Multi-Cloud System To Avoid Server Failures

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 14

Multi-Cloud System to avoid

server failures
ABSTRACT
• Dealing with “single cloud” providers is predicted
to become less popular with customers due to
risks of service availability failure and the
possibility of malicious insiders in the single cloud.
• A movement towards “multi-clouds”, or in other
words, “interclouds” or “cloud-of-clouds” has
emerged recently. This paper surveys recent
research related to single and multi-cloud security
and addresses possible solutions.
ARCHITECTURE
EXISTING SYSTEM
• Cloud providers should address privacy and
security issues as a matter of high and urgent
priority. Dealing with “single cloud” providers
is becoming less popular with customers due
to potential problems such as service
availability failure and the possibility that
there are malicious insiders in the single
cloud.
DISADVANTAGES OF EXISTING SYSTEM
• 1. Cloud providers should address privacy and
security issues as a matter of high and urgent
priority.
•  
• 2. Dealing with “single cloud” providers is
becoming less popular with customers due to
potential problems such as service availability
failure and the possibility that there are
malicious insiders in the single cloud.
PROPOSED SYSTEM
• This paper focuses on the issues related to the
data security aspect of cloud computing. As
data and information will be shared with a
third party, cloud computing users want to
avoid an un-trusted cloud provider. Protecting
private and important information, such as
credit card details or a patient’s medical
records from attackers or malicious insiders is
of critical importance.
ADVANTAGES OF PROPOSED SYSTEM

• 1. Data Integrity
• 2. Service Availability.
• 3. The user runs custom applications using the
service provider’s resources
• 4. Cloud service providers should ensure the
security of their customers’ data and should
be responsible if any security risk affects their
customers’ service infrastructure.
MODULES
• 1. Data Integrity
• 2. Data Intrusion
• 3. Service Availability
• 4. DepSKy System Model
Data Integrity
• One of the most important issues related to
cloud security risks is data integrity. The data
stored in the cloud may suffer from damage
during transition operations from or to the
cloud storage provider.
Data Intrusion
• According to Garfinkel, another security risk that may occur with a
cloud provider, such as the Amazon cloud service, is a hacked
password or data intrusion. If someone gains access to an Amazon
account password, they will be able to access all of the account’s
instances and resources. Thus the stolen password allows the
hacker to erase all the information inside any virtual machine
instance for the stolen user account, modify it, or even disable its
services. Furthermore, there is a possibility for the user’s
email(Amazon user name) to be hacked (see for a discussion of
the potential risks of email), and since Amazon allows a lost
password to be reset by email, the hacker may still be able to log
in to the account after receiving the new reset password.
Service Availability
• Another major concern in cloud services is service
availability. Amazon mentions in its licensing
agreement that it is possible that the service might
be unavailable from time to time. The user’s web
service may terminate for any reason at any time if
any user’s files break the cloud storage policy. In
addition, if any damage occurs to any Amazon web
service and the service fails, in this case there will be
no charge to the Amazon Company for this failure.
Companies seeking to protect services from such
failure need measures such as backups or use of
multiple providers.
DepSKy System Model:
• The DepSky system model contains three
parts: readers, writers, and four cloud storage
providers, where readers and writers are the
client’s tasks. Bessani et al. explain the
difference between readers and writers for
cloud storage. Readers can fail arbitrarily (for
example, they can fail by crashing, they can
fail from time to time and then display any
behavior) whereas, writers only fail by
crashing.
HARDWARE REQUIREMENTS
•  
• Processor -Pentium –III
• Speed - 1.1 Ghz
• RAM - 256 MB(min)
• Hard Disk - 20 GB
• Floppy Drive - 1.44 MB
• Key Board - Standard Windows Keyboard
• Mouse - Two or Three Button Mouse
• Monitor- SVGA
SOFTWARE REQUIREMENTS
• Operating System :
Windows95/98/2000/XP
• Application Server : Tomcat5.0/6.X

• Front End : HTML, Java, JSP


• Script : JavaScript.
• Server side Script : Java Server Pages.
• Database : MYSQL

You might also like