Introduction
Cloud Computing
Cloud computing providers
• Amazon Web Services (AWS):
• Machine learning, web applications, …
• IBM cloud services
• Microsoft Cloud service:
• (office 365)
• Google Cloud Platform (GCP):
• Web services, cloud computing, data storage.
• Google Colaboratory:
• Free Jupyter notebook environment.
Literature Survey
Cloud Benefits:
• pay-for- use.
• fast deployment.
• scalability.
• lower costs.
• rapid elasticity.
• rapid provisioning.
• ubiquitous network access.
• greater resiliency.
• low-cost disaster recovery and data storage solutions.
• hypervisor protection against network attacks.
• on demand security controls.
• real time detection of system tampering.
• and rapid re-constitution of services.
Literature Survey
• cloud computing challenges from security point of view:
- virtualization vulnerabilities.
- accessibility vulnerabilities.
- web application vulnerabilities such as SQL (Structured Query
Language) injection, cross-site scripting.
- privacy and control issues.
- arising from third parties having physical control of data.
- physical access issues.
- issues related to credential management.
- identity and issues related to data verification.
- integrity.
- data loss and theft.
- issues related to authentication of the respondent device or devices and IP
spooling.
CLOUD ENVIRONMENT LAYERS
CLOUD ENVIRONMENT LAYERS
• Deployment Models:
- Public Cloud.
- Private Cloud.
- Hybrid Cloud.
- Community Cloud.
• Delivery Models:
- IaaS (Infrastructure as a Service) delivery.
- PaaS (Platform as a Service).
- SaaS (Software as a Service) models.
CLOUD ENVIRONMENT LAYERS
• Character Models:
- multi-tenancy.
- on-demand self-service.
- ubiquitous network.
- measured service.
- rapid elasticity.
GAPS AND SECURITY ISSUES IN SERVICE MODELS
1. Security and privacy
2. Portability
3. Interoperability
GAPS AND SECURITY ISSUES IN SERVICE
MODELS
• Other issues :
1. Data confidentiality
2. Availability of service
3. Scalable storage
4. Unpredictable costs
5. Bandwidth costs
Denial Of service attack(DOS)
Denial Of service attack(DOS) classification :
1. Naive Bayes
2. multilayer perceptron
3. support vector machine
4. Decision Tree(C4.5)
5. Partial Tree(PART)
Denial Of service attack(DOS) classification :
Decision Tree
C 4.5 Algorithm
Decision Tree
Decision Tree

More Related Content

KEY
Rich Internet Applications and Flex - 3
PDF
Deep dive in to modern it technology
PPTX
Clouds Infrastructure Administration
PPTX
Introduction to cloud computing
PPTX
Building Data Solutions with Azure
PPTX
Real time communication with Azure Functions with Azure SignalR
PPTX
Azure Identity and access management
PPTX
Securing an Azure Function REST API with Azure Active Directory
Rich Internet Applications and Flex - 3
Deep dive in to modern it technology
Clouds Infrastructure Administration
Introduction to cloud computing
Building Data Solutions with Azure
Real time communication with Azure Functions with Azure SignalR
Azure Identity and access management
Securing an Azure Function REST API with Azure Active Directory

What's hot (20)

PPTX
Step into cloud
PPTX
Logic Apps & BizTalk Server 2016
PPTX
TechEvent Einführung in die Amazon Cloud
PDF
247 overviewmongodbevening-bangalore
PDF
Introduction to aws data pipeline services
PPTX
DEV-1129 How Watson, Bluemix, Cloudant, and XPages Can Work Together In A Rea...
PPTX
Cloud computing ft
KEY
Introduction to cloud computing
PPTX
Using Premium Data - for Business Analysts
PPTX
Hybrid Integration with BizTalk Server - ACSUG
PPTX
Pyramid vs QlikView
PPTX
Pyramid Analytics vs Sisense
PPTX
Workflow All the Things with Azure Logic Apps
PPTX
Azure.application development.nhut.nguyen
PPTX
Microsoft Azure News - May 2017
PPTX
Logic Apps and Azure Functions
PDF
Lego bricks of cloud applications
PDF
Altitude San Francisco 2018: Scale and Stability at the Edge with 1.4 Billion...
PPTX
PDF
MongoDB World 2018: Data Models for Storing Sophisticated Customer Journeys i...
Step into cloud
Logic Apps & BizTalk Server 2016
TechEvent Einführung in die Amazon Cloud
247 overviewmongodbevening-bangalore
Introduction to aws data pipeline services
DEV-1129 How Watson, Bluemix, Cloudant, and XPages Can Work Together In A Rea...
Cloud computing ft
Introduction to cloud computing
Using Premium Data - for Business Analysts
Hybrid Integration with BizTalk Server - ACSUG
Pyramid vs QlikView
Pyramid Analytics vs Sisense
Workflow All the Things with Azure Logic Apps
Azure.application development.nhut.nguyen
Microsoft Azure News - May 2017
Logic Apps and Azure Functions
Lego bricks of cloud applications
Altitude San Francisco 2018: Scale and Stability at the Edge with 1.4 Billion...
MongoDB World 2018: Data Models for Storing Sophisticated Customer Journeys i...
Ad

Similar to Data mining technique in securing the cloud (20)

PPTX
cloud_computing_Infrastucture_as_cloud_p
PPTX
UNIT I - UNDERSTANDING CLOUD COMPUTING.pptx
PPTX
Quantum_Cloud_Computing_Presentation.pptx
PPTX
Cloud_Computing_Professional_Presentation.pptx
PDF
Cloud Computing v.s. Cyber Security
PPTX
Cloud computing
PPTX
Jjm cloud computing
PDF
[Viet openstack] cloud computing - openstack meetup v2
PPTX
Cloud_ Computing_ Presentation. pptx
PPT
A Complete Guide Cloud Computing
PPTX
cloud computing
PPTX
Virtualization and cloud computing
PPTX
Cloud computing and data security
PPT
Cloud computing 2
PPTX
Cloud computing-security-from-single-to-multiple-140211071429-phpapp01
PPTX
A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016
PPTX
CLOUD COMPUTING In Brief UNIT I PPT.pptx
PPTX
Security on AWS
PPTX
Cloud_Technologies_Presentation.pptx-SAMPLE
cloud_computing_Infrastucture_as_cloud_p
UNIT I - UNDERSTANDING CLOUD COMPUTING.pptx
Quantum_Cloud_Computing_Presentation.pptx
Cloud_Computing_Professional_Presentation.pptx
Cloud Computing v.s. Cyber Security
Cloud computing
Jjm cloud computing
[Viet openstack] cloud computing - openstack meetup v2
Cloud_ Computing_ Presentation. pptx
A Complete Guide Cloud Computing
cloud computing
Virtualization and cloud computing
Cloud computing and data security
Cloud computing 2
Cloud computing-security-from-single-to-multiple-140211071429-phpapp01
A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016
CLOUD COMPUTING In Brief UNIT I PPT.pptx
Security on AWS
Cloud_Technologies_Presentation.pptx-SAMPLE
Ad

Recently uploaded (20)

PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PDF
Two-dimensional Klein-Gordon and Sine-Gordon numerical solutions based on dee...
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
OpenACC and Open Hackathons Monthly Highlights July 2025
PDF
Five Habits of High-Impact Board Members
PDF
CloudStack 4.21: First Look Webinar slides
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PPT
What is a Computer? Input Devices /output devices
PPTX
2018-HIPAA-Renewal-Training for executives
PDF
A review of recent deep learning applications in wood surface defect identifi...
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PDF
Credit Without Borders: AI and Financial Inclusion in Bangladesh
PPTX
Chapter 5: Probability Theory and Statistics
PPTX
Configure Apache Mutual Authentication
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
UiPath Agentic Automation session 1: RPA to Agents
Convolutional neural network based encoder-decoder for efficient real-time ob...
Two-dimensional Klein-Gordon and Sine-Gordon numerical solutions based on dee...
A comparative study of natural language inference in Swahili using monolingua...
OpenACC and Open Hackathons Monthly Highlights July 2025
Five Habits of High-Impact Board Members
CloudStack 4.21: First Look Webinar slides
NewMind AI Weekly Chronicles – August ’25 Week III
sustainability-14-14877-v2.pddhzftheheeeee
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
What is a Computer? Input Devices /output devices
2018-HIPAA-Renewal-Training for executives
A review of recent deep learning applications in wood surface defect identifi...
A contest of sentiment analysis: k-nearest neighbor versus neural network
Getting started with AI Agents and Multi-Agent Systems
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
Credit Without Borders: AI and Financial Inclusion in Bangladesh
Chapter 5: Probability Theory and Statistics
Configure Apache Mutual Authentication
Module 1.ppt Iot fundamentals and Architecture
UiPath Agentic Automation session 1: RPA to Agents

Data mining technique in securing the cloud

  • 3. Cloud computing providers • Amazon Web Services (AWS): • Machine learning, web applications, … • IBM cloud services • Microsoft Cloud service: • (office 365) • Google Cloud Platform (GCP): • Web services, cloud computing, data storage. • Google Colaboratory: • Free Jupyter notebook environment.
  • 4. Literature Survey Cloud Benefits: • pay-for- use. • fast deployment. • scalability. • lower costs. • rapid elasticity. • rapid provisioning. • ubiquitous network access. • greater resiliency. • low-cost disaster recovery and data storage solutions. • hypervisor protection against network attacks. • on demand security controls. • real time detection of system tampering. • and rapid re-constitution of services.
  • 5. Literature Survey • cloud computing challenges from security point of view: - virtualization vulnerabilities. - accessibility vulnerabilities. - web application vulnerabilities such as SQL (Structured Query Language) injection, cross-site scripting. - privacy and control issues. - arising from third parties having physical control of data. - physical access issues. - issues related to credential management. - identity and issues related to data verification. - integrity. - data loss and theft. - issues related to authentication of the respondent device or devices and IP spooling.
  • 7. CLOUD ENVIRONMENT LAYERS • Deployment Models: - Public Cloud. - Private Cloud. - Hybrid Cloud. - Community Cloud. • Delivery Models: - IaaS (Infrastructure as a Service) delivery. - PaaS (Platform as a Service). - SaaS (Software as a Service) models.
  • 8. CLOUD ENVIRONMENT LAYERS • Character Models: - multi-tenancy. - on-demand self-service. - ubiquitous network. - measured service. - rapid elasticity.
  • 9. GAPS AND SECURITY ISSUES IN SERVICE MODELS 1. Security and privacy 2. Portability 3. Interoperability
  • 10. GAPS AND SECURITY ISSUES IN SERVICE MODELS • Other issues : 1. Data confidentiality 2. Availability of service 3. Scalable storage 4. Unpredictable costs 5. Bandwidth costs
  • 11. Denial Of service attack(DOS)
  • 12. Denial Of service attack(DOS) classification : 1. Naive Bayes 2. multilayer perceptron 3. support vector machine 4. Decision Tree(C4.5) 5. Partial Tree(PART)
  • 13. Denial Of service attack(DOS) classification :
  • 14. Decision Tree C 4.5 Algorithm