Pages

Tuesday 30 October 2012

Cloud Data Production for the Masses


ABSTRACT:


            Offering strong data protection to cloud users while enabling rich applications is a challenging task. We explore a new cloud platform architecture called Data Protection as a Service, which dramatically reduces the per-application development effort required to offer data protection, while still allowing rapid development and maintenance.
EXISTING SYSTEM:

Cloud computing promises lower costs, rapid scaling, easier maintenance, and service availability anywhere, anytime, a key challenge is how to ensure and build confidence that the cloud can handle user data securely. A recent Microsoft survey found that “58 percent of the public and 86 percent of business leaders are excited about the possibilities of cloud computing. But more than 90 percent of them are worried about security, availability, and privacy of their data as it rests in the cloud.”

DATA PROTECTION AS A SERVICE

Currently, users must rely primarily on legal agreements and implied economic 

and reputational harm as a proxy for application trustworthiness. As an 

alternative, a cloud platform could help achieve a robust technical solution by 

 . Making it easy for developers to write maintainable applications that 

     protect user data in the cloud, thereby providing the same economies of scale 
    
     for  security and privacy as for computation and storage.
    
     . Enabling independent verification both of the platform’s operation and the 

     runtime state of applications on it, so users can gain confidence that their  

 data is being handled properly.

     Much as an operating system provides isolation between processes but allows 

    substantial freedom inside a process, cloud platforms could offer transparently 

    verifiable partitions for applications that compute on data units, while still 

    allowing broad computational latitude within those partitions.

     Cloud computing exhibits the following key characteristics:
   Agility improves with users' ability to re-provision technological infrastructure resources.
   Multi tenancy enables sharing of resources and costs across a large pool of users thus allowing for.
   Utilization and efficiency improvements for systems that are often only 10–20% utilized.
    Reliability is improved if multiple redundant sites are used, which makes well-designed cloud computing suitable for business continuity and disaster recovery.
   Performance is monitored and consistent and loosely coupled architectures are constructed using web services as the system interface.
   Security could improve due to centralization of data.

MODULES:

1.      Cloud Computing
2.      Trusted Platform Module
3.      Third Party Auditor
4.      User Module



1. Cloud Computing:

Cloud computing is the provision of dynamically scalable and often 

virtualized resources as a services over the internet Users need not have 

knowledge of, expertise in, or control over the technology infrastructure in 

the "cloud" that supports them. Cloud computing represents a major

change in how we store information and run applications. Instead of

hosting apps and data on an individual desktop computer, everything is


hosted in the "cloud"—an assemblage of computers and servers accessed


via the Internet.

 
2 .Trusted Platform Module:

        Trusted Platform Module (TPM) is both the name of a published  

specification detailing a secure crypto processor that can store  

cryptographic keys that protect information, as well as the general name 

of implementations of that specification, often called the "TPM chip" or  

"TPM Security Device". The TPM specification is the work of the Trusted 

Computing Group.

     Disk encryption is a technology which protects information by 

converting it into unreadable code that cannot be deciphered easily by 

unauthorized people. Disk encryption uses disk encryption software or  

hardware to encrypt every bit of data that goes on a disk or disk volume

Disk encryption prevents unauthorized access to data storage. The term 

"full disk encryption" (or whole disk encryption) is often used to signify 

that everything on a disk is encrypted, including the programs that can 

encrypt bootable operating system partitions. But they must still leave the  

 master boot record (MBR), and thus part of the disk, unencrypted. There 

are, however, hardware-based full disk encryption systems that can truly 

encrypt the entire boot disk, including the MBR.

3. Third Party Auditor:

     In this module, Auditor views the all user data and verifying data and 

also changed data. Auditor directly views all user data without key. Admin 

provided the permission to Auditor. After auditing data, store to the cloud.

4. User Module:
 

      User store large amount of data to clouds and access data using 

secure key. Secure key provided admin after encrypting data. Encrypt the 

data using TPM. User store data after auditor, view and verifying data and 

also changed data. User again views data at that time admin provided the 

message to user only changes data.

CONCLUSION:
                       
 As private data moves online, the need to secure it properly becomes 

increasingly urgent. The good news is that the same forces  concentrating 

data in enormous datacenters will also aid in using collective security 

expertise more effectively. Adding protections to a single cloud platform 

can immediately benefit hundreds of thousands of applications and, by 

extension, hundreds of millions of users. While we have focused here on a 

particular, albeit popular and privacy-sensitive, class of applications, many 

other applications also needs solutions.

For more ieee projects visit ieee-projetcs10.com
and Visit our java blog



No comments:

Post a Comment