefore, control and security are paramount.  You have to abide by the privacy policy, terms and conditions of the vendor of public cloud.
  • 6. What have I used?  I have used Ubuntu Server OS for my private cloud as Ubuntu is most preferred OS worldwide.  For cloud deployment I have used OpenStack, which is a free and open-source cloud computing software platform.  I have used two-node architecture with legacy networking (nova- network) having primarily Controller node and Compute node.
  • 8. My Project  Clouds are sometimes used to manage sensitive information, the aim of my project is to secure that sensitive data within the cloud.  This is known as Data Confidentiality.  It can be defined as, Data Confidentiality is whether the information stored on a system is protected against unintended or unauthorized access.  Data Confidentiality is often a measure of the ability of the system to protect its data. Accordingly, this is an integral component of Security.
  • 9. What are the threats?  Unauthorized users  Operating system break-in  Unauthorized access to data  Data mining is a threat to privacy  Eavesdropping on communications
  • 10. Solutions are many  Data obfuscation  Data Fragmentation  Protecting Data with Encryption  Intrusion Protection Against Malicious Traffic  Authentication, Authorization, and Access Control
  • 11. My Contribution  In this project I have proposed the idea of two level security of data on cloud.  Firstly, fragmentation of data into sensitive and non-sensitive part.  On second level data encryption and obfuscation.  Finally saving this data on different servers.
  • 12. User Interface Get unclassified Data K-NN Classification Algorithm Sensitive Data Blowfish Encryption Yes Non Sensitive Data Yes No Obfuscation VM1 VM2 Flow Diagram of the Project
  • 13. Conclusion  Data security in the cloud is ensured by the confidentiality of sensitive data.  That can be done with the help of storing encrypted data on storage servers.  Along with encryption, storage of data in the cloud environment is based on fragmentation.