0% found this document useful (0 votes)
172 views22 pages

3D Cloud Computing Presentation.

This seminar presentation discusses 3-D (three-dimensional) security in cloud computing. It introduces cloud computing and the architecture of 3-D security in the cloud. It describes problems with current cloud technology, the objectives of the project, and functional and non-functional requirements. The presentation also covers the advantages and limitations of the 3-D security system, includes UML diagrams and block diagrams, and concludes by discussing the system's future scope.

Uploaded by

Rajnish Baranwal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
172 views22 pages

3D Cloud Computing Presentation.

This seminar presentation discusses 3-D (three-dimensional) security in cloud computing. It introduces cloud computing and the architecture of 3-D security in the cloud. It describes problems with current cloud technology, the objectives of the project, and functional and non-functional requirements. The presentation also covers the advantages and limitations of the 3-D security system, includes UML diagrams and block diagrams, and concludes by discussing the system's future scope.

Uploaded by

Rajnish Baranwal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 22

A

Seminar Presentation on

3-D

(Dimension) Security In Cloud Computing


Presented By,
Mr. Kapil Nagare
Ms. Gayatri Dhavale
Mr. Rajnish Baranval

Guided By,

Mrs.S.N.Zaware
(H.O.D. Of Computer Engineering Dept.)

ALL INDIA SHRI SHIVAJI MEMORIAL SOCIETYS


INSTITUDE OF INFORMATION & TECHNOLOGY, PUNE
ACADEMIC YEAR 2013-2014
1

3-D (Dimension) Security In Cloud Computing

Content--:

Introduction.
Problem On Current Cloud Technology.
Project Objective.
Requirements Of System--:
Function And Non-Function Requirement.
Hardware And Software Requirement.
Advantages and Limitation of System.
UML Diagrams and Block Diagrams.
Conclusion.
References
2

3-D (Dimension) Security In Cloud Computing

Introduction-:
What is Cloud Computing.
Architecture Of 3D Security In Cloud.

3-D (Dimension) Security In Cloud Computing


Architecture Diagram Of 3D Security In Cloud- :

3-D (Dimension) Security In Cloud Computing

Problems on Current Cloud Technology.

Project Objective.

3-D (Dimension) Security In Cloud Computing

Requirements Of System--:
Function Requirements-:
Non-Functional Requirements-:
Hardware & Software Requirements-:

3-D (Dimension) Security In Cloud Computing

Advantages

& Limitation Of System.

3-D (Dimension) Security In Cloud Computing

Block Diagrams & UML


Diagrams:-

3-D (Dimension) Security In Cloud


Computing
Block

Diagrams:-

Ring of Protection:-

Protection ring 1

Protection
Protectionring
ring2
3

10

USER ID
PASSWORD

USER ID
PASSWORD

TWO FACTOR
SMS

TWO FACTOR
SMS

BIO METRIC

BIO METRIC

Ring

Of Security:-

3-D (Dimension) Security In Cloud


Computing

11

BIO
METRIC

TWO FACTOR
SMS

USER ID
PASSWORD

BIO METRIC

TWO FACTOR
SMS

USER ID
PASSWORD

3-D (Dimension) Security In Cloud


Computing

Use Case Diagram

12

Use Case Diagram

13

Class Diagram

14

Sequence Diagram

15

Activity Diagram

16

Component Diagram

17

Deployment Diagram

18

Future

Scope

19

3-D (Dimension) Security In Cloud Computing

20

References
1)

Main Reference Paper is: 3 Dimensional Security in Cloud


Computing
Parikshit Prasad, Badrinath Ojha, Rajeev Ranjan shahi, Ratan
Lal,Abhishek Vaish,Utkarsh Goel Indian Institute of Information
Technology, Allahabad U.P India.
2) Cloud Computing Security: Department of Computer Science
and Computer Engineering, La Trobe University, Bundoora
3086,Australia..
3) Inc. Google App Engine. http://code.google.com/appengine/ .
4) A Method for Obtaining Digital Signatures and Public-Key
Cryptosystems R.L. Rivest, A. Shamir, and L. Adleman.
5) Public Key Cryptography Applications Algorithms and
Mathematical Explanations Anoop MS Tata Elxsi Ltd, India
6) Distributed Cloud Intrusion Detection Model Irfan Gul, M.
Hussain SZABIST Islamabad, Pakistan
7) A. Shamir, "How to share a secret" Communications of the ACM,
22(11), 1979, pp. 612-61
8) binarywarriors.googlecode.com/files/HASH_ALGORITHMS.pdf
21

3-D (Dimension) Security In Cloud Computing

22

You might also like