VISVESVARAYA TECHNOLOGICAL UNIVERSITY “JANANA SANGAMA”, BELAGAVI, KARNATAKA, INDIA-590 018.
SYNOPSIS ON “Data Security and Authentication in Hybrid Cloud Computing Model” SUBMITTED BY Nagesh Prasad
4VV15CS406
UNDER THE GUIDANCE OF NANDINI S.B Assistant Professor & Dept. of CS&E, VVCE, Mysuru.
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING VIDYAVARDHAKA COLLEGE OF ENGINEERING GOKULUM, 3rd STAGE, MYSURU-570 002
2017-18
ABSTRACT The progress and mature of cloud computing technology, the social demand for cloud computing is growing. Meanwhile the demand of data security is increasing sharply, especially in hybrid cloud computing model. This paper describes several methods to protect user data, which includes single en-crypt ion, multi-level virtualization, and authentication interface. Authentication intercloud is the other main theme of this paper. This paper also discussed a model of authentication intercloud which based on CA and PKI model which be extended to the scenario without CA system or it crashed. The hybrid cloud, which means the cloud system combined the private cloud and public cloud, is becoming an important part of commercial cloud computing model. The private cloud could provide the most security for users data, and this lacks the scalability. And the public cloud could satisfy the demand of the scalability. Hybrid cloud could provide both security and the scalability at the same time. However, there still are some problems about the data security because when user extends their application to the public cloud, the cloud computing provider could access the user’s privacy data.
REAL TIME APPLICATIONS
Protected, confidential, and sensitive information can be stored on a private cloud while still leveraging resources of the public cloud to run apps that rely on that data. This is especially important for businesses that store sensitive data for their customers. (Think health care providers and payroll processors, for example.)
The two clouds meet industry standards for data security when handling sensitive data.
Synchronize data by using an IP Multimedia Core Network Subsystem (IMS).
In case of DOS attacks
Flow analytics can fend off DoD attacks by reacting
to the incursion and redirecting traffic to a mitigation device
Hybrid cloud computing model provides a greater flexibility: private cloud part can guarantee the safety of the user’s data; public cloud can provide users with good scalability..
REFERENCES [1] Miller M (2008) Cloud Computing: Web-Based Applications That Change the Way You Work and Collaborate Online. Que Publishing, Indianapolis [2] Reese G (2009) Cloud Application Architectures. O’Reilly Media, Sebastopol, CA [3] Sun (2009a) A Guide to Getting Started with Cloud Computing. Sun white paper. https://www.sun.com/offers/docs/cloud_computing _primer.pdf. Accessed: 10 June 2009 [4] Foster I, Zhao Y, Raicu I, Lu S (2008) Cloud Computing and Grid Computing 360-Degree Compared. [5] RightScale (2008) Define Cloud Computing. RightScale Blog, 26 May 2008. http://blog.rightscale.com/2008/05/26/define-cloud-computing/. Accessed: 9 Jun 2009 [6] Mertz SA, Eschinger C, Eid T, Pring B (2007) Dataquest Insight: SaaS Demand Set to Outpace Enterprise Application Software Market Growth. Gartner RAS Core Research Note, 3 August 2007 [7] Eymann T (2008) Cloud computing. Enzyklopädie der Wirtschaftsinformatik. Accessed: 10 June 2009 [8] Gartner (2008c) Gartner Says Worldwide SaaS Revenue in the Enterprise Application Markets Will Grow 27 Per Cent in 2008. Gartner press release, 22 October 2008. [9] Armbrust M, Fox A, Griffith R, Joseph AD, Katz RH, Konwinski A, Lee G, Patterson DA, Rabkin A, Stoica I, Zaharia M (2009) Above the Clouds – A Berkeley View of Cloud. Technical report UCB/EECS2009-28, EECS Department, University of Berkeley, California, 10 February 2009.
Signature of the Guide (Assistant professor Nandini S.B)