You are on page 1of 9

KINGDOM OF SAUDI ARABIA | JAZAN

UNIVERSITY

COLLEGE OF COMPUTER SCIENCE &


INFORMATION SYSTEMS

2017-2018, FIRST SEMESTER

Cloud Drop
Student Information
DALAL MOHAMMED AHMED HUBANI
201410632
Introduction

Cloud Computing is a buzzword of 2010 and many experts disagree on its exact
definition. But the most used one and concurred one includes the notion of web‐
based services which are available on demand from and optimized and highly
scalable service provider. Since such a disagreement on the definition, one will be
provided to better understand of the notion. The cloud is IT as a service, delivered
by IT resources that are independent of location. It is a style of computing in which
dynamically scalable and often virtualized resources are provided as a service over
the Internet where end‐users have no knowledge of, expertise in, or control over
the technology infrastructure (the cloud) that supports them.

History
History of Cloud Computing surprisingly began almost 50 years ago. The father of
this idea is considered to be John McCarthy, a professor at MIT University in US,
who first in 1961 presented the idea of sharing the same computer technology as
being the same as for example sharing electricity. Electrical power needs many
households/firms that possess a variety of electrical appliances but do not possess
power plant. One power plant serves many customers and using the electricity
example, power plant=service provider, distribution network=internet and the
households/firms=computers.

Since that time, Cloud computing has evolved through a number of phases which
include grid and utility computing, application service provision (ASP), and
Software as a Service (SaaS). One of the first milestones was the arrival of
Salesforce.com in 1999, which pioneered the concept of delivering enterprise
applications via a simple website. The next development was Amazon Web
Services in 2002, which provided a suite of cloud‐based services including storage,
computation and even human intelligence. Another big milestone came in 2009 as
Google and others started to offer browser‐based enterprise applications, though
services such as Google Apps.

What is Cloud Computing?

Cloud Computing refers to manipulating, configuring, and accessing the


hardware and software resources remotely. It offers online data storage,
infrastructure, and application.

Cloud computing offers platform independency, as the software is not required to


be installed locally on the PC. Hence, the Cloud Computing is making our business
applications mobile and collaborative.
Cloud Drops Introduction

Outsourcing data to a third-party administrative control, as is done in cloud


computing, gives rise to security concerns. The data compromise may occur due to
attacks by other users and nodes within the cloud. Therefore, high security
measures are required to protect data within the cloud. However, the employed
security strategy must also take into account the optimization of the data retrieval
time. In this paper, we propose Division and Replication of Data in the Cloud for
Optimal Performance and Security (DROPS) that collectively approaches the
security and performance issues. In the DROPS methodology, we divide a file into
fragments, and replicate the fragmented data over the cloud nodes. Each of the
nodes stores only a single fragment of a particular data file that ensures that even in
case of a successful attack, no meaningful information is revealed to the attacker.
Moreover, the nodes storing the fragments, are separated with certain distance by
means of graph T-coloring to prohibit an attacker of guessing the locations of the
fragments. Furthermore, the DROPS methodology does not rely on the traditional
cryptographic techniques for the data security; thereby relieving the system of
computationally expensive methodologies. We show that the probability to locate
and compromise all of the nodes storing the fragments of a single file is extremely
low. We also compare the performance of the DROPS methodology with ten other
schemes. The higher level of security with slight performance overhead was
observed.
CloudDrops is a pervasive awareness platform that integrates virtual information
from the Web more closely with the contextually rich physical spaces in which we
live and work. CloudDrops consists of many interactive stampsized displays, each
showing a tiny bit of digital information. The large number of displays and their
small size allows the user to flexibly instrument, orchestrate and reconfigure her
personal information environment. We show different form factors for stamp-sized
displays, provide a device concept and a first implementation.

Why Cloud Drops

THE cloud computing paradigm has reformed the usage and


management of the information technology infrastructure .
Access to shared resources in a pay-as-you-go mode cuts the
management effort of the user to a minimal level . Cloud computing is
characterized by on-demand self-services, ubiquitous network
accesses, resource pooling, elasticity, and measured services .
The aforementioned characteristics of cloud computing make it a
striking candidate for businesses, organizations, and individual users
for adoption . However, the benefits of low-cost, negligible
management (from a users per- spective), and greater flexibility come
with increased
Cloud Drop Architecture

The data outsourced to a public cloud must be secured. Unauthorized data access
by other users and processes (whether accidental or deliberate) must be prevented.
Any weak entity can put the whole cloud at risk. In such a scenario, the security
mechanism must substantially increase an attacker’s effort to retrieve a reasonable
amount of data even after a successful intrusion in the cloud. Moreover, the
probable amount of loss (as a result of data leakage) must also be minimized.
We develop a scheme for outsourced data that takes into account both the security
and
performance. The proposed scheme fragments and replicates the data file over
cloud nodes. The proposed DROPS scheme ensures that evenin the case of a
successful attack, no meaningful information is revealed to the attacker. We do not
rely on traditional cryptographic techniques for data security.
The noncryptographic nature of the proposed scheme makes it faster to perform the
required
operations (placement and retrieval) on the data.
We ensure a controlled replication of the file
fragments, where each of the fragments is replicated only once for the purpose of
improved security.
In this system mainly consist of three modules:
Owner
User
Cloud Admin
Owner
-In these owner modules, owner add the multiple users in the cloud system. Owner
also
uploads the text files in the cloud storage. He can delete the files.
User
-In user module, user completes the registration process and login the system. He
can upload
the text files on cloud storage. He can delete, update or modify the files
Cloud Admin
-In this module, the views the all status, views user, view owner, and reports send
back.
The Cloud admin module file can fragments using the fragment placement and
fragments replication algorithms

security concerns
Security is one of the most crucial aspects among those prohibiting the
wide-spread adoption of cloud computing . Due to the security
apprehensions, academia and industry, on occasions rate cloud computing
unwise for business-critical organizations .
Cloud security issues may stem due ′ to the core technology s
implementation (virtual machine (VM) escape, session riding, etc.), cloud
service offerings (structured query language injection, weak authentication
schemes, etc.), and arising from cloud characteristics (data recovery
vulnerability, Internet protocol vulnerability, etc.) .
A cloud consists of numerous entities. For a cloud to be secure, all of the
participating entities must be secure. In any given system with multiple

units, the highest level of the system s security is equal to the security level
of the weakest entity . The a aforementioned fact can bring the security
level of other entities down to the level of the victim entity.
The weakened security of the victim entity becomes the gateway for an
attacker to enter the system that, in turn, puts the whole system and
resources at risk. Therefore, in a cloud, the security of the assets does not
solely depend on an individual’s security measures . The neighboring
entities may provide an opportunity to an attacker to bypass the users
defenses.
Data security strategies:
 In the DROPS methodology, a file is divided into fragments, and replicate
the fragmented data over the cloud nodes, which is duplicating the data.
Each of the nodes stores only a single fragment of a particular data file that
ensures that even in the case of a successful attack, no meaningful
information is revealed to the attacker.
 the nodes storing the fragments are separated by a certain distance by means
of graph T-coloring to prohibit an attacker of guessing the locations of the
fragments.
 For a cloud to be secure all participating entities must be secure. In a system
with multiple units, the highest level of systems security is equal to the
security level of the weakest entity.

Google drops cloud computing


Google slashed its cloud computing service prices on Tuesday, seeking to wrest
customers from Amazon and Microsoft in the fast-growing market of renting
computers and data storage to companies.

Price cuts range from 30% to 85%. Google's cloud storage will cost 2.6 cents per
gigabyte, about 68% lower for most customers. Google's Compute Engine services
will cost 32% less across all sizes, regions and classes.

"The cost of virtualised hardware should fall in line with the cost of the underlying
real hardware," Google senior VP Urs Holzle said in a post on Google's official
developers' blog on Tuesday in conjunction with a cloud event the company hosted
in San Francisco.Holzle noted hardware costs have improved by 20% to 30%
during the past five years but that "public cloud prices fell at just 8% per year".

Cloud services are increasingly popular among tech start-ups and larger
companies, which rely on computers owned and operated by the likes of Amazon
and Google, the world's top Internet search engine, instead of buying the
equipment themselves.
Amazon, one of the largest online retailers, was among the first companies to
recognise the opportunity. Amazon Web Services provide the underlying
infrastructure for key aspects of popular Web companies such as online movie
streaming service Netflix and social network Pinterest.

Amazon's Web Services will hold an event in San Francisco to discuss its business
on Wednesday. Amazon did not immediately respond to a request for comment on
whether it would respond to Google's price cuts.

Earlier this week, Cisco announced plans to spend $1 billion over the next two
years to build a new cloud services business.

Conclusion

Cloud computing growth raises the security concern due to its core technology. So, this
system provides a better solution to achieve the security as well as performance by
using three techniques, Graphical Password Authentication, Fragmentation and Replication.
Nowadays, the use of the Graphical Password Authentication increases because it is
very easy to remember and secure as compared to alphanumeric method.
Fragmentation used to protect data from single point disaster. Replication can be useful for
maintaining availability, reliability and performance in failure situations. But the extra
replication can also result in high storage cost or drops in systems overall performance due to
extreme use of bandwidth. So, here controlled replication is used. The future work will saves
the time and
work on some attacks. Matching Based Over-lapping approach reduces the computational
load of alignment by reducing the pattern sequence into a smaller set of overlapped
subsequences. Furthermore, the detection and the update processes can be parallel with no
loss of accuracy.

You might also like