Cloud computing design
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
seminar presentation
Active In SP
**

Posts: 582
Joined: Apr 2010
#1
28-05-2010, 08:00 PM


Cloud computing is a style of computing that provides virtualized resources as a service over the internet. The clientâ„¢s data is given to a third party (the cloud service provider) for storage. They lose control of their information and they are unaware of the location where their data is stored. This means that their data is vulnerable to external attacks. Firstly, in the physical infrastructure (the datacenter behind the cloud) different customers workloads are placed in the same physical machine. Secondly, concerns about malicious software take an important place. Failure of one physical machine should not deter the working of others. In this project and implimentation, we implement a model to solve these issues. This model is based on the basic idea of removing abstraction from the cloud infrastructure. Thereby, allowing the user to evaluate the security properties and measures of the platform before they provision their data in the cloud. Further, isolation policies are deployed to provide workload isolation and data security.
Cloud computing can be divided into three areas:

¢ SaaS (software-as-a-service). WAN-enabled application services (e.g., Google Apps, Salesforce.com, WebEx)

¢ PaaS (platform-as-a-service). Foundational elements to develop new applications (e.g., Coghead, Google Application Engine)

¢ IaaS (infrastructure-as-a-service). Providing computational and storage infrastructure in a centralized, location-transparent service (e.g., Amazon)


Cloud computing characteristics

¢ Massive, abstracted infrastructure

¢ Dynamic allocation, scaling, movement of applications

¢ Pay per use

¢ No long-term commitments

¢ On-demand self-service

¢ Ubiquitous network access

¢ No hardware or software to install
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply
projectsofme
Active In SP
**

Posts: 1,124
Joined: Jun 2010
#2
19-10-2010, 10:32 AM


.doc   Ensuring Data Storage Security in Cloud Computing.doc (Size: 76 KB / Downloads: 447)
Ensuring Data Storage Security in Cloud Computing



ABSTRACT
Cloud computing has been envisioned as the next-generation architecture of IT enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. This unique attribute, however, poses many new security challenges which have not been well understood. In this article, we focus on cloud data storage security, which has always been an important aspect of quality of service. To ensure the correctness of users' data in the cloud, we propose an effective and flexible distributed scheme with two salient features, opposing to its predecessors. By utilizing the homomorphic token with distributed verification of erasure-coded data, our scheme achieves the integration of storage correctness insurance and data error localization, i.e., the identification of misbehaving server (s). Unlike most prior works, the new scheme further supports secure and efficient dynamic operations on data blocks, including: data update, delete and append. Extensive security and performance analysis shows that the proposed scheme is highly efficient and resilient against Byzantine failure, malicious data modification attack, and even server colluding attacks.




System Architecture:


Existing System:
From the perspective of data security, which has always been an important aspect of quality of service, Cloud Computing inevitably poses new challenging security threats for number of reasons.

1 . Firstly, traditional cryptographic primitives for the purpose of data security protection can not be directly adopted due to the users’ loss control of data under Cloud Computing. Therefore, verification of correct data storage in the cloud must be conducted without explicit knowledge of the whole data. Considering various kinds of data for each user stored in the cloud and the demand of long term continuous assurance of their data safety, the problem of verifying correctness of data storage in the cloud becomes even more challenging.

2 . Secondly, Cloud Computing is not just a third party data warehouse. The data stored in the cloud may be frequently updated by the users, including insertion, deletion, modification, appending, reordering, etc. To ensure storage correctness under dynamic data update is hence of paramount importance.
Reply
seminar addict
Super Moderator
******

Posts: 6,592
Joined: Jul 2011
#3
10-02-2012, 10:03 AM

to get information about the topic cloud computing full report ,ppt and related topic refer the link bellow

topicideashow-to-cloud-computing-project and implimentation-idea

topicideashow-to-cloud-computing-project and implimentation-idea?page=2

topicideashow-to-cloud-computing--5219

topicideashow-to-cloud-computing-project and implimentations-topics-for-final-year

topicideashow-to-cloud-computing--4041

topicideashow-to-cloud-computing--13380?pid=62602

topicideashow-to-cloud-computing

topicideashow-to-the-security-of-cloud-computing-system-enabled-by-trusted-computing-technology?pid=62606

topicideashow-to-cloud-computing-simple-details?pid=62742#pid62742

topicideashow-to-cloud-computing?page=2

topicideashow-to-cloud-computing--5219?page=2

seminar and presentationproject and implimentationsattachment.php?aid=5629

Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing PPT project girl 1 1,009 21-10-2015, 01:52 PM
Last Post: Guest
  email flyer design full report project report tiger 9 27,910 26-02-2015, 03:06 PM
Last Post: oiajecuot
  Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storag seminar flower 3 3,177 23-05-2014, 10:04 AM
Last Post: seminar project topic
  Two Wheels Local Courier System Design Document Report seminar projects maker 0 388 20-09-2013, 04:11 PM
Last Post: seminar projects maker
  Network Assisted Mobile Computing with Optimal Uplink Query Processing pdf seminar projects maker 0 467 20-09-2013, 04:01 PM
Last Post: seminar projects maker
  Optimal Job Scheduling using Ant Colony Algorithm in Grid Computing PPT study tips 0 390 21-08-2013, 02:49 PM
Last Post: study tips
  Toward publicly auditable secure cloud data storage services Abstract study tips 0 326 16-08-2013, 04:59 PM
Last Post: study tips
  A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding Abstract study tips 0 350 16-08-2013, 04:57 PM
Last Post: study tips
  Cloud Computing Project Abstract project girl 1 589 10-08-2013, 02:43 PM
Last Post: study tips
  Scalable and Secure Sharing of Personal Health Records in Cloud Computing seminar flower 1 1,970 01-08-2013, 02:06 PM
Last Post: Guest