SlideShare une entreprise Scribd logo
1  sur  14
DATA
CONFIDENTIALITY IN
CLOUD COMPUTING
RITESH DWIVEDI GUIDED BY:
9911103528 MR. BANSIDHAR JOSHI
What is Cloud?
 Cloud computing involves deploying groups of remote servers and
software networked that allow centralized data storage and online
access to computer services or resources.
 Cloud computing continues to be one of the most hyped subjects in
IT, but it is becoming more and more an integral concept in IT
overall.
 Cloud computing providers offer their services according to several
fundamental models.
Cloud Services
 Cloud infrastructure services, known as Infrastructure as a Service
(IaaS), are self-service models for accessing, monitoring, and
managing remote data center infrastructures, such as compute,
storage, networking, and networking services.
 Cloud platform services, or Platform as a Service (PaaS), are used for
applications, and other development, while providing cloud
components to software.
 Cloud application services, or Software as a Service (SaaS), uses the
web to deliver applications that are managed by a third-party
vendor and whose interface is accessed on the clients’ side.
Cloud Computing Types
 A cloud is called a "public cloud" when the services are rendered
over a network that is open for public use. They may be free or
offered on a pay-per-usage model.
 Private cloud is cloud infrastructure operated solely for a single
organization, whether managed internally or by a third-party, and
hosted either internally or externally.
 Hybrid cloud is a composition of two or more clouds (private,
community or public) that remain distinct entities but are bound
together, offering the benefits of multiple deployment models.
Why did I chose Private Cloud?
 In case of public cloud you may not know where your data is stored,
if or how it is backed up, and whether unauthorized users can get to
it.
 Public cloud vendors provide their own services, so you can’t
control them or modify them.
 Your business is your data and your applications. Therefore, control
and security are paramount.
 You have to abide by the privacy policy, terms and conditions of
the vendor of public cloud.
What have I used?
 I have used Ubuntu Server OS for my private cloud as Ubuntu is most
preferred OS worldwide.
 For cloud deployment I have used OpenStack, which is a free and
open-source cloud computing software platform.
 I have used two-node architecture with legacy networking (nova-
network) having primarily Controller node and Compute node.
Legacy Network (Nova Network)
My Project
 Clouds are sometimes used to manage sensitive information, the
aim of my project is to secure that sensitive data within the cloud.
 This is known as Data Confidentiality.
 It can be defined as, Data Confidentiality is whether the information
stored on a system is protected against unintended or unauthorized
access.
 Data Confidentiality is often a measure of the ability of the system to
protect its data. Accordingly, this is an integral component of
Security.
What are the threats?
 Unauthorized users
 Operating system break-in
 Unauthorized access to data
 Data mining is a threat to privacy
 Eavesdropping on communications
Solutions are many
 Data obfuscation
 Data Fragmentation
 Protecting Data with Encryption
 Intrusion Protection Against Malicious Traffic
 Authentication, Authorization, and Access Control
My Contribution
 In this project I have proposed the idea of two level security of data
on cloud.
 Firstly, fragmentation of data into sensitive and non-sensitive part.
 On second level data encryption and obfuscation.
 Finally saving this data on different servers.
User Interface
Get unclassified
Data
K-NN Classification
Algorithm
Sensitive
Data
Blowfish Encryption
Yes
Non
Sensitive
Data
Yes
No
Obfuscation
VM1 VM2
Flow Diagram of the Project
Conclusion
 Data security in the cloud is ensured by the confidentiality of
sensitive data.
 That can be done with the help of storing encrypted data on
storage servers.
 Along with encryption, storage of data in the cloud environment is
based on fragmentation.
Thank You!

Contenu connexe

Tendances

Evolution of the cloud
Evolution of the cloudEvolution of the cloud
Evolution of the cloud
sagaroceanic11
 
Privacy in cloud computing
Privacy in cloud computingPrivacy in cloud computing
Privacy in cloud computing
Ahmed Nour
 
Chapter 3 networking and internetworking
Chapter 3 networking and internetworkingChapter 3 networking and internetworking
Chapter 3 networking and internetworking
AbDul ThaYyal
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
nitinw25
 

Tendances (20)

cloud computing:Types of virtualization
cloud computing:Types of virtualizationcloud computing:Types of virtualization
cloud computing:Types of virtualization
 
Storage Virtualization
Storage VirtualizationStorage Virtualization
Storage Virtualization
 
Cloud computing security
Cloud computing security Cloud computing security
Cloud computing security
 
Green cloud computing India
Green cloud computing IndiaGreen cloud computing India
Green cloud computing India
 
Evolution of the cloud
Evolution of the cloudEvolution of the cloud
Evolution of the cloud
 
Cloud Computing Tools
Cloud Computing ToolsCloud Computing Tools
Cloud Computing Tools
 
Distributed information system
Distributed information systemDistributed information system
Distributed information system
 
A Seminar on Cloud Computing
A Seminar on Cloud ComputingA Seminar on Cloud Computing
A Seminar on Cloud Computing
 
cloud computing technology
cloud computing technologycloud computing technology
cloud computing technology
 
Scheduling in cloud
Scheduling in cloudScheduling in cloud
Scheduling in cloud
 
Cloud computing and Cloudsim
Cloud computing and CloudsimCloud computing and Cloudsim
Cloud computing and Cloudsim
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 
Privacy in cloud computing
Privacy in cloud computingPrivacy in cloud computing
Privacy in cloud computing
 
Introduction Of Cloud Computing
Introduction Of Cloud Computing Introduction Of Cloud Computing
Introduction Of Cloud Computing
 
Chapter 3 networking and internetworking
Chapter 3 networking and internetworkingChapter 3 networking and internetworking
Chapter 3 networking and internetworking
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 
Cloud Reference Model
Cloud Reference ModelCloud Reference Model
Cloud Reference Model
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security Challenges
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Server virtualization
Server virtualizationServer virtualization
Server virtualization
 

En vedette

Disaster Recovery Center and Disaster Recovery Plan
Disaster Recovery Center and Disaster Recovery PlanDisaster Recovery Center and Disaster Recovery Plan
Disaster Recovery Center and Disaster Recovery Plan
Farid Er
 
Nelly ayala velasquez
Nelly  ayala velasquezNelly  ayala velasquez
Nelly ayala velasquez
Nala Ayala
 
Power alfabet.digital
Power alfabet.digitalPower alfabet.digital
Power alfabet.digital
ester889
 
Thi cong ctb ii danh cho sv-1
Thi cong ctb ii   danh cho sv-1Thi cong ctb ii   danh cho sv-1
Thi cong ctb ii danh cho sv-1
Thanh Tran
 
Group 4 sight sound and motion
Group 4 sight sound and motion Group 4 sight sound and motion
Group 4 sight sound and motion
robindai
 
American fantasy drama
American fantasy dramaAmerican fantasy drama
American fantasy drama
timeclarke94
 
1 sesion tecnologia educativa
1 sesion tecnologia educativa1 sesion tecnologia educativa
1 sesion tecnologia educativa
V3RSO
 
American fantasy drama
American fantasy dramaAmerican fantasy drama
American fantasy drama
timeclarke94
 

En vedette (20)

Data Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model RulesData Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model Rules
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing and Security - ISACA Hyderabad Chapter PresentationCloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
 
Disaster Recovery Center and Disaster Recovery Plan
Disaster Recovery Center and Disaster Recovery PlanDisaster Recovery Center and Disaster Recovery Plan
Disaster Recovery Center and Disaster Recovery Plan
 
Ensuring data security in cloud computing. - Anusha Tuke
Ensuring data security in  cloud computing. - Anusha TukeEnsuring data security in  cloud computing. - Anusha Tuke
Ensuring data security in cloud computing. - Anusha Tuke
 
Nelly ayala velasquez
Nelly  ayala velasquezNelly  ayala velasquez
Nelly ayala velasquez
 
Power alfabet.digital
Power alfabet.digitalPower alfabet.digital
Power alfabet.digital
 
Ekonomi
EkonomiEkonomi
Ekonomi
 
My work experience
My work experienceMy work experience
My work experience
 
Otp authentication scheme based on ECC
Otp authentication scheme based on ECCOtp authentication scheme based on ECC
Otp authentication scheme based on ECC
 
Apa references (bbs)
Apa references (bbs)Apa references (bbs)
Apa references (bbs)
 
Modelo OSI
Modelo OSIModelo OSI
Modelo OSI
 
Thi cong ctb ii danh cho sv-1
Thi cong ctb ii   danh cho sv-1Thi cong ctb ii   danh cho sv-1
Thi cong ctb ii danh cho sv-1
 
Group 4 sight sound and motion
Group 4 sight sound and motion Group 4 sight sound and motion
Group 4 sight sound and motion
 
The Avalon Media System: Implementation and Community
The Avalon Media System: Implementation and CommunityThe Avalon Media System: Implementation and Community
The Avalon Media System: Implementation and Community
 
American fantasy drama
American fantasy dramaAmerican fantasy drama
American fantasy drama
 
1 sesion tecnologia educativa
1 sesion tecnologia educativa1 sesion tecnologia educativa
1 sesion tecnologia educativa
 
American fantasy drama
American fantasy dramaAmerican fantasy drama
American fantasy drama
 
The Walking Dead 01
The Walking Dead 01The Walking Dead 01
The Walking Dead 01
 

Similaire à Data Confidentiality in Cloud Computing

fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
priyanka reddy
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
Er. rahul abhishek
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
Er. rahul abhishek
 
Splendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptxSplendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptx
ssuserea0dfe
 
Cloud Security POV_Final (by KM)
Cloud Security POV_Final (by KM)Cloud Security POV_Final (by KM)
Cloud Security POV_Final (by KM)
Khiro Mishra
 
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd cloud computing and security challenges
Iaetsd cloud computing and security challenges
Iaetsd Iaetsd
 

Similaire à Data Confidentiality in Cloud Computing (20)

Fog computing document
Fog computing documentFog computing document
Fog computing document
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detection
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
 
Fog doc
Fog doc Fog doc
Fog doc
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
Cloud computing and Cloud Security - Basics and Terminologies
Cloud computing and Cloud Security - Basics and TerminologiesCloud computing and Cloud Security - Basics and Terminologies
Cloud computing and Cloud Security - Basics and Terminologies
 
A survey on cloud security issues and techniques
A survey on cloud security issues and techniquesA survey on cloud security issues and techniques
A survey on cloud security issues and techniques
 
CLOUD COMPUTING.pdf
CLOUD COMPUTING.pdfCLOUD COMPUTING.pdf
CLOUD COMPUTING.pdf
 
CLOUD COMPUTING.pdf
CLOUD COMPUTING.pdfCLOUD COMPUTING.pdf
CLOUD COMPUTING.pdf
 
CLOUD COMPUTING kk.pptx
CLOUD COMPUTING kk.pptxCLOUD COMPUTING kk.pptx
CLOUD COMPUTING kk.pptx
 
Splendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptxSplendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptx
 
UNIT -V.docx
UNIT -V.docxUNIT -V.docx
UNIT -V.docx
 
Implementing security groups in open stack
Implementing security groups in open stackImplementing security groups in open stack
Implementing security groups in open stack
 
Literature Review: Security on cloud computing
Literature Review: Security on cloud computingLiterature Review: Security on cloud computing
Literature Review: Security on cloud computing
 
Cloud Security POV_Final (by KM)
Cloud Security POV_Final (by KM)Cloud Security POV_Final (by KM)
Cloud Security POV_Final (by KM)
 
Cloud security
Cloud securityCloud security
Cloud security
 
Cloud security
Cloud securityCloud security
Cloud security
 
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd cloud computing and security challenges
Iaetsd cloud computing and security challenges
 
Introduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptxIntroduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptx
 

Dernier

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Dernier (20)

Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 

Data Confidentiality in Cloud Computing

  • 1. DATA CONFIDENTIALITY IN CLOUD COMPUTING RITESH DWIVEDI GUIDED BY: 9911103528 MR. BANSIDHAR JOSHI
  • 2. What is Cloud?  Cloud computing involves deploying groups of remote servers and software networked that allow centralized data storage and online access to computer services or resources.  Cloud computing continues to be one of the most hyped subjects in IT, but it is becoming more and more an integral concept in IT overall.  Cloud computing providers offer their services according to several fundamental models.
  • 3. Cloud Services  Cloud infrastructure services, known as Infrastructure as a Service (IaaS), are self-service models for accessing, monitoring, and managing remote data center infrastructures, such as compute, storage, networking, and networking services.  Cloud platform services, or Platform as a Service (PaaS), are used for applications, and other development, while providing cloud components to software.  Cloud application services, or Software as a Service (SaaS), uses the web to deliver applications that are managed by a third-party vendor and whose interface is accessed on the clients’ side.
  • 4. Cloud Computing Types  A cloud is called a "public cloud" when the services are rendered over a network that is open for public use. They may be free or offered on a pay-per-usage model.  Private cloud is cloud infrastructure operated solely for a single organization, whether managed internally or by a third-party, and hosted either internally or externally.  Hybrid cloud is a composition of two or more clouds (private, community or public) that remain distinct entities but are bound together, offering the benefits of multiple deployment models.
  • 5. Why did I chose Private Cloud?  In case of public cloud you may not know where your data is stored, if or how it is backed up, and whether unauthorized users can get to it.  Public cloud vendors provide their own services, so you can’t control them or modify them.  Your business is your data and your applications. Therefore, control and security are paramount.  You have to abide by the privacy policy, terms and conditions of the vendor of public cloud.
  • 6. What have I used?  I have used Ubuntu Server OS for my private cloud as Ubuntu is most preferred OS worldwide.  For cloud deployment I have used OpenStack, which is a free and open-source cloud computing software platform.  I have used two-node architecture with legacy networking (nova- network) having primarily Controller node and Compute node.
  • 8. My Project  Clouds are sometimes used to manage sensitive information, the aim of my project is to secure that sensitive data within the cloud.  This is known as Data Confidentiality.  It can be defined as, Data Confidentiality is whether the information stored on a system is protected against unintended or unauthorized access.  Data Confidentiality is often a measure of the ability of the system to protect its data. Accordingly, this is an integral component of Security.
  • 9. What are the threats?  Unauthorized users  Operating system break-in  Unauthorized access to data  Data mining is a threat to privacy  Eavesdropping on communications
  • 10. Solutions are many  Data obfuscation  Data Fragmentation  Protecting Data with Encryption  Intrusion Protection Against Malicious Traffic  Authentication, Authorization, and Access Control
  • 11. My Contribution  In this project I have proposed the idea of two level security of data on cloud.  Firstly, fragmentation of data into sensitive and non-sensitive part.  On second level data encryption and obfuscation.  Finally saving this data on different servers.
  • 12. User Interface Get unclassified Data K-NN Classification Algorithm Sensitive Data Blowfish Encryption Yes Non Sensitive Data Yes No Obfuscation VM1 VM2 Flow Diagram of the Project
  • 13. Conclusion  Data security in the cloud is ensured by the confidentiality of sensitive data.  That can be done with the help of storing encrypted data on storage servers.  Along with encryption, storage of data in the cloud environment is based on fragmentation.