You are on page 1of 19

A Seminar Presentation on

Protection of Consumer data in Cloud


Computing using Activity Log

Presented by
Relan. Simran .Vinod

Guided by
Prof R.V.Patil

DEPARTMENT OF COMPUTER ENGINEERING


SSVPS’s B.S.DEORE COLLEGE OF ENGINEERING ,DHULE.
2016-2017
Content
• Cloud Computing
• Architecture
• Cloud Security
• Open Stack
• Prototype Solution
• Sample log & logging and monitoring
• Benefits
• Bibliography
• Conclusion
What Is Cloud Computing?
• Cloud computing has become the one of the fast
growing area under upcoming technologies
• Cloud Computing Provides the ability to tens to
thousands of system.
• Cloud Service have five essential characteristics are :-
o On demand service.
o Resource pooling.
o Broad network access.
o Rapid elasticity.
Architecture
Cloud Security
• Cloud computing ,all your data is stored on the cloud.
• Some of the security issues arrives:-
1. Loss of physical control on data.
2. Multi-tenancy.
3. Massive data and intensive computing.
• A threat model help in understanding they security
problem. A threat may be inside or outsider
Cont….
• Cloud Pricing Model.
There are 3 types of data in cloud :
o Data at transit
o Data at rest
o Data in processing
• VM Co-residence.
Open Stack

• Open stack allows users to monitor their activities


and help in reorganizing the abnormalities.
• Open Stack allows the consumer, to allocate their
resources.
Cont…
The cloud services provide every end user with:-
• Open Stack dashboard: -
• Open Stack command-line clients: -
Diagram of Open Stack
Prototyping Solution

• The solution provides a user to log into the


dashboard of open stack directly thereby giving a
hand to the level of security.
• Horizon itself provides a secure authenticated login
to the end user
Cont…
• Every user of Open stack has its dashboard by
default.
• The solution is comprised of two sections,
AUTHENTICATION and LOG VIEWING.
• Login Page: The login page of the tool where the
user enters his user name and password to login to his
account.
Cont…

• Log Display : This window helps the user by


displaying the apt amount of information from the log
files filled with the verbose.
• The selection page contains three categories:-
1. Storage
2. Analyze
3. Server node.
Cont….

•The STORAGE button helps user to get the usage


logs parsed
• The ANALYZE button helps in analyzing the
amount of data transferred
Cont….

•The server node logs containing all the nodes namely,


Container, Object and account.
•These logs are stored in static file.
Sample Log
• They have three different types of log entries
oProxy Logs
oStorage Logs.
oAuthentication requests.
• The above logs have entries for authentication
requests which contains entries under the headers
Configuration Files
• There are two configuration files used in order to
select which headers are needed to be displayed.
o Configuration File For Storage Log
o Configuration File For Server node Log
Benefits
• Third party service have not access to your personal
data.
• On demand solution allow you to pay for only the
option you want.
• Data loss during disasters depending on how often
you migrate you data offsite.
Conclusion
The path of logging and monitoring as the way of
knowing any threat or abnormality happening on the
cloud with the user’s data and amount of information
in the log files to display to judge whether or not
there exist some threat to his data on cloud.
Bibliography
[1]. Nikos Antonopoulos, Lee Gillam, "Cloud Computing:
Principles, Systems and Applications", Published by Springer.

[2]. Z. Xiao and Y. Xiao, "Security and Privacy in Cloud


Computing," in IEEE Communications Surveys & Tutorials,
vol. 15, no. 2, pp. 843859, Second Quarter 2013. doi:
10.1109/SURV.2012.060912.00182

[3]. Anand Darne1 , Rushikesh Longadge, “A Result Analysis on


Secured Encryption in Cloud Computing using Symmetric
Cryptography”, International Journal of Computer Science and
Mobile Computing, Vol.3 Issue.7, July- 2014, pg. 680-688.

You might also like