You are on page 1of 5

VISVESVARAYA TECHNOLOGICAL UNIVERSITY

“JANANA SANGAMA”, BELAGAVI, KARNATAKA, INDIA-590 018.

SYNOPSIS ON
“Data Security and Authentication in Hybrid Cloud Computing
Model”
SUBMITTED BY
Nagesh Prasad 4VV15CS406

UNDER THE GUIDANCE OF


NANDINI S.B
Assistant Professor & Dept. of CS&E,
VVCE, Mysuru.

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING


VIDYAVARDHAKA COLLEGE OF ENGINEERING
GOKULUM, 3rd STAGE, MYSURU-570 002

2017-18
ABSTRACT

The progress and mature of cloud computing technology, the social demand for
cloud computing is growing. Meanwhile the demand of data security is increasing
sharply, especially in hybrid cloud computing model. This paper describes several
methods to protect user data, which includes single en-crypt ion, multi-level
virtualization, and authentication interface. Authentication intercloud is the other main
theme of this paper. This paper also discussed a model of authentication intercloud
which based on CA and PKI model which be extended to the scenario without CA
system or it crashed.

The hybrid cloud, which means the cloud system combined the private cloud and
public cloud, is becoming an important part of commercial cloud computing model.
The private cloud could provide the most security for users data, and this lacks the
scalability. And the public cloud could satisfy the demand of the scalability. Hybrid
cloud could provide both security and the scalability at the same time. However,
there still are some problems about the data security because when user extends
their application to the public cloud, the cloud computing provider could access the
user’s privacy data.
REAL TIME APPLICATIONS

 Protected, confidential, and sensitive information can be stored on a private


cloud while still leveraging resources of the public cloud to run apps that rely
on that data. This is especially important for businesses that store sensitive
data for their customers. (Think health care providers and payroll processors,
for example.)

 The two clouds meet industry standards for data security when handling
sensitive data.

 Synchronize data by using an IP Multimedia Core Network Subsystem (IMS).

 In case of DOS attacks Flow analytics can fend off DoD attacks by reacting
to the incursion and redirecting traffic to a mitigation device

 Hybrid cloud computing model provides a greater flexibility: private cloud part
can guarantee the safety of the user’s data; public cloud can provide users
with good scalability..
REFERENCES

[1] Miller M (2008) Cloud Computing: Web-Based Applications That Change the Way
You Work and Collaborate Online. Que Publishing, Indianapolis

[2] Reese G (2009) Cloud Application Architectures. O’Reilly Media, Sebastopol, CA

[3] Sun (2009a) A Guide to Getting Started with Cloud Computing. Sun white paper.
https://www.sun.com/offers/docs/cloud_computing _primer.pdf. Accessed: 10 June
2009

[4] Foster I, Zhao Y, Raicu I, Lu S (2008) Cloud Computing and Grid Computing
360-Degree Compared.

[5] RightScale (2008) Define Cloud Computing. RightScale Blog, 26 May 2008.
http://blog.rightscale.com/2008/05/26/define-cloud-computing/. Accessed: 9 Jun
2009

[6] Mertz SA, Eschinger C, Eid T, Pring B (2007) Dataquest Insight: SaaS Demand
Set to Outpace Enterprise Application Software Market Growth. Gartner RAS Core
Research Note, 3 August 2007

[7] Eymann T (2008) Cloud computing. Enzyklopädie der Wirtschaftsinformatik.


Accessed: 10 June 2009

[8] Gartner (2008c) Gartner Says Worldwide SaaS Revenue in the Enterprise
Application Markets Will Grow 27 Per Cent in 2008. Gartner press release, 22
October 2008.

[9] Armbrust M, Fox A, Griffith R, Joseph AD, Katz RH, Konwinski A, Lee G,
Patterson DA, Rabkin A, Stoica I, Zaharia M (2009) Above the Clouds – A Berkeley
View of Cloud. Technical report UCB/EECS2009-28, EECS Department, University
of Berkeley, California, 10 February 2009.

Signature of the Guide


(Assistant professor Nandini S.B)