Upload
kavipriya-dhandapani
View
223
Download
0
Embed Size (px)
Citation preview
7/31/2019 Secured User Authentication in Cloud Computing
1/13
SECURED USER AUTHENTICATION
IN CLOUD COMPUTING
PRESENTED BY:
D.KAVIPRIYA ,P.DIVYA ,
II Yr ECE
7/31/2019 Secured User Authentication in Cloud Computing
2/13
INTRODUCTION:
Combination of existingtechnologies includes gridcomputing and virtualizationAllows to pay only for resourcesusedProvides large scale controlled
sharing and interoperation amongresources
7/31/2019 Secured User Authentication in Cloud Computing
3/13
CLOUD COMPUTING:
Involves delivering hosted services
It is a service not a product
Here shared resources ,software andinformation are provided to
computers
7/31/2019 Secured User Authentication in Cloud Computing
4/13
CLOUD COMPUTING
SERVICES:
Services divided into three categories:
Infrastructure as-a-service-Platform virtualization environment
-Service with raw storage and networking
-Resources used are fully outsourced service Platform-as-a-service
-Sustains cloud applications
-Facilitates deployment of applications and reducescomplexity of buying
-Managing both hardware and software
Software-as-a-service-Eliminate the need of installment
-Simplify the maintenance and support
7/31/2019 Secured User Authentication in Cloud Computing
5/13
ADVANCEMENTS:
EASE OF USE:
-Location and device independence
SCALABILITY:
-Controls infrastructure
REDUCED RISK:
-Maintenance is easier
RELIABILITY:
-Improves when multiple redundant sites areused
COST:
-Purported to lower barriers to entry
-Used for frequent intensive computing tasks
7/31/2019 Secured User Authentication in Cloud Computing
6/13
Existing system:-Composed of different local systems and members
from
multiple environments causes data insecurity
- In existing system there is no system to find data
security
- Openness and flexibility brings complexity and
reduces trust degree
Proposed system:-Improve the secure and dependable computing in
cloud
-Integrate the Trusted Computing Platform(TCP)which is based on Trusted Platform Module
-The TCP will be used in authentication
7/31/2019 Secured User Authentication in Cloud Computing
7/13
IMPLEMENTATION STEPS:
The following modules areimplemented:
User Registration
Master key and Session keygeneration
Dynamic system Configuration
Authentication
Trusted Platform Module (TPM)
Database Management
Cloud Server
7/31/2019 Secured User Authentication in Cloud Computing
8/13
USER REGISTRATION:
-registers login details, system configuration
details , phone number.
MASTER KEY AND SESSION KEY GENERATION:
-when client registers with server, TPM generates
Master key and whenever he logins itgenerates Session key
DYNAMIC SYSTEM CONFIGURATION
AUTHENTICATION:-obtained System Configuration details are
compared with already registered system
configuration details.
7/31/2019 Secured User Authentication in Cloud Computing
9/13
TRUSTED PLATFORM MODULE(TPM):
-checks the logged in details and createsa session key.
DATABASE MANAGEMENT:
-contains all details of the clients in itsnetwork.
CLOUD SERVER:
-gets the user queries, matches with theindex data present in it and serves the
client.
7/31/2019 Secured User Authentication in Cloud Computing
10/13
LEVEL DIAGRAM:
7/31/2019 Secured User Authentication in Cloud Computing
11/13
ACTIVITY DIAGRAM:
Register the client system
imformation in server
login to the server and wait
for server autentication
Server checks the clients
configuration details if it
matches
client can upload and
download file from server
Authendication
Denied
Yes
No
7/31/2019 Secured User Authentication in Cloud Computing
12/13
CONCLUSION:
Hence the security of cloud computingenvironment is analyzed.
To achieve trusted computing
requirements for the cloud computingusing trusted computing technology.
Thus TCP provides user authentication
and security services.
7/31/2019 Secured User Authentication in Cloud Computing
13/13