cloud data protection for the masses ppt
#1

Cloud Data Production for Masses

ABSTRACT


Offering strong data protection to cloud users while enabling rich applications is a challenging task. We explore a new cloud platform architecture called Data Protection as a Service, which dramatically reduces the per-application development effort required to offer data protection, while still allowing rapid development and maintenance.

EXISTING SYSTEM

Cloud computing promises lower costs, rapid scaling, easier maintenance, and service availability anywhere, anytime, a key challenge is how to ensure and build confidence that the cloud can handle user data securely. A recent Microsoft survey found that “58 percent of the public and 86 percent of business leaders are excited about the possibilities of cloud computing. But more than 90 percent of them are worried about security, availability, and privacy of their data as it rests in the cloud.”

PROPOSED SYSTEM

We propose a new cloud computing paradigm, data protection as a service (DPaaS) is a suite of security primitives offered by a cloud platform, which enforces data security and privacy and offers evidence of privacy to data owners, even in the presence of potentially compromised or malicious applications. Such as secure data using encryption, logging, key management.


MODULE DESCRIPTION:
1. Cloud Computing
2. Trusted Platform Module
3. Third Party Auditor
4. User Module

1. Cloud Computing

Cloud computing is the provision of dynamically scalable and often virtualized resources as a services over the internet Users need not have knowledge of, expertise in, or control over the technology infrastructure in the "cloud" that supports them. Cloud computing represents a major change in how we store information and run applications. Instead of hosting apps and data on an individual desktop computer, everything is hosted in the "cloud"—an assemblage of computers and servers accessed via the Internet.
Cloud computing exhibits the following key characteristics:
1. Agility improves with users' ability to re-provision technological infrastructure resources.
2. Multi tenancy enables sharing of resources and costs across a large pool of users thus allowing for:
3. Utilization and efficiency improvements for systems that are often only 10–20% utilized.
4. Reliability is improved if multiple redundant sites are used, which makes well-designed cloud computing suitable for business continuity and disaster recovery.
5. Performance is monitored and consistent and loosely coupled architectures are constructed using web services as the system interface.
6. Security could improve due to centralization of data, increased security-focused resources, etc., but concerns can persist about loss of control over certain sensitive data, and the lack of security for stored kernels. Security is often as good as or better than other traditional systems, in part because providers are able to devote resources to solving security issues that many customers cannot afford. However, the complexity of security is greatly increased when data is distributed over a wider area or greater number of devices and in multi-tenant systems that are being shared by unrelated users. In addition, user access to security audit logs may be difficult or impossible. Private cloud installations are in part motivated by users' desire to retain control over the infrastructure and avoid losing control of information security.
7. Maintenance of cloud computing applications is easier, because they do not need to be installed on each user's computer and can be accessed from different places.
2 .Trusted Platform Module

Trusted Platform Module (TPM) is both the name of a published specification detailing a secure crypto processor that can store cryptographic keys that protect information, as well as the general name of implementations of that specification, often called the "TPM chip" or "TPM Security Device". The TPM specification is the work of the Trusted Computing Group.

Disk encryption is a technology which protects information by converting it into unreadable code that cannot be deciphered easily by unauthorized people. Disk encryption uses disk encryption software or hardware to encrypt every bit of data that goes on a disk or disk volume. Disk encryption prevents unauthorized access to data storage. The term "full disk encryption" (or whole disk encryption) is often used to signify that everything on a disk is encrypted, including the programs that can encrypt bootable operating system partitions. But they must still leave the master boot record (MBR), and thus part of the disk, unencrypted. There are, however, hardware-based full disk encryption systems that can truly encrypt the entire boot disk, including the MBR.

3. Third Party Auditor

In this module, Auditor views the all user data and verifying data and also changed data. Auditor directly views all user data without key. Admin provided the permission to Auditor. After auditing data, store to the cloud.

4. User Module
User store large amount of data to clouds and access data using secure key. Secure key provided admin after encrypting data. Encrypt the data using TPM. User store data after auditor, view and verifying data and also changed data. User again views data at that time admin provided the message to user only changes data.

System Configuration:-

H/W System Configuration:-

Processor - Pentium –IV
RAM - 512 MB
Hard Disk - 80 GB

S/W System Configuration:-

Operating System :Windows95/98/2000/XP
Application Server : Tomcat5.0/6.X
Front End : HTML, Java, Jsp
Scripts : JavaScript.
Server side Script : Java Server Pages.
Database : Mysql
Database Connectivity : JDBC.



Reply
#2
please send ppts cloud data production for masses
Reply
#3
please send the cloud data production for masses ppt and screen shorts
Reply
#4
Tongue 
(06-01-2013, 06:49 PM)Guest Wrote: Cloud Data Production for Masses

ABSTRACT


Offering strong data protection to cloud users while enabling rich applications is a challenging task. We explore a new cloud platform architecture called Data Protection as a Service, which dramatically reduces the per-application development effort required to offer data protection, while still allowing rapid development and maintenance.

EXISTING SYSTEM

Cloud computing promises lower costs, rapid scaling, easier maintenance, and service availability anywhere, anytime, a key challenge is how to ensure and build confidence that the cloud can handle user data securely. A recent Microsoft survey found that “58 percent of the public and 86 percent of business leaders are excited about the possibilities of cloud computing. But more than 90 percent of them are worried about security, availability, and privacy of their data as it rests in the cloud.”

PROPOSED SYSTEM

We propose a new cloud computing paradigm, data protection as a service (DPaaS) is a suite of security primitives offered by a cloud platform, which enforces data security and privacy and offers evidence of privacy to data owners, even in the presence of potentially compromised or malicious applications. Such as secure data using encryption, logging, key management.


MODULE DESCRIPTION:
1. Cloud Computing
2. Trusted Platform Module
3. Third Party Auditor
4. User Module

1. Cloud Computing

Cloud computing is the provision of dynamically scalable and often virtualized resources as a services over the internet Users need not have knowledge of, expertise in, or control over the technology infrastructure in the "cloud" that supports them. Cloud computing represents a major change in how we store information and run applications. Instead of hosting apps and data on an individual desktop computer, everything is hosted in the "cloud"—an assemblage of computers and servers accessed via the Internet.
Cloud computing exhibits the following key characteristics:
1. Agility improves with users' ability to re-provision technological infrastructure resources.
2. Multi tenancy enables sharing of resources and costs across a large pool of users thus allowing for:
3. Utilization and efficiency improvements for systems that are often only 10–20% utilized.
4. Reliability is improved if multiple redundant sites are used, which makes well-designed cloud computing suitable for business continuity and disaster recovery.
5. Performance is monitored and consistent and loosely coupled architectures are constructed using web services as the system interface.
6. Security could improve due to centralization of data, increased security-focused resources, etc., but concerns can persist about loss of control over certain sensitive data, and the lack of security for stored kernels. Security is often as good as or better than other traditional systems, in part because providers are able to devote resources to solving security issues that many customers cannot afford. However, the complexity of security is greatly increased when data is distributed over a wider area or greater number of devices and in multi-tenant systems that are being shared by unrelated users. In addition, user access to security audit logs may be difficult or impossible. Private cloud installations are in part motivated by users' desire to retain control over the infrastructure and avoid losing control of information security.
7. Maintenance of cloud computing applications is easier, because they do not need to be installed on each user's computer and can be accessed from different places.
2 .Trusted Platform Module

Trusted Platform Module (TPM) is both the name of a published specification detailing a secure crypto processor that can store cryptographic keys that protect information, as well as the general name of implementations of that specification, often called the "TPM chip" or "TPM Security Device". The TPM specification is the work of the Trusted Computing Group.

Disk encryption is a technology which protects information by converting it into unreadable code that cannot be deciphered easily by unauthorized people. Disk encryption uses disk encryption software or hardware to encrypt every bit of data that goes on a disk or disk volume. Disk encryption prevents unauthorized access to data storage. The term "full disk encryption" (or whole disk encryption) is often used to signify that everything on a disk is encrypted, including the programs that can encrypt bootable operating system partitions. But they must still leave the master boot record (MBR), and thus part of the disk, unencrypted. There are, however, hardware-based full disk encryption systems that can truly encrypt the entire boot disk, including the MBR.

3. Third Party Auditor

In this module, Auditor views the all user data and verifying data and also changed data. Auditor directly views all user data without key. Admin provided the permission to Auditor. After auditing data, store to the cloud.

4. User Module
User store large amount of data to clouds and access data using secure key. Secure key provided admin after encrypting data. Encrypt the data using TPM. User store data after auditor, view and verifying data and also changed data. User again views data at that time admin provided the message to user only changes data.

System Configuration:-

H/W System Configuration:-

Processor - Pentium –IV
RAM - 512 MB
Hard Disk - 80 GB

S/W System Configuration:-

Operating System :Windows95/98/2000/XP
Application Server : Tomcat5.0/6.X
Front End : HTML, Java, Jsp
Scripts : JavaScript.
Server side Script : Java Server Pages.
Database : Mysql
Database Connectivity : JDBC.

Reply
#5
[/font]hey hi.....
can u plz help me by sending ER diagram for this topic......and also if you have any algorithm used kindly reply me with that too.....this is my email id....
vainathi.a[at]gmail.com
thank you......
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Tagged Pages: cloud data protection for the masses ppt slides, cloud data protection for the masses ppt,
Popular Searches: cloud internet protection, lliterature survey for cloud data protection for masses, uml diagrams for project cloud data protection for the masses, what isthird party auditor in cloud data protection for masses, data protection in cloud computing ppt, data protection bill, pc data securitydisk protection,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  seminar report on 3d solar cells ppt paper presentation ppt seminars report on 3d solar cells ppt paper presentation ppt 5 43,045 15-04-2018, 08:39 AM
Last Post: Guest
  cloud data protection for the masses documentation 7 4,110 04-12-2017, 03:23 PM
Last Post: jaseela123d
  introduction to data compression khalid sayood solution manual 7 7,000 04-05-2017, 01:17 PM
Last Post: jaseela123d
  m phil computer science thesis topics in data mining 1 1,349 15-04-2017, 02:12 PM
Last Post: jaseela123d
Sad heart disease data mining source code 1 895 11-04-2017, 02:35 PM
Last Post: jaseela123d
  data recovery seminars topic in pdf 1 1,884 11-04-2017, 12:07 PM
Last Post: jaseela123d
  district medical data center based on cloud computing ppt 1 915 10-04-2017, 04:19 PM
Last Post: jaseela123d
  uml diagrams for toward secure and dependable storage services in cloud computing 1 890 10-04-2017, 02:48 PM
Last Post: jaseela123d
  role of internet technology in future mobile data system ppt download 1 1,075 10-04-2017, 12:07 PM
Last Post: jaseela123d
  ieee 14 bus system data matlab 1 777 07-04-2017, 04:52 PM
Last Post: jaseela123d

Forum Jump: