You are on page 1of 11

SIMULTANEOUS AMMUNITION FOR THE DATA

SECURITY AND PRIVACY IN MULTI CLOUD


COMPUTING

PRESENTED BY:
NARAHARI M JOSHI :-1EP16IS058
MURALI E M :-1EP16IS057
VENKATESH K H :-1EP16IS106
ROHAN NAYAK :-1EP16IS078
ABSTRACT:
• In this we analyse on the multicloud transferring data(information) with securities protocols.
• This decision is reasonably well explained by the fact that most of the current backbone of need of
multiple cloud service providers(agent) which allow you to do computing or utilization of there resources
based on the security techniques which allow you to transferring data from one servers(node) to any
other or many.
• Moreover , we utilize the mathematical equation , security constrained and the accessibility for everyone
through the network.
• Here the mathematical formula is designed for server to server(nodes to nodes) transfer the data and its
authenticity with automation for exchanging information and can do synchronization between servers.
• Purpose of this research is to increase resources scalability and merge the many cloud providers into one
hand accessibility.


INTRODUCTION:
• Cloud computing has become a popular buzzword; it has been widely used to refer to different
technologies, services, and concepts.
• It is often associated with virtualized infrastructure or hardware on-demand, utility computing, it
outsourcing, platform and software as a service, and many other things that now are the focus of the IT
industry.

• A cloud is a type of parallel and distributed system consisting of a collection of interconnected and
virtualized computers that are dynamically provisioned and presented as one or more unified computing
resources based on service-level agreements established through negotiation between the service
provider and consumers.
• Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared
pool of configurable computing resources e.g., Networks, Servers, Storage, Applications, and Services
That can be rapidly provisioned and released with minimal management effort or service provider
interaction.

PROTOCOL BASED CLOUD COMPUTING

• They can store their data like important documents, training data, calendar, finance and many more important documents.
In such situation, secure mechanism of sharing and storage is essential considering advanced hacking techniques available
nowadays.

• Cloud computing is its utility-oriented approach. More than any other trend in distributed computing, cloud computing
focuses on delivering services with a given pricing model, in most cases a “pay-per-use” strategy.
LAYERS AND SECURITY ISSUE IN CLOUD
• Cloud computing seems really simple to the consumers of a cloud as in access
cloud, place or retrieves required data that’s all. But the internal cloud is built on
three very important layers.
• Those layers are named as software as a service (SaaS), Platform as a service
(PaaS) and Infrastructure as a service (IaaS). Various cloud service providers
provide different kind of services based on those layers.
• This layer generally allows access to internal data with some authentication
mechanism. The second layer is a platform as a service, this layer contains various
mappings of users request to the required resource that resides on cloud
computing.
. CRYPTOGRAPHY
• It is a branch of security that proposes hundreds of algorithms that can be
used for secure communication among various users or storing data securely
on some media.
• This field provides methods for encryption, decryption and validation checks
for a different purpose. Encryption stands for converting simple plain text to
some cipher text that is not easily understandable.
• Decryption performs a reverse process of encryption for recover text from
cipher text. Various approaches, algorithms can be adapted like AES, RSA,
DES, Triple DES and various hashing algorithms like MD5 etc.
LITERATURE SURVEY:
• A combined approach to ensure data security in cloud computing: Cloud computing is
an upcoming revolution in information technology (IT) industry because of its
performance, accessibility, low cost and many other luxuries.
• It is an authenticated based approach to maximize the capacity and the capabilities
vigorously without investing in new infrastructure, nurturing new personnel or licensing
new software. It provides gigantic storage for data and faster computing to customers
over the internet.
• It essentially shifts the database and application software to the large data centres,
i.e., cloud, where management of data and services may not completely trustworthy.
• That is why companies are reluctant to deploy their business in the cloud even cloud
computing offers a wide range of luxuries. Security of data in the cloud is one of the
major issues which acts as an obstacle to the implementation of cloud computing.
PROPOSED SYSTEM:

• In this paper, a framework comprising of different techniques and specialized


procedures is proposed that can efficiently protect the data from the
beginning to the end, i.e., from the owner to the cloud and then to the user.
We commence with the classification of data on the basis of three
cryptographic parameters presented by the user, i.e.
• Confidentiality(C), Availability (A) and Integrity (I).
PLANNING AND ANALYSIS:
• The main task of this project was to provide as secure file storage on the multicloud as possible. So,
several issues had to be sorted out like:
• Where the file needs to be encrypted.?
• How the user must be authenticated?
• What will be the key for AES encryption?
• How this key will be related to mathematical exchange protocol?
• While analysing all these questions we came upon this course of action. To provide greater control to
the owner of the file we encrypted the file on the owner’s computer itself using an application. The
mathematical equation was used to generate the file and only those users who have the final same
key from this process would be able to decrypt the file.
• The final key generated from the proposed algorithm, being same for both intended participants, was
used as the basis for the key for AES encryption.
CONCLUSION:
• In this research paper, we have implemented a proposed structure based on the
question to establish secure link sharing mechanism between multi-cloud and
transferring same copy of data to another server which will allow the facility to
cloud consumers sharing a huge data without any kind of issue of the security or
privacy.
THANK YOU

You might also like