Hybrid.edid.docx

  • Uploaded by: Nagesh Lakshminarayan
  • 0
  • 0
  • November 2019
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Hybrid.edid.docx as PDF for free.

More details

  • Words: 579
  • Pages: 5
VISVESVARAYA TECHNOLOGICAL UNIVERSITY “JANANA SANGAMA”, BELAGAVI, KARNATAKA, INDIA-590 018.

SYNOPSIS ON “Data Security and Authentication in Hybrid Cloud Computing Model” SUBMITTED BY Nagesh Prasad

4VV15CS406

UNDER THE GUIDANCE OF NANDINI S.B Assistant Professor & Dept. of CS&E, VVCE, Mysuru.

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING VIDYAVARDHAKA COLLEGE OF ENGINEERING GOKULUM, 3rd STAGE, MYSURU-570 002

2017-18

ABSTRACT The progress and mature of cloud computing technology, the social demand for cloud computing is growing. Meanwhile the demand of data security is increasing sharply, especially in hybrid cloud computing model. This paper describes several methods to protect user data, which includes single en-crypt ion, multi-level virtualization, and authentication interface. Authentication intercloud is the other main theme of this paper. This paper also discussed a model of authentication intercloud which based on CA and PKI model which be extended to the scenario without CA system or it crashed. The hybrid cloud, which means the cloud system combined the private cloud and public cloud, is becoming an important part of commercial cloud computing model. The private cloud could provide the most security for users data, and this lacks the scalability. And the public cloud could satisfy the demand of the scalability. Hybrid cloud could provide both security and the scalability at the same time. However, there still are some problems about the data security because when user extends their application to the public cloud, the cloud computing provider could access the user’s privacy data.

REAL TIME APPLICATIONS 

Protected, confidential, and sensitive information can be stored on a private cloud while still leveraging resources of the public cloud to run apps that rely on that data. This is especially important for businesses that store sensitive data for their customers. (Think health care providers and payroll processors, for example.)



The two clouds meet industry standards for data security when handling sensitive data.



Synchronize data by using an IP Multimedia Core Network Subsystem (IMS).



In case of DOS attacks

Flow analytics can fend off DoD attacks by reacting

to the incursion and redirecting traffic to a mitigation device 

Hybrid cloud computing model provides a greater flexibility: private cloud part can guarantee the safety of the user’s data; public cloud can provide users with good scalability..

REFERENCES [1] Miller M (2008) Cloud Computing: Web-Based Applications That Change the Way You Work and Collaborate Online. Que Publishing, Indianapolis [2] Reese G (2009) Cloud Application Architectures. O’Reilly Media, Sebastopol, CA [3] Sun (2009a) A Guide to Getting Started with Cloud Computing. Sun white paper. https://www.sun.com/offers/docs/cloud_computing _primer.pdf. Accessed: 10 June 2009 [4] Foster I, Zhao Y, Raicu I, Lu S (2008) Cloud Computing and Grid Computing 360-Degree Compared. [5] RightScale (2008) Define Cloud Computing. RightScale Blog, 26 May 2008. http://blog.rightscale.com/2008/05/26/define-cloud-computing/. Accessed: 9 Jun 2009 [6] Mertz SA, Eschinger C, Eid T, Pring B (2007) Dataquest Insight: SaaS Demand Set to Outpace Enterprise Application Software Market Growth. Gartner RAS Core Research Note, 3 August 2007 [7] Eymann T (2008) Cloud computing. Enzyklopädie der Wirtschaftsinformatik. Accessed: 10 June 2009 [8] Gartner (2008c) Gartner Says Worldwide SaaS Revenue in the Enterprise Application Markets Will Grow 27 Per Cent in 2008. Gartner press release, 22 October 2008. [9] Armbrust M, Fox A, Griffith R, Joseph AD, Katz RH, Konwinski A, Lee G, Patterson DA, Rabkin A, Stoica I, Zaharia M (2009) Above the Clouds – A Berkeley View of Cloud. Technical report UCB/EECS2009-28, EECS Department, University of Berkeley, California, 10 February 2009.

Signature of the Guide (Assistant professor Nandini S.B)

More Documents from "Nagesh Lakshminarayan"

Cloud Atm.docx
November 2019 18
Hybrid.edid.docx
November 2019 10
Nagesh Resume1.docx
November 2019 10
Ncertificate (1).docx
November 2019 13
Naag Report.docx
November 2019 18
Sql Resume.docx
June 2020 6