Cloud Data Protection for the Masses



Similar documents
Cloud Data Protection for the Masses

IJCSES Vol.7 No.4 October 2013 pp Serials Publications A NEW PARADIGM FOR DATA STORAGE IN CLOUD COMPUTING WITH SAFETY AND SECURITY

Secure cloud access system using JAR ABSTRACT:

Cloud Data Protection for the Masses

PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE

A New Cloud Paradigm: Data Protection as a Service (DPASS)

Cloud Computing-A Tool For Future

preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.

CloudFTP: A free Storage Cloud

How To Ensure Correctness Of Data In The Cloud

Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds

Online Student Attendance Management System using Android

9/26/2011. What is Virtualization? What are the different types of virtualization.

Business Analytics in the Cloud Rapid, Low-cost Deployment for the Enterprise

Rapid Application Development

Windows Server 2008 Essentials. Installation, Deployment and Management

Smart Data Back-up Technique for Cloud Computing using Secure Erasure Coding

Android City Tour Guide System

Start building a trusted environment now... (before it s too late) IT Decision Makers

Activatiecode voor NovaBACKUP BUSINESS ESSENTIALS voor 1 Windows Server/Exchange/SQL,VMware/Hyper-V

Detecting false users in Online Rating system & Securing Reputation

System requirements for MuseumPlus and emuseumplus

Windows 7. Qing Liu Michael Stevens

INTRODUCTION TO WINDOWS 7

OPTIMAL MULTI SERVER CONFIGURATION FOR PROFIT MAXIMIZATION IN CLOUD COMPUTING

Acronis True Image 2015 REVIEWERS GUIDE

Windows Server 2008 R2 Essentials

Trust based Peer-to-Peer System for Secure Data Transmission ABSTRACT:

COMLINK Cloud Technical Specification Guide CLOUD DESKTOP

The deployment of OHMS TM. in private cloud

Virtualization in Linux a Key Component for Cloud Computing

SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS

QuickSpecs. Overview. Compaq Remote Insight Lights-Out Edition

Desktop Virtualization in the Educational Environment

A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract

AirPatrol Corporation White Paper: Wireless Endpoint Security

Symantec Backup Exec.cloud

Cloud Cost Management for Customer Sensitive Data

Microsoft Office 365 from Vodafone. Do business virtually anywhere

Sage Nonprofit Online and Sage Virtual Services. Frequently Asked Questions

Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Q&A. DEMO Version

Microsoft Office 365 Small Business from Vodafone. What will you achieve?

Flexible cloud backup service on CloudByte

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features

Microsoft Office Outlook 2013: Part 1

Security Overview for Windows Vista. Bob McCoy, MCSE, CISSP/ISSAP Technical Account Manager Microsoft Corporation

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows

Hardware/Software Guidelines

SECURITY THREATS TO CLOUD COMPUTING

Technology Partners. Acceleratio Ltd. is a software development company based in Zagreb, Croatia, founded in 2009.

How To Create A Desktop Computer From A Computer Or Mouse And Keyboard (For Business)

DYNAMIC GOOGLE REMOTE DATA COLLECTION

Installing and Upgrading to Windows XP

CLOUD COMPUTING INTRODUCTION HISTORY

Install Guide Housatonic Project Plan for PC. Housatonic Software - Project Plan 365 App

Cloud Computing: A Question of Trust Maintaining Control and Compliance with Data-centric Information Security

1. System Requirements

Cloud Computing - Architecture, Applications and Advantages

Amazon Cloud Storage Options

Data Security in Cloud

System Requirements for Microsoft Dynamics GP 2015

Index Terms: Data integrity, dependable distributed storage, Cloud Computing

Enterprise Data Protection

Hard Disk Space Management

anywhere, anytime expectations Bring Your Own Device goes mainstream enabling mobility critical for success changing security landscape

DURGA SOFTWARE SOLUTUIONS,S.R NAGAR,HYDERABAD. Ph: , Abstract

SMART Sync 2011 software

Dynamic Resource allocation in Cloud

Complying with PCI Data Security

1. System Requirements

CREDIT CARD FRAUD DETECTION SYSTEM USING GENETIC ALGORITHM

Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao

Windows Small Business Server Proposal

Chapter 12: Windows XP, Vista, and 7

WinMan. Utilizing Terminal Services. Quick Results. Summer, ver a d v a n c e d s y s t e m s

TOP 7 THINGS Every Executive Should Know About Cloud Computing EXECUTIVE BRIEF

Installing Windows XP Professional

Do "standard tools" meet your needs when it comes to providing security for mobile PCs and data media?

EMC SYNCPLICITY FILE SYNC AND SHARE SOLUTION

SCHEDULE A DEMO BACKUP AND RECOVERY. deliver true Business Continuity in one, powerful, integrated system.

IBM Cognos TM1 on Cloud Solution scalability with rapid time to value

Backup & Recovery. 10 Suite PARAGON. Data Sheet. Automatization Features

Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure. Addressing the Concerns of the IT Professional Rob Weber February 2015

Implementing a Desktop Infrastructure. Version: Demo. Page <<1/9>>

Remote Desktop Services

<Insert Picture Here> Introducing Oracle VM: Oracle s Virtualization Product Strategy

Total Data Protection for your business

An Approach Towards Customized Multi- Tenancy

Call: Disaster Recovery/Business Continuity (DR/BC) Services From VirtuousIT

VEMBU VS VEEAM. Why Vembu is Better VEMBU TECHNOLOGIES TRUSTED BY OVER 25,000 BUSINESSES.

CASPER SECURE DRIVE BACKUP

Eballot Software Storage Solutions

Symantec Backup Exec System Recovery

SOFTWARE INSTALLATION INSTRUCTIONS

HC Emission Protected Security Workstation

Activatiecode voor NovaBackup Professional voor 3 pc. Omschrijving NovaBACKUP Professional 14.1

RSA Digital Certificate Solution

Privacy preserving technique to secure cloud

SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES

What s New with VMware Virtual Infrastructure

Transcription:

Cloud Data Protection for the Masses ABSTRACT: Offering strong data protection to cloud users while enabling rich applications is a challenging task. We explore a new cloud platform architecture called Data Protection as a Service, which dramatically reduces the per-application development effort required to offer data protection, while still allowing rapid development and maintenance. EXISTING SYSTEM: Cloud computing promises lower costs, rapid scaling, easier maintenance, and service availability anywhere, anytime, a key challenge is how to ensure and build confidence that the cloud can handle user data securely. A recent Microsoft survey found that 58 percent of the public and 86 percent of business leaders are excited about the possibilities of cloud computing. But more than 90 percent of them are worried about security, availability, and privacy of their data as it rests in the cloud.

PROPOSED SYSTEM: We propose a new cloud computing paradigm, data protection as a service (DPaaS) is a suite of security primitives offered by a cloud platform, which enforces data security and privacy and offers evidence of privacy to data owners, even in the presence of potentially compromised or malicious applications. Such as secure data using encryption, logging, key management. MODULES: Cloud Computing Trusted Platform Module Third Party Auditor User Module MODULES DESCSRIPTION: 1. Cloud Computing Cloud computing is the provision of dynamically scalable and often virtualized resources as a services over the internet Users need not have knowledge of, expertise in, or control over the technology infrastructure in the "cloud" that supports them. Cloud computing represents a major change in how we store

information and run applications. Instead of hosting apps and data on an individual desktop computer, everything is hosted in the "cloud" an assemblage of computers and servers accessed via the Internet. Cloud computing exhibits the following key characteristics: 1. Agility improves with users' ability to re-provision technological infrastructure resources. 2. Multi tenancy enables sharing of resources and costs across a large pool of users thus allowing for: 3. Utilization and efficiency improvements for systems that are often only 10 20% utilized. 4. Reliability is improved if multiple redundant sites are used, which makes welldesigned cloud computing suitable for business continuity and disaster recovery. 5. Performance is monitored and consistent and loosely coupled architectures are constructed using web services as the system interface. 6. Security could improve due to centralization of data, increased securityfocused resources, etc., but concerns can persist about loss of control over certain sensitive data, and the lack of security for stored kernels. Security is often as good as or better than other traditional systems, in part because providers are able to

devote resources to solving security issues that many customers cannot afford. However, the complexity of security is greatly increased when data is distributed over a wider area or greater number of devices and in multi-tenant systems that are being shared by unrelated users. In addition, user access to security audit logs may be difficult or impossible. Private cloud installations are in part motivated by users' desire to retain control over the infrastructure and avoid losing control of information security. 7. Maintenance of cloud computing applications is easier, because they do not need to be installed on each user's computer and can be accessed from different places. 2. Trusted Platform Module Trusted Platform Module (TPM) is both the name of a published specification detailing a secure crypto processor that can store cryptographic keys that protect information, as well as the general name of implementations of that specification, often called the "TPM chip" or "TPM Security Device". The TPM specification is the work of the Trusted Computing Group. Disk encryption is a technology which protects information by converting it into unreadable code that cannot be deciphered easily by unauthorized people. Disk encryption uses disk encryption software or hardware to encrypt every bit of

data that goes on a disk or disk volume. Disk encryption prevents unauthorized access to data storage. The term "full disk encryption" (or whole disk encryption) is often used to signify that everything on a disk is encrypted, including the programs that can encrypt bootable operating system partitions. But they must still leave the master boot record (MBR), and thus part of the disk, unencrypted. There are, however, hardware-based full disk encryption systems that can truly encrypt the entire boot disk, including the MBR. 3. Third Party Auditor In this module, Auditor views the all user data and verifying data and also changed data. Auditor directly views all user data without key. Admin provided the permission to Auditor. After auditing data, store to the cloud. 4. User Module User store large amount of data to clouds and access data using secure key. Secure key provided admin after encrypting data. Encrypt the data using TPM. User store data after auditor, view and verifying data and also changed data. User again views data at that time admin provided the message to user only changes data.

SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS: System : Pentium IV 2.4 GHz. Hard Disk : 40 GB. Floppy Drive : 1.44 Mb. Monitor : 15 VGA Colour. Mouse : Logitech. Ram : 512 Mb. SOFTWARE REQUIREMENTS: Operating system : Windows XP/7. Coding Language : JAVA/J2EE IDE : Netbeans 7.4 Database : MYSQL