SlideShare a Scribd company logo
Providing User Security Guarantees in Public
Infrastructure Clouds
ABSTRACT
One such mechanism is platform integrity verification for figure hosts that
support the virtualized cloud infrastructure. Several giant cloud vendors have signaled
sensible implementations of this mechanism, primarily to safeguard the cloud infrastructure
from corporate executive threats and advanced persistent threats. we tend to see 2 major
improvement vectors regarding these implementations. First, details of such proprietary
solutions aren't disclosed and may therefore not be enforced and improved by alternative
cloud platforms. Second, to the most effective of our information, none of the solutions
provides cloud tenants a symbol concerning the integrity of figure hosts supporting their
slice of the cloud infrastructure. To address this, we tend to propose a group of protocols for
sure launch of virtual machines (VM) in IaaS, which give tenants with a symbol that the
requested VM instances were launched on a number with associate degree expected code
stack.
EXISTING SYSTEM PROPOSED SYSTEM
EXISTING CONCEPT:-
 While providers may offer security enhancements
such as protection of data at rest, end-users have
limited or no control over such mechanisms. There is
a clear need for usable and cost-effective cloud
platform security mechanisms suitable for
organizations that rely on cloud infrastructure. A role
may be assigned to multiple users who share the
same secret-key. That means there is no way to
distinguish those assigned users and the secret-key
derivation is not able to support functions, such as
user revocation and traitor tracing.
PROPOSED CONCEPT:-
• Presented experimental results demonstrate the
validity and efficiency of the proposed protocols. The
framework prototype was implemented on a test bed
operating a public electronic health record system,
showing that the proposed protocols can be integrated
into existing cloud environments.
EXISTING TECHNIQUE:-
• Role-Based Access Control (RBAC)
PROPOSED TECHNIQUE:-
• Partially-ordered Hierarchical Encryption (PHE)
TECHNIQUE DEFNITION:-
• Control (RBAC) in place to maintain the
privacy and confidentiality of data for
collaboration with teams. Cloud providers have
access to the data stored in the cloud, and can
control access to it by outside entities the
confidentiality of data and limiting privileged
user access to it.
TECHNIQUE DEFNITION:-
 PHE is more effective than traditional
cryptosystem for tracing-and-revoking because it
can organize all decryption keys into a
hierarchical key structure according to partially
ordering relation of role hierarchy in RBAC.
DRAWBACKS:-
• Time taken for data load
• Data is not secured
ADVANTAGES:-
• Low power resource only used
• Data is secured for storing in cloud
SOFTWARE REQUIREMENT
 Operating system :- Windows 7,8.1
 Front End :- Microsoft Visual Studio .NET 2013
 Coding Language :- C#
 Backend :- DB2
HARDWARE REQUIREMENT
 Processor : Pentium Dual Core 2.00GHZ
 Hard disk : 50 GB
 Mouse : Optical Mouse
 RAM : 2GB(minimum)
• Keyboard : Standard Keyboard (102 keys)
PROPOSED SYSTEM:
• Proposed a user secret-key must be unique and is
accompanied by the user identity. In addition, the
derivation of secret-key in such a construction should
be avoided.
• Advantage of our key structure is that it could be
seamlessly integrated into the existing RBAC
systems. Consequently, an RBAC system can directly
use the public role key to encrypt resources in terms
of users’ assigned roles, and then the users owned the
senior roles can use their privacy keys to decrypt the
encrypted resources.
FUTURE WORK:
• Future system we focus on protection the privacy of
outsourcing data and preventing player abuse in file
syncing and sharing services in the cloud. We highlight the
development of a group-oriented cryptosystem with
especially for tracing and revoking methods that can
ensure the security of player/editor.
• In our future work, we are planning to introduce a
comprehensive anomaly detection, using audit, pattern
matching, and risk assessment, for identifying the
suspected players
PROPOSED TECHNIQUE:
 Threats and mitigation
FUTURE TECHNIQUE:
 Threats and mitigation enhanced
ITDCC05.ppt

More Related Content

DOCX
Providing user security guarantees in public infrastructure clouds
PPTX
Hasbe a hierarchical attribute based solution for flexible and scalable acces...
PPT
ITDCC01.ppt
DOCX
Attribute based encryption with verifiable outsourced decryption
DOCX
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based encryption with verifia...
DOC
Integrity for join queries in the cloud
PPTX
Ensuring data storage security in cloud computing
DOCX
JPJ1407 Expressive, Efficient, and Revocable Data Access Control for Multi-...
Providing user security guarantees in public infrastructure clouds
Hasbe a hierarchical attribute based solution for flexible and scalable acces...
ITDCC01.ppt
Attribute based encryption with verifiable outsourced decryption
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based encryption with verifia...
Integrity for join queries in the cloud
Ensuring data storage security in cloud computing
JPJ1407 Expressive, Efficient, and Revocable Data Access Control for Multi-...

Similar to ITDCC05.ppt (20)

PPTX
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
DOCX
Attribute based encryption with verifiable outsourced decryption
PDF
IRJET- Secure Data Protection in Cloud Computing
PPTX
Key aggregate cryptosystem for scalable data sharing in cloud storage
PPT
Ensuring d.s
PDF
C04932125
PDF
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
PPTX
Privacy preserving public auditing for regenerating-code-based cloud storage
PPT
Ppt1 130410095050-phpapp01
PPT
Ppt1 130410095050-phpapp01
PPT
82ugszwcqn29itkwai2q 140424034504-phpapp01
PPT
Ppt1 130410095050-phpapp01
PPT
Ppt1 130410095050-phpapp01
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
Attribute based encryption with verifiable outsourced decryption
IRJET- Secure Data Protection in Cloud Computing
Key aggregate cryptosystem for scalable data sharing in cloud storage
Ensuring d.s
C04932125
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
Privacy preserving public auditing for regenerating-code-based cloud storage
Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01
82ugszwcqn29itkwai2q 140424034504-phpapp01
Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01

More from Maruthi Jâcs (14)

PPT
ITDNS03.ppt
PPT
ITDNS02.ppt
PPTX
ITIMP40.pptx
PPTX
PPT.pptx
PPTX
ITIMP35.pptx
PPTX
PPT.pptx
PPTX
ITIMP07.pptx
PPTX
ITCM-10 ZR.pptx
PPTX
Doc.pptx
PPTX
HUMAN FOLLOWING SUITCASE.pptx
PPTX
ITIOT01.pptx
PPTX
BRAILLE LANGUAGE TEXT CONVERSION FOR THE VISUALLY-IMPAIRED.pptx
PPTX
Grid connetecd hybrid EV charging.pptx
PPTX
PPT.pptx
ITDNS03.ppt
ITDNS02.ppt
ITIMP40.pptx
PPT.pptx
ITIMP35.pptx
PPT.pptx
ITIMP07.pptx
ITCM-10 ZR.pptx
Doc.pptx
HUMAN FOLLOWING SUITCASE.pptx
ITIOT01.pptx
BRAILLE LANGUAGE TEXT CONVERSION FOR THE VISUALLY-IMPAIRED.pptx
Grid connetecd hybrid EV charging.pptx
PPT.pptx

Recently uploaded (20)

PDF
PROMO FUNCTIONAL BEVERAGES MARKET, USA, MAY-JUNE 2025
PPTX
COMPONENTS OF FOOD jgjtgjjgjgjgjgjgjgjg
PPT
PRODUCTION PRACTICES FOR ANNUAL CROPS.ppt
PPTX
TLE 10 - LESSON 3 MARKET FORM OF EGGS BY GROUP 5 .pptx
PPTX
Vitamin A .pptxjdjdksmxnenxmdmdmdmxmemmxms
PDF
Chapter 04 - Osseous Systefsdm - Copy.pdf
PPTX
FST-401 lecture # 10 food chemistry.pptx
PDF
08_Mango_Dis_PARTIALSTEMPARASITE.pdf -farmers
PPTX
Agrisphere ai powered presision farming marketplace
PPTX
students copy Fundamendals of Cookery final.pptx
PPTX
SEAFOOD IRRADIATION – TECHNOLOGY AND APPLICATION.pptx
DOC
IC毕业证学历认证,白金汉郡新大学毕业证留学生文凭
PDF
plating appetizers and hors d'oeuvres...
PPTX
W1 - Intro to Poetry.pptxbhjbhjhvghcgcgfcgc
PDF
Administrative-Order-No.-2006-0012 Milk Code.pdf
PPTX
FST-401 lecture # 12 food chemistry.pptx
PDF
MODELING ALGORITHM OF ESTIMATION OF RENAL FUNCTION BY THE COCKCROFT AND MDRD ...
PPTX
ALUMINIUM can its compostion and uses of aluminium can
PDF
Ecosure Passing Score with eAuditor Audits & Inspections
PPT
Food Chain and Food Web in the world.ppt
PROMO FUNCTIONAL BEVERAGES MARKET, USA, MAY-JUNE 2025
COMPONENTS OF FOOD jgjtgjjgjgjgjgjgjgjg
PRODUCTION PRACTICES FOR ANNUAL CROPS.ppt
TLE 10 - LESSON 3 MARKET FORM OF EGGS BY GROUP 5 .pptx
Vitamin A .pptxjdjdksmxnenxmdmdmdmxmemmxms
Chapter 04 - Osseous Systefsdm - Copy.pdf
FST-401 lecture # 10 food chemistry.pptx
08_Mango_Dis_PARTIALSTEMPARASITE.pdf -farmers
Agrisphere ai powered presision farming marketplace
students copy Fundamendals of Cookery final.pptx
SEAFOOD IRRADIATION – TECHNOLOGY AND APPLICATION.pptx
IC毕业证学历认证,白金汉郡新大学毕业证留学生文凭
plating appetizers and hors d'oeuvres...
W1 - Intro to Poetry.pptxbhjbhjhvghcgcgfcgc
Administrative-Order-No.-2006-0012 Milk Code.pdf
FST-401 lecture # 12 food chemistry.pptx
MODELING ALGORITHM OF ESTIMATION OF RENAL FUNCTION BY THE COCKCROFT AND MDRD ...
ALUMINIUM can its compostion and uses of aluminium can
Ecosure Passing Score with eAuditor Audits & Inspections
Food Chain and Food Web in the world.ppt

ITDCC05.ppt

  • 1. Providing User Security Guarantees in Public Infrastructure Clouds
  • 2. ABSTRACT One such mechanism is platform integrity verification for figure hosts that support the virtualized cloud infrastructure. Several giant cloud vendors have signaled sensible implementations of this mechanism, primarily to safeguard the cloud infrastructure from corporate executive threats and advanced persistent threats. we tend to see 2 major improvement vectors regarding these implementations. First, details of such proprietary solutions aren't disclosed and may therefore not be enforced and improved by alternative cloud platforms. Second, to the most effective of our information, none of the solutions provides cloud tenants a symbol concerning the integrity of figure hosts supporting their slice of the cloud infrastructure. To address this, we tend to propose a group of protocols for sure launch of virtual machines (VM) in IaaS, which give tenants with a symbol that the requested VM instances were launched on a number with associate degree expected code stack.
  • 3. EXISTING SYSTEM PROPOSED SYSTEM EXISTING CONCEPT:-  While providers may offer security enhancements such as protection of data at rest, end-users have limited or no control over such mechanisms. There is a clear need for usable and cost-effective cloud platform security mechanisms suitable for organizations that rely on cloud infrastructure. A role may be assigned to multiple users who share the same secret-key. That means there is no way to distinguish those assigned users and the secret-key derivation is not able to support functions, such as user revocation and traitor tracing. PROPOSED CONCEPT:- • Presented experimental results demonstrate the validity and efficiency of the proposed protocols. The framework prototype was implemented on a test bed operating a public electronic health record system, showing that the proposed protocols can be integrated into existing cloud environments. EXISTING TECHNIQUE:- • Role-Based Access Control (RBAC) PROPOSED TECHNIQUE:- • Partially-ordered Hierarchical Encryption (PHE)
  • 4. TECHNIQUE DEFNITION:- • Control (RBAC) in place to maintain the privacy and confidentiality of data for collaboration with teams. Cloud providers have access to the data stored in the cloud, and can control access to it by outside entities the confidentiality of data and limiting privileged user access to it. TECHNIQUE DEFNITION:-  PHE is more effective than traditional cryptosystem for tracing-and-revoking because it can organize all decryption keys into a hierarchical key structure according to partially ordering relation of role hierarchy in RBAC. DRAWBACKS:- • Time taken for data load • Data is not secured ADVANTAGES:- • Low power resource only used • Data is secured for storing in cloud
  • 5. SOFTWARE REQUIREMENT  Operating system :- Windows 7,8.1  Front End :- Microsoft Visual Studio .NET 2013  Coding Language :- C#  Backend :- DB2 HARDWARE REQUIREMENT  Processor : Pentium Dual Core 2.00GHZ  Hard disk : 50 GB  Mouse : Optical Mouse  RAM : 2GB(minimum) • Keyboard : Standard Keyboard (102 keys)
  • 6. PROPOSED SYSTEM: • Proposed a user secret-key must be unique and is accompanied by the user identity. In addition, the derivation of secret-key in such a construction should be avoided. • Advantage of our key structure is that it could be seamlessly integrated into the existing RBAC systems. Consequently, an RBAC system can directly use the public role key to encrypt resources in terms of users’ assigned roles, and then the users owned the senior roles can use their privacy keys to decrypt the encrypted resources. FUTURE WORK: • Future system we focus on protection the privacy of outsourcing data and preventing player abuse in file syncing and sharing services in the cloud. We highlight the development of a group-oriented cryptosystem with especially for tracing and revoking methods that can ensure the security of player/editor. • In our future work, we are planning to introduce a comprehensive anomaly detection, using audit, pattern matching, and risk assessment, for identifying the suspected players PROPOSED TECHNIQUE:  Threats and mitigation FUTURE TECHNIQUE:  Threats and mitigation enhanced