Secured User Authentication in Cloud Computing

Embed Size (px)

Citation preview

  • 7/31/2019 Secured User Authentication in Cloud Computing

    1/13

    SECURED USER AUTHENTICATION

    IN CLOUD COMPUTING

    PRESENTED BY:

    D.KAVIPRIYA ,P.DIVYA ,

    II Yr ECE

  • 7/31/2019 Secured User Authentication in Cloud Computing

    2/13

    INTRODUCTION:

    Combination of existingtechnologies includes gridcomputing and virtualizationAllows to pay only for resourcesusedProvides large scale controlled

    sharing and interoperation amongresources

  • 7/31/2019 Secured User Authentication in Cloud Computing

    3/13

    CLOUD COMPUTING:

    Involves delivering hosted services

    It is a service not a product

    Here shared resources ,software andinformation are provided to

    computers

  • 7/31/2019 Secured User Authentication in Cloud Computing

    4/13

    CLOUD COMPUTING

    SERVICES:

    Services divided into three categories:

    Infrastructure as-a-service-Platform virtualization environment

    -Service with raw storage and networking

    -Resources used are fully outsourced service Platform-as-a-service

    -Sustains cloud applications

    -Facilitates deployment of applications and reducescomplexity of buying

    -Managing both hardware and software

    Software-as-a-service-Eliminate the need of installment

    -Simplify the maintenance and support

  • 7/31/2019 Secured User Authentication in Cloud Computing

    5/13

    ADVANCEMENTS:

    EASE OF USE:

    -Location and device independence

    SCALABILITY:

    -Controls infrastructure

    REDUCED RISK:

    -Maintenance is easier

    RELIABILITY:

    -Improves when multiple redundant sites areused

    COST:

    -Purported to lower barriers to entry

    -Used for frequent intensive computing tasks

  • 7/31/2019 Secured User Authentication in Cloud Computing

    6/13

    Existing system:-Composed of different local systems and members

    from

    multiple environments causes data insecurity

    - In existing system there is no system to find data

    security

    - Openness and flexibility brings complexity and

    reduces trust degree

    Proposed system:-Improve the secure and dependable computing in

    cloud

    -Integrate the Trusted Computing Platform(TCP)which is based on Trusted Platform Module

    -The TCP will be used in authentication

  • 7/31/2019 Secured User Authentication in Cloud Computing

    7/13

    IMPLEMENTATION STEPS:

    The following modules areimplemented:

    User Registration

    Master key and Session keygeneration

    Dynamic system Configuration

    Authentication

    Trusted Platform Module (TPM)

    Database Management

    Cloud Server

  • 7/31/2019 Secured User Authentication in Cloud Computing

    8/13

    USER REGISTRATION:

    -registers login details, system configuration

    details , phone number.

    MASTER KEY AND SESSION KEY GENERATION:

    -when client registers with server, TPM generates

    Master key and whenever he logins itgenerates Session key

    DYNAMIC SYSTEM CONFIGURATION

    AUTHENTICATION:-obtained System Configuration details are

    compared with already registered system

    configuration details.

  • 7/31/2019 Secured User Authentication in Cloud Computing

    9/13

    TRUSTED PLATFORM MODULE(TPM):

    -checks the logged in details and createsa session key.

    DATABASE MANAGEMENT:

    -contains all details of the clients in itsnetwork.

    CLOUD SERVER:

    -gets the user queries, matches with theindex data present in it and serves the

    client.

  • 7/31/2019 Secured User Authentication in Cloud Computing

    10/13

    LEVEL DIAGRAM:

  • 7/31/2019 Secured User Authentication in Cloud Computing

    11/13

    ACTIVITY DIAGRAM:

    Register the client system

    imformation in server

    login to the server and wait

    for server autentication

    Server checks the clients

    configuration details if it

    matches

    client can upload and

    download file from server

    Authendication

    Denied

    Yes

    No

  • 7/31/2019 Secured User Authentication in Cloud Computing

    12/13

    CONCLUSION:

    Hence the security of cloud computingenvironment is analyzed.

    To achieve trusted computing

    requirements for the cloud computingusing trusted computing technology.

    Thus TCP provides user authentication

    and security services.

  • 7/31/2019 Secured User Authentication in Cloud Computing

    13/13