14
Computer Networks Sec: B Presentation on : Presented by: AKTER, FOUJIA 12-22681-3 MITHELA, TADMIRA ISLAM 12-22510-3 RAHMAN, MAHMUDA 13- 22990-1 RABBI, SHAKIB –E- 12- 20804-1 RAHMAN, MAJEDUR 12- 22164-3 Presented to: Shahrin Chowdhury A New Mode to Ensure Security in Cloud Computing Services AMERICAN INTERNATIONAL UNIVERSITY- BANGLADESH(AIUB) 8/10/2015 Ensure Security in Cloud Computing Services 1

A New Mode to Ensure Security in Cloud Computing Services

Embed Size (px)

Citation preview

Page 1: A New Mode to Ensure Security in Cloud Computing Services

Ensure Security in Cloud Computing Services

1

Computer NetworksSec: B

Presentation on :

 Presented by:AKTER, FOUJIA 12-22681-3

MITHELA, TADMIRA ISLAM 12-22510-3 RAHMAN, MAHMUDA 13-22990-1 RABBI, SHAKIB –E- 12-20804-1 RAHMAN, MAJEDUR 12-22164-3

Presented to: Shahrin Chowdhury

A New Mode to Ensure Security in Cloud Computing Services

AMERICAN INTERNATIONAL UNIVERSITY-BANGLADESH(AIUB)

8/10/2015

Page 2: A New Mode to Ensure Security in Cloud Computing Services

Ensure Security in Cloud Computing Services

2

INTRODUCTION CLOUD ENVIRNMENTSECURITY THEARTSA PROPOSED MODEL TO TACLE THIS

SECURITY THREATS PHASE 1 (STORING OF DATA) CLASSIFICATION INDEX BULDING AND ENCRYPTIONMESSEGE AUTHENTICATION CODEPHASE 2 (RETRAIVLE OF DATA)

Index

8/10/2015

Page 3: A New Mode to Ensure Security in Cloud Computing Services

Ensure Security in Cloud Computing Services

3

INTRODUCTION

Cloud computing is empowered by virtualization technology.The cloud computing model revolves around three functional units or components

1. Cloud service provider2. Client/owner3. User

8/10/2015

Page 4: A New Mode to Ensure Security in Cloud Computing Services

Ensure Security in Cloud Computing Services

4 8/10/2015

Page 5: A New Mode to Ensure Security in Cloud Computing Services

Ensure Security in Cloud Computing Services

5

The proposed model is

designed to tackle all these

security issues very

efficiently.

1. Unauthorized Server

2. Brute Force Attack

3. Threat from Cloud service

provider

4. Tampering of Data

5. Loss of User Identity or

Password

SECURITY THEARTS

8/10/2015

Page 6: A New Mode to Ensure Security in Cloud Computing Services

Ensure Security in Cloud Computing Services

6

A PROPOSED MODEL TO TACLE THIS SECURITY THREATS

Proposed framework has been structured to provide complete security to the data throughout the entire process of cloud computing, be it in cloud or in transit. Thus, multiple mechanisms and available techniques are applied to shield the critical information from unauthorized parties. The proposed frame work is divided into two phases. First phase deals with process of transmitting and storing data securely into the cloud. Second phase deals with the retrieval of data from cloud and showing the generation of requests for data access, double authentication, verification of digital signature and integrity, thereby providing authorized user with data on passing all security mechanisms.

8/10/2015

Page 7: A New Mode to Ensure Security in Cloud Computing Services

Ensure Security in Cloud Computing Services

7

PHASE1 (STORING OF DATA)

This phase deals with mechanisms and methods to store and secure the data from beginning and transmitting it securely to the cloud in encrypted form. It is further divided into sub-sections (Classification, Index Building and encryption, Message Authentication Code (MAC) which provide stepwise details of action on the data). 8/10/2015

Page 8: A New Mode to Ensure Security in Cloud Computing Services

Ensure Security in Cloud Computing Services

8

CLASSIFICATION

As the data in the cloud is intended to be stored, an approach is introduced for storing the data in different sections in the cloud (public, private, limited access). According to their sensitivity rating, the data will be assigned in the different sections (public, private, limited access) in the cloud.

8/10/2015

Page 9: A New Mode to Ensure Security in Cloud Computing Services

Ensure Security in Cloud Computing Services

9

INDEX BULDING AND ENCRYPTION

•After the successful allotment of values to data, the data now needs to gear up for another processing mechanism. After this we need to encrypt data. Encryption is the process of turning intelligible information into useless information. This model uses 128-bit SSL encryption to encrypt the data as well as index. 128-bit SSL encryption is better than the traditional 40-bit SSL encryption because just that change means that there are 2^88 more combinations. 8/10/2015

Page 10: A New Mode to Ensure Security in Cloud Computing Services

Ensure Security in Cloud Computing Services

10

MESSAGE AUTHENTICATION CODE

After encryption of data, a message authentication code (MAC) is generated which it transmits along with the encrypted data to cloud. MAC is a small fixed size block of data that is generated based on message/file of variable length using any secret key. It is called cryptographic checksum and it’s used to check whether data has been tampered throughout the transmission and this check can be made by the user or owner of data on retrieving the file.

8/10/2015

Page 11: A New Mode to Ensure Security in Cloud Computing Services

Ensure Security in Cloud Computing Services

11

PHASE 2 (RETRAIVLE OF DATA)•First the retrieval of data requires the user to register him with the owner/organization by getting a username and a password as shown.

•If the request is for private section and limited access section, authentication is necessary and cloud looks for username provided by user into its directory of user names, provided by the owner.

•For authentication, the user first sends the password to the owner and on clearing this parameter. The owner also sends the user identity.

8/10/2015

Page 12: A New Mode to Ensure Security in Cloud Computing Services

Ensure Security in Cloud Computing Services

12

•Afterwards user sends the request for data to owner which in turn sends the owner’s ‘‘Digital Signature’’, keyword of requested data and a master key to decrypt the data provided by cloud.

• The cloud first verifies the digital signature, and if verified, cloud processes the search request using the keyword.

•The user can then decrypt the encrypted entries by the decrypting key provided by owners of data and sends cloud download request to retrieve relevant file . The cloud replies the user with encrypted file it requested for and then user can decrypt the file by the decryption key already shared by owner with user.

8/10/2015

Page 13: A New Mode to Ensure Security in Cloud Computing Services

Conclusion

Page 14: A New Mode to Ensure Security in Cloud Computing Services

Ensure Security in Cloud Computing Services

14 8/10/2015