ABSTRACT:
Offering
strong data protection to cloud users while enabling rich applications is a
challenging task. We explore a new cloud platform architecture called Data
Protection as a Service, which dramatically reduces the per-application
development effort required to offer data protection, while still allowing
rapid development and maintenance.
EXISTING
SYSTEM:
Cloud
computing promises lower costs, rapid scaling, easier maintenance, and service
availability anywhere, anytime, a key challenge is how to ensure and build
confidence that the cloud can handle user data securely. A recent Microsoft
survey found that “58 percent of the public and 86 percent of business leaders
are excited about the possibilities of cloud computing. But more than 90
percent of them are worried about security, availability, and privacy of their
data as it rests in the cloud.”
DATA
PROTECTION AS A SERVICE
Currently,
users must rely primarily on legal agreements and implied economic
and
reputational harm as a proxy for application trustworthiness. As an
alternative, a cloud platform could help achieve a robust technical solution by
. Making it easy for developers to write maintainable applications that
. Making it easy for developers to write maintainable applications that
protect user
data in the cloud, thereby providing the same economies of scale
for security and privacy as for computation and storage.
for security and privacy as for computation and storage.
. Enabling
independent verification both of the platform’s operation and the
runtime state
of applications on it, so users can gain confidence that their
data is being handled properly.
data is being handled properly.
Much
as an operating system provides isolation between processes but allows
substantial freedom inside a process, cloud platforms could offer transparently
verifiable partitions for applications that compute on data units, while still
allowing broad computational latitude within those partitions.
Cloud computing exhibits the
following key characteristics:
Agility improves with users' ability to
re-provision technological infrastructure resources.
Multi tenancy enables sharing of resources and
costs across a large pool of users thus allowing for.
Utilization and efficiency improvements for systems that are
often only 10–20% utilized.
Reliability is improved if multiple redundant
sites are used, which makes well-designed cloud computing suitable for business continuity and disaster recovery.
Performance is monitored and consistent and
loosely coupled architectures are constructed using web services as
the system interface.
Security could improve
due to centralization of data.
MODULES:
1. Cloud Computing
2. Trusted
Platform Module
3. Third Party Auditor
4. User Module
virtualized resources as a services over the internet Users need not have
knowledge of, expertise in, or control over the technology infrastructure in
the "cloud" that supports them. Cloud computing represents a major
hosting apps and data on an individual desktop computer, everything is
master boot record (MBR), and thus part of the disk, unencrypted. There
User store large amount of data to clouds and access data using
secure key. Secure key provided admin after encrypting data. Encrypt the
data using TPM. User store data after auditor, view and verifying data and
also changed data. User again views data at that time admin provided the
message to user only changes data.
1. Cloud Computing:
Cloud computing is the provision of dynamically scalable and often
virtualized resources as a services over the internet Users need not have
knowledge of, expertise in, or control over the technology infrastructure in
the "cloud" that supports them. Cloud computing represents a major
change in how we store information and run applications.
Instead of
hosting apps and data on an individual desktop computer, everything is
hosted in the "cloud"—an assemblage of computers and servers
accessed
via the Internet.
2
.Trusted Platform Module:
Trusted Platform
Module (TPM) is both the name of a published
specification detailing a secure crypto
processor that can store
cryptographic keys that
protect information, as well as the general name
of implementations of that specification, often called the "TPM chip" or
"TPM Security Device". The TPM specification is the work of the Trusted
of implementations of that specification, often called the "TPM chip" or
"TPM Security Device". The TPM specification is the work of the Trusted
Computing
Group.
Disk encryption
is a technology which protects information by
converting it into unreadable
code that cannot be deciphered easily by
unauthorized people. Disk
encryption uses disk encryption
software or
Disk
encryption prevents unauthorized access to data storage. The term
"full
disk encryption" (or whole disk encryption) is often used to
signify
that everything on a disk is encrypted, including the programs that can
encrypt bootable operating system partitions. But they must still leave the
master boot record (MBR), and thus part of the disk, unencrypted. There
are, however, hardware-based
full disk encryption systems that can truly
encrypt the entire boot
disk, including the MBR.
3. Third Party Auditor:
In this module, Auditor views the all user data and verifying data
and
also changed data. Auditor directly views all user data without key. Admin
provided the permission to Auditor. After auditing data, store to the cloud.
4. User Module:
User store large amount of data to clouds and access data using
secure key. Secure key provided admin after encrypting data. Encrypt the
data using TPM. User store data after auditor, view and verifying data and
also changed data. User again views data at that time admin provided the
message to user only changes data.
CONCLUSION:
As private data moves online, the need to secure it properly becomes
increasingly urgent. The good news is that the same forces concentrating
data
in enormous datacenters will also aid in using collective security
expertise
more effectively. Adding protections to a single cloud platform
can immediately
benefit hundreds of thousands of applications and, by
extension, hundreds of
millions of users. While we have focused here on a
particular, albeit popular
and privacy-sensitive, class of applications, many
other applications also needs solutions.
For more ieee projects visit ieee-projetcs10.com
and Visit our java blog
For more ieee projects visit ieee-projetcs10.com
and Visit our java blog
No comments:
Post a Comment