Cloud Data Production For Masses
Cloud Data Production For Masses
ABSTRACT
Offering strong data protection to cloud users while enabling rich applications is a challenging task. We
explore a new cloud platform architecture called Data Protection as a Service, which dramatically reduces the
per-application development effort required to offer data protection, while still allowing rapid development and
maintenance.
EXISTING SYSTEM
Cloud computing promises lower costs, rapid scaling, easier maintenance, and service availability anywhere,
anytime, a key challenge is how to ensure and build confidence that the cloud can handle user data securely. A
recent Microsoft survey found that “58 percent of the public and 86 percent of business leaders are excited
about the possibilities of cloud computing. But more than 90 percent of them are worried about security,
availability, and privacy of their data as it rests in the cloud.”
PROPOSED SYSTEM
We propose a new cloud computing paradigm, data protection as a service (DPaaS) is a suite of security
primitives offered by a cloud platform, which enforces data security and privacy and offers evidence of privacy
to data owners, even in the presence of potentially compromised or malicious applications. Such as secure data
using encryption, logging, key management.
MODULE DESCRIPTION:
1. Cloud Computing
4. User Module
1. Cloud Computing
Cloud computing is the provision of dynamically scalable and often virtualized resources as a services over the
internet Users need not have knowledge of, expertise in, or control over the technology infrastructure in the
"cloud" that supports them. Cloud computing represents a major change in how we store information and run
applications. Instead of hosting apps and data on an individual desktop computer, everything is hosted in the
"cloud"—an assemblage of computers and servers accessed via the Internet.
2. Multi tenancy enables sharing of resources and costs across a large pool of users thus allowing for:
3. Utilization and efficiency improvements for systems that are often only 10–20% utilized.
4. Reliability is improved if multiple redundant sites are used, which makes well-designed cloud
computing suitable for business continuity and disaster recovery.
5. Performance is monitored and consistent and loosely coupled architectures are constructed using web
services as the system interface.
6. Security could improve due to centralization of data, increased security-focused resources, etc., but
concerns can persist about loss of control over certain sensitive data, and the lack of security for stored kernels.
Security is often as good as or better than other traditional systems, in part because providers are able to devote
resources to solving security issues that many customers cannot afford. However, the complexity of security is
greatly increased when data is distributed over a wider area or greater number of devices and in multi-tenant
systems that are being shared by unrelated users. In addition, user access to security audit logs may be difficult
or impossible. Private cloud installations are in part motivated by users' desire to retain control over the
infrastructure and avoid losing control of information security.
7. Maintenance of cloud computing applications is easier, because they do not need to be installed on
each user's computer and can be accessed from different places.
In this module, Auditor views the all user data and verifying data and also changed data. Auditor directly
views all user data without key. Admin provided the permission to Auditor. After auditing data, store to the
cloud.
4. User Module
User store large amount of data to clouds and access data using secure key. Secure key provided admin after
encrypting data. Encrypt the data using TPM. User store data after auditor, view and verifying data and also
changed data. User again views data at that time admin provided the message to user only changes data.
System Configuration:-
Monitor - SVGA
Scripts : JavaScript.
Database : Mysql
CONCLUSION
As private data moves online, the need to secure it properly becomes increasingly urgent. The good
news is that the same forces concentrating data in enormous datacenters will also aid in using collective security
expertise more effectively. Adding protections to a single cloud platform can immediately benefit hundreds of
thousands of applications and, by extension, hundreds of millions of users. While we have focused here on a
particular, albeit popular and privacy-sensitive, class of applications, many other applications also needs
solutions.