SlideShare a Scribd company logo
project 11
 Introduction

 Existing System

 Proposed System

 H/W system Config.

 S/W system Config.

 Conclusion
Cloud computing promises to significantly change the way
we use computers and access and store our personal and
business information. With these new computing and
communications paradigms arise new data security challenges.
Existing data protection mechanisms such as encryption have
failed in preventing data theft attacks, especially those
perpetrated by an insider to the cloud provider.

We propose a completely different approach to securing the
cloud using decoy information technology, that we have come to
call Fog computing. We use this technology to launch
disinformation attacks against malicious insiders, preventing
them from distinguishing the real sensitive customer data from
fake worthless data.
Existing data protection mechanisms such as
encryption have failed in preventing data theft attacks,
especially those perpetrated by an insider to the cloud
provider. Much research in Cloud computing security
has focused on ways of preventing unauthorized and
illegitimate access to data by developing sophisticated
access control and encryption mechanisms. However
these mechanisms have not been able to prevent data
compromise.
The decoys, serve two purposes:
 (1) validating whether data access is authorized when
 abnormal information access is detected, and
(2) confusing the attacker with bogus information.


MODULE DESCRIPTION:
(1)Cloud computing
(2)User behavior profiling
(3)Decoy documents
 Cloud computing is a model for enabling
  convenient, ondemand
network access to a shared pool of configurable computing
  resources (for
example, networks, servers, storage, applications, and
  services) that can be
rapidly provisioned and released with minimal management
  effort or serviceprovider interaction. It divide into three
  type
1.Application as a service.
2.Infrastructure as a service.
3.Platform as a service.
1)Agility

2)Cost

3)Virtualization

4)Multi tenancy
 5)Centralization


 6)Utilization and efficiency


 7)Reliability


 8)Performance


 9)Security
User profiling is a well known Technique that can be
applied here to model how, when, and how much a user
accesses their information in the Cloud. Such ‘normal user’
behavior can be continuously checked to determine
whether abnormal access to a user’s information is
occurring. This method of behavior-based security is
commonly used in fraud detection applications.

We monitor for abnormal search behaviors that exhibit
deviations from the user baseline the correlation of search
behavior anomaly detection with trap-based decoy files
should provide stronger evidence of malfeasance, and
therefore improve a detector’s accuracy.
The approach here is for securing data in the cloud
using offensive decoy technology. We monitor data
access in the cloud and detect abnormal data access
patterns. we launch a disinformation attack by
returning large amounts of decoy information to the
attacker. This protects against the misuse of the user’s
real data.
 The correlation of search behavior anomaly detection
  with trap-based decoy files should provide stronger
  evidence of malfeasance, and therefore improve a
  detector’s accuracy.
 We hypothesize that detecting abnormal search
  operations performed prior to an unsuspecting user
  opening a decoy file will corroborate the suspicion that
  the user is indeed impersonating another victim user
 This scenario covers the threat model of illegitimate
  access to Cloud data.
 Furthermore, an accidental opening of a decoy file by
  a legitimate user might be recognized as an accident if
  the search behavior is not deemed abnormal.
 In other words, detecting abnormal search and decoy
  traps together may make a very effective masquerade
  detection System.
 Combining the two techniques improves detection
  accuracy.
project 11
 Processor      - Pentium –III
 Speed          - 1.1 Ghz
 RAM             - 256 MB(min)
 Hard Disk        - 20 GB
 Floppy Drive     - 1.44 MB
 Key Board       - Standard
                     Windows Keyboard
 Mouse          - Two or Three
                     Button Mouse
 Monitor         - SVGA
 Operating System        : Windows95/98/2000/XP
 Application Server      : Tomcat5.0/6.X

 Front End               :    HTML, Java, Jsp
 Scripts                 :    JavaScript.
 Server side Script      :    Java Server Pages.
 Database                 :   My sql
 Database Connectivity   :    JDBC.
 We had present our project approach to securing
  personal and business data in the Cloud.
 We propose monitoring data access patterns by
  profiling user behavior to determine if and when a
  malicious insider illegitimately accesses someone’s
  documents in a Cloud service.
 We inundate the malicious insider with bogus
  information in order to dilute the user’s real data, Such
  preventive attacks that rely on disinformation
  technology , could provide unprecedented levels of
  security in the Cloud and in social networks model.
project 11

More Related Content

PDF
Ijaiem 2014-11-30-122
DOCX
JPJ1449 Efficient Authentication for Mobile and Pervasive Computing
PPTX
HTTP vs HTTPS Difference
PDF
Privacy preserving ciphertext multi-sharing control for big data storage
PDF
Privacy preserving ciphertext multi-sharing control for big data storage
DOCX
PRIVACY-PRESERVING CIPHERTEXT MULTI-SHARING CONTROL FOR BIG DATA STORAGE
PDF
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
PDF
Hybrid cryptographic technique using rsa algorithm and scheduling concepts
Ijaiem 2014-11-30-122
JPJ1449 Efficient Authentication for Mobile and Pervasive Computing
HTTP vs HTTPS Difference
Privacy preserving ciphertext multi-sharing control for big data storage
Privacy preserving ciphertext multi-sharing control for big data storage
PRIVACY-PRESERVING CIPHERTEXT MULTI-SHARING CONTROL FOR BIG DATA STORAGE
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
Hybrid cryptographic technique using rsa algorithm and scheduling concepts

What's hot (20)

PDF
SECURE SENSITIVE DATA SHARING ON BIG DATA PLATFORM
PPT
Cryptography
PDF
A novel approach to information security using safe
PDF
A novel approach to information security using safe exchange of encrypted dat...
PDF
Jdbc 6
PPTX
603535ransomware
PDF
cryptography
PPTX
Model pretnji za image pass - zoss
PPTX
Russian technology in indian banking system 1
PDF
US Patriot Act OSCON2012 David Mertz
PDF
Report dna
PDF
Attribute-Based Data Sharing
PDF
Week 12 slide
PDF
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
PDF
Multi-part Dynamic Key Generation For Secure Data Encryption
PPTX
Encrytion ppt
PPT
Chapter 08
PDF
Achieving data integrity by forming the digital signature using RSA and SHA-1...
PDF
Security Basics
PPTX
SmartLock
SECURE SENSITIVE DATA SHARING ON BIG DATA PLATFORM
Cryptography
A novel approach to information security using safe
A novel approach to information security using safe exchange of encrypted dat...
Jdbc 6
603535ransomware
cryptography
Model pretnji za image pass - zoss
Russian technology in indian banking system 1
US Patriot Act OSCON2012 David Mertz
Report dna
Attribute-Based Data Sharing
Week 12 slide
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
Multi-part Dynamic Key Generation For Secure Data Encryption
Encrytion ppt
Chapter 08
Achieving data integrity by forming the digital signature using RSA and SHA-1...
Security Basics
SmartLock
Ad

Similar to project 11 (20)

PDF
Hindering data theft attack through fog computing
PDF
FOGCOMPUTING
PDF
Securing Cloud Using Fog: A Review
PDF
IRJET- Medical Big Data Protection using Fog Computing and Decoy Technique
PPT
Fog computing provide security to data in cloud ppt
PDF
Fog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
PDF
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...
PDF
Fog computing a new concept to minimize the attacks and to provide security i...
PPTX
Presentation1
PPTX
Cloud security From Infrastructure to People-ware
PDF
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
PDF
Computing security
PDF
Taking Account of Privacy When Designing Cloud Computing Services
PPTX
Oruta ppt
PPTX
LDSS for mobile cloud
PPT
Cloud Monitoring And Forensic Using Security Metrics
PPTX
Cloud computing security policy framework for mitigating denial of service at...
PPTX
cloud security using Fog Computing
PPTX
Fog computing
PDF
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
Hindering data theft attack through fog computing
FOGCOMPUTING
Securing Cloud Using Fog: A Review
IRJET- Medical Big Data Protection using Fog Computing and Decoy Technique
Fog computing provide security to data in cloud ppt
Fog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...
Fog computing a new concept to minimize the attacks and to provide security i...
Presentation1
Cloud security From Infrastructure to People-ware
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
Computing security
Taking Account of Privacy When Designing Cloud Computing Services
Oruta ppt
LDSS for mobile cloud
Cloud Monitoring And Forensic Using Security Metrics
Cloud computing security policy framework for mitigating denial of service at...
cloud security using Fog Computing
Fog computing
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
Ad

Recently uploaded (20)

PDF
RMMM.pdf make it easy to upload and study
PPTX
Cell Types and Its function , kingdom of life
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
Week 4 Term 3 Study Techniques revisited.pptx
PDF
Classroom Observation Tools for Teachers
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
master seminar digital applications in india
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
TR - Agricultural Crops Production NC III.pdf
PPTX
Institutional Correction lecture only . . .
PPTX
Pharma ospi slides which help in ospi learning
PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
Complications of Minimal Access Surgery at WLH
PDF
Insiders guide to clinical Medicine.pdf
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
RMMM.pdf make it easy to upload and study
Cell Types and Its function , kingdom of life
Renaissance Architecture: A Journey from Faith to Humanism
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
Supply Chain Operations Speaking Notes -ICLT Program
Week 4 Term 3 Study Techniques revisited.pptx
Classroom Observation Tools for Teachers
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Final Presentation General Medicine 03-08-2024.pptx
master seminar digital applications in india
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
TR - Agricultural Crops Production NC III.pdf
Institutional Correction lecture only . . .
Pharma ospi slides which help in ospi learning
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
O7-L3 Supply Chain Operations - ICLT Program
PPH.pptx obstetrics and gynecology in nursing
Complications of Minimal Access Surgery at WLH
Insiders guide to clinical Medicine.pdf
FourierSeries-QuestionsWithAnswers(Part-A).pdf

project 11

  • 2.  Introduction  Existing System  Proposed System  H/W system Config.  S/W system Config.  Conclusion
  • 3. Cloud computing promises to significantly change the way we use computers and access and store our personal and business information. With these new computing and communications paradigms arise new data security challenges. Existing data protection mechanisms such as encryption have failed in preventing data theft attacks, especially those perpetrated by an insider to the cloud provider. We propose a completely different approach to securing the cloud using decoy information technology, that we have come to call Fog computing. We use this technology to launch disinformation attacks against malicious insiders, preventing them from distinguishing the real sensitive customer data from fake worthless data.
  • 4. Existing data protection mechanisms such as encryption have failed in preventing data theft attacks, especially those perpetrated by an insider to the cloud provider. Much research in Cloud computing security has focused on ways of preventing unauthorized and illegitimate access to data by developing sophisticated access control and encryption mechanisms. However these mechanisms have not been able to prevent data compromise.
  • 5. The decoys, serve two purposes: (1) validating whether data access is authorized when abnormal information access is detected, and (2) confusing the attacker with bogus information. MODULE DESCRIPTION: (1)Cloud computing (2)User behavior profiling (3)Decoy documents
  • 6.  Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing resources (for example, networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or serviceprovider interaction. It divide into three type 1.Application as a service. 2.Infrastructure as a service. 3.Platform as a service.
  • 8.  5)Centralization  6)Utilization and efficiency  7)Reliability  8)Performance  9)Security
  • 9. User profiling is a well known Technique that can be applied here to model how, when, and how much a user accesses their information in the Cloud. Such ‘normal user’ behavior can be continuously checked to determine whether abnormal access to a user’s information is occurring. This method of behavior-based security is commonly used in fraud detection applications. We monitor for abnormal search behaviors that exhibit deviations from the user baseline the correlation of search behavior anomaly detection with trap-based decoy files should provide stronger evidence of malfeasance, and therefore improve a detector’s accuracy.
  • 10. The approach here is for securing data in the cloud using offensive decoy technology. We monitor data access in the cloud and detect abnormal data access patterns. we launch a disinformation attack by returning large amounts of decoy information to the attacker. This protects against the misuse of the user’s real data.
  • 11.  The correlation of search behavior anomaly detection with trap-based decoy files should provide stronger evidence of malfeasance, and therefore improve a detector’s accuracy.  We hypothesize that detecting abnormal search operations performed prior to an unsuspecting user opening a decoy file will corroborate the suspicion that the user is indeed impersonating another victim user
  • 12.  This scenario covers the threat model of illegitimate access to Cloud data.  Furthermore, an accidental opening of a decoy file by a legitimate user might be recognized as an accident if the search behavior is not deemed abnormal.  In other words, detecting abnormal search and decoy traps together may make a very effective masquerade detection System.  Combining the two techniques improves detection accuracy.
  • 14.  Processor - Pentium –III  Speed - 1.1 Ghz  RAM - 256 MB(min)  Hard Disk - 20 GB  Floppy Drive - 1.44 MB  Key Board - Standard Windows Keyboard  Mouse - Two or Three Button Mouse  Monitor - SVGA
  • 15.  Operating System : Windows95/98/2000/XP  Application Server : Tomcat5.0/6.X  Front End : HTML, Java, Jsp  Scripts : JavaScript.  Server side Script : Java Server Pages.  Database : My sql  Database Connectivity : JDBC.
  • 16.  We had present our project approach to securing personal and business data in the Cloud.  We propose monitoring data access patterns by profiling user behavior to determine if and when a malicious insider illegitimately accesses someone’s documents in a Cloud service.  We inundate the malicious insider with bogus information in order to dilute the user’s real data, Such preventive attacks that rely on disinformation technology , could provide unprecedented levels of security in the Cloud and in social networks model.