SSVPS’s B.S.DEORE COLLEGE OF ENGINEERING ,DHULE. 2016-2017 Content • Cloud Computing • Architecture • Cloud Security • Open Stack • Prototype Solution • Sample log & logging and monitoring • Benefits • Bibliography • Conclusion What Is Cloud Computing? • Cloud computing has become the one of the fast growing area under upcoming technologies • Cloud Computing Provides the ability to tens to thousands of system. • Cloud Service have five essential characteristics are :- o On demand service. o Resource pooling. o Broad network access. o Rapid elasticity. Architecture Cloud Security • Cloud computing ,all your data is stored on the cloud. • Some of the security issues arrives:- 1. Loss of physical control on data. 2. Multi-tenancy. 3. Massive data and intensive computing. • A threat model help in understanding they security problem. A threat may be inside or outsider Cont…. • Cloud Pricing Model. There are 3 types of data in cloud : o Data at transit o Data at rest o Data in processing • VM Co-residence. Open Stack
• Open stack allows users to monitor their activities
and help in reorganizing the abnormalities. • Open Stack allows the consumer, to allocate their resources. Cont… The cloud services provide every end user with:- • Open Stack dashboard: - • Open Stack command-line clients: - Diagram of Open Stack Prototyping Solution
• The solution provides a user to log into the
dashboard of open stack directly thereby giving a hand to the level of security. • Horizon itself provides a secure authenticated login to the end user Cont… • Every user of Open stack has its dashboard by default. • The solution is comprised of two sections, AUTHENTICATION and LOG VIEWING. • Login Page: The login page of the tool where the user enters his user name and password to login to his account. Cont…
• Log Display : This window helps the user by
displaying the apt amount of information from the log files filled with the verbose. • The selection page contains three categories:- 1. Storage 2. Analyze 3. Server node. Cont….
•The STORAGE button helps user to get the usage
logs parsed • The ANALYZE button helps in analyzing the amount of data transferred Cont….
•The server node logs containing all the nodes namely,
Container, Object and account. •These logs are stored in static file. Sample Log • They have three different types of log entries oProxy Logs oStorage Logs. oAuthentication requests. • The above logs have entries for authentication requests which contains entries under the headers Configuration Files • There are two configuration files used in order to select which headers are needed to be displayed. o Configuration File For Storage Log o Configuration File For Server node Log Benefits • Third party service have not access to your personal data. • On demand solution allow you to pay for only the option you want. • Data loss during disasters depending on how often you migrate you data offsite. Conclusion The path of logging and monitoring as the way of knowing any threat or abnormality happening on the cloud with the user’s data and amount of information in the log files to display to judge whether or not there exist some threat to his data on cloud. Bibliography [1]. Nikos Antonopoulos, Lee Gillam, "Cloud Computing: Principles, Systems and Applications", Published by Springer.
[2]. Z. Xiao and Y. Xiao, "Security and Privacy in Cloud
Computing," in IEEE Communications Surveys & Tutorials, vol. 15, no. 2, pp. 843859, Second Quarter 2013. doi: 10.1109/SURV.2012.060912.00182
[3]. Anand Darne1 , Rushikesh Longadge, “A Result Analysis on
Secured Encryption in Cloud Computing using Symmetric Cryptography”, International Journal of Computer Science and Mobile Computing, Vol.3 Issue.7, July- 2014, pg. 680-688.