Conflict Resolution & Policy Compliance in Multi-Cloud Distributed System. Presented By:- Adarsh Pillay Deepak Begrajka Rudra gupta.

Slides:



Advertisements
Similar presentations
1 Miami-Dade County Public Schools. 2 From the Data Center to the Cloud: Manny Castañeda Miami-Dade County Public Schools.
Advertisements

Security Prospects through Cloud Computing by Adopting Multiple Clouds Meiko Jensen, Jorg Schwenk Jens-Matthias Bohli, Nils Gruschka Luigi Lo Iacono Presented.
CLOUD COMPUTING AN OVERVIEW & QUALITY OF SERVICE Hamzeh Khazaei University of Manitoba Department of Computer Science Jan 28, 2010.
Unified Logs and Reporting for Hybrid Centralized Management
INTRODUCTION TO CLOUD COMPUTING CS 595 LECTURE 4.
Presented by Sujit Tilak. Evolution of Client/Server Architecture Clients & Server on different computer systems Local Area Network for Server and Client.
Centrix Software Application discovery and management 8 November 2012 Richard Pegden Director of Product Marketing.
1. 2 New Computing Models, and What They Mean to the Small and Mid Sized Business Consumer How your business can make practical decisions between “The.
Plan Introduction What is Cloud Computing?
Banking Clouds V International Youth Banking Forum.
Security Framework For Cloud Computing -Sharath Reddy Gajjala.
PLUG IT IN 4 Cloud Computing. 1.Introduction 2.What Is Cloud Computing? 3.Different Types of Clouds 4.Cloud Computing Services 5.The Benefits of Cloud.
Security and Privacy: Can we trust the cloud?
Jordan Wissel Eric Lewis Sarah Basile. Introduction This presentation will analyze: Overview/History Implementation Advantages/Disadvantages Security.
3 Cloud Computing.
Construction of efficient PDP scheme for Distributed Cloud Storage. By Manognya Reddy Kondam.
Cloud Computing Kwangyun Cho v=8AXk25TUSRQ.
1 TAPAS Workshop Nicola Mezzetti - TAPAS Workshop Bologna Achieving Security and Privacy on the Grid Nicola Mezzetti.
In the name of God :).
CLOUD COMPUTING SECURITY – PENTESTING THE CLOUD Diogenes S. De Jesus CEH, Security+
Plan  Introduction  What is Cloud Computing?  Why is it called ‘’Cloud Computing’’?  Characteristics of Cloud Computing  Advantages of Cloud Computing.
Company small business cloud solution Client UNIVERSITY OF BEDFORDSHIRE.
Speaker: Meng-Ting Tsai Date:2010/11/25 The Information Assurance Practices of Cloud Computing Vendors IEEE Communications Society.
3/12/2013Computer Engg, IIT(BHU)1 CLOUD COMPUTING-1.
1 TCS Confidential. 2 Objective : In this session we will be able to learn:  What is Cloud Computing?  Characteristics  Cloud Flavors  Cloud Deployment.
A Methodology to Evaluate the Trustworthiness and Security Compliance of Cloud Service Providers Sasko Ristov Ss. Cyril and Methodius University, Skopje,
By Hajira Fatima Safa Mohammed Zaheer Abid Ali. Cloud computing is a result of evolving and adopting existing technologies. The goal of cloud computing.
CS 6027 Advanced Networking FINAL PROJECT ​. Cloud Computing KRANTHI ​ CHENNUPATI PRANEETHA VARIGONDA ​ SANGEETHA LAXMAN ​ VARUN ​ DENDUKURI.
© 2013 Cloud Technology Partners, Inc. / Confidential 1 The Many Faces of PaaS Platform as a Service Decisions Mike Kavis 10/08/2013.
Unit 3 Virtualization.
MED-V - Managing virtual PCs for IT Pros
Chapter 6: Securing the Cloud
MICROSOFT AZURE ISV PROFILE: BMC SOFTWARE
Azure Infrastructure for SAP®
Cloud adoption NECOOST Advisory | June 2017.
VIRTUALIZATION & CLOUD COMPUTING
Barracuda Networks Creates Next-Generation Security Solutions That Enable Customers to Accelerate Their Adoption of Microsoft Azure MICROSOFT AZURE APP.
Cloud computing-The Future Technologies
Information Technology Sector
Microsoft Azure Cloud Helps Clients Accelerate and Streamline Proposal Management Process “The flexibility, scalability and security of Azure made it the.
Hybrid Cloud Architecture for Software-as-a-Service Provider to Achieve Higher Privacy and Decrease Securiity Concerns about Cloud Computing P. Reinhold.
Bill Banks | Security Engineer
CLOUD COMPUTING Presented By:- EduTechlearners
Pass AWS-Certified-Solutions-Architect-Professional Certification in First Attempt - AWS-Certified-Solutions-Architect-Professional Valid Questions Answers - Realexamdumps.com
Interlake Hybrid Cloud Management Suite
EIS Fast-track Revision Om Trivedi Enterprise Information Systems
Cooperative Takes Control of IT with Barracuda Security Solutions Deployed on Microsoft Azure “Barracuda has provided us with a logical, easy, very intuitive.
Hosted on Microsoft Azure, Seismic is Drastically Changing How Enterprise Sales Teams Utilize Content to Accelerate Sales and Close Deals MICROSOFT AZURE.
Data Security for Microsoft Azure
Glynk on Microsoft Azure: A Social Networking Platform Connecting Like-Minded People Nearby for Recommendations, Activities, and Meetups MICROSOFT AZURE.
3 Cloud Computing.
TEMPLATE.
One-Stop Shop Manages All Technical Vendor Data and Documentation and is Globally Deployed Using Microsoft Azure to Support Asset Owners/Operators MICROSOFT.
ADAM on Microsoft Azure Streamlines Access and Control of Full Function Digital Asset and Product Content Management for All Workers MICROSOFT AZURE ISV.
Cloud computing Technology: innovation. Points  Cloud Computing and Social Network Sites have become major trends not only in business but also in various.
Cloud computing Technology: innovation. Points  Cloud Computing and Social Network Sites have become major trends not only in business but also in various.
Emerging technologies-
BluSync by ParaBlu Offers Secure Enterprise File Collaboration and Synchronization Solution That Uses Azure Blob Storage to Enable Secure Sharing MICROSOFT.
Fundamental Concepts and Models
Computer Science and Engineering
Cloud Computing LegalRun Solutions Why It’s Right for You!
Microsoft Azure Takes Document Management, Automation and Collaboration Further in Cloud MINI-CASE STUDY “Faster time to market, reduced costs, increased.
Zendos Tecnologia Utilizes the Powerful, Scalable
Basics of Cloud Computing
INTOSAI IT AUDIT TRAINING
MS-900 MS-101 Dumps PDF 2019
OU BATTLECARD: Oracle Identity Management Training
Microsoft Virtual Academy
The Database World of Azure
Cloud Computing for Wireless Networks
Presentation transcript:

Conflict Resolution & Policy Compliance in Multi-Cloud Distributed System. Presented By:- Adarsh Pillay Deepak Begrajka Rudra gupta

Content Introduction to Cloud Computing. Multi Cloud. Threats. Scenarios. Proposed Solution. Conclusion.

Evolution of cloud Computing 1950s Mainframe Computing 1970s Concept of Virtual Machine 1990s Telecommunications companies started offering VPN connections Grid Computing Utility Computing SaaS Cloud Computing

What Is Cloud Computing

Services of Cloud

Limitations in Single cloud Downtime Security and Privacy Vulnerability to attacks Limited control and Flexibility Limited number of Resources Platform Dependencies Cloud Computing Cost

Single Cloud to Multi Cloud

What is multi cloud  Use of multiple cloud computing services in a single heterogeneous architecture.

Need of multi cloud Autonomy-: Reducing Reliance on any single vendor Increasing flexibility through choice Mitigation against disaster Hybridity-: Some applications on-premises and others on one or more public clouds Extended capabilities Leveraging public cloud cost benefits Support varying level of security concerns

Threats in multi cloud Increase in attack surface due to system complexity. Data privacy concerns due to multitenancy. Cloud service provider don’t understand each other. Conflict in policies. Loss of client’s control over resources and data due to asset migration. The biggest issue in multi cloud environment is trust. Complexity. Management overhead.

SCENARIO 1 Two or more cloud merge together to form a multi cloud.

SCENARIO 2 New cloud want to join multi cloud.

Trust

incentive

Proposed Solution Weighted Probability Trust. Customization as a Service. Third Party Multi Cloud Audit

Weighted probability Trust Weighted probability= Pi. Number of Interaction for service = M. X, Y are User & A, B, C are CSP. Trust = (USERx, Number of interaction). Trust Factor = Σ(in) M(i)*Pi / Σ(in) M(i).

Example Trust factor of A = Mx * Px + My * Py + Mb * Pb Mx + My + Mb .5 .1 Trust factor of A= 1*.1 + 1*.5 + 1*(-.2) 1+1+1 = .134 -.2

Trusted Certified User A customer giving multiple reviews about multiple users. Ex:- Just like Amazon Certified Buyer.

Weighted Trust Probability + Recommender System CSP 1 want to collaborate with particular service of cloud 2. CSP 1 use recommender system to find trusted cloud. Sign a SLA if both agree. Proceed forward.

Customization Policy as A Service CSPs can choose their own policy and agree on it. User can select any predefined set of policies based on their requirements. Old policy can be used or rebuild new ones according to the requirements and if satisfied incentive.

Trusted third party Multi cloud audit Weighted probability trust has deployed a trusted environment. SLA is there but still we need a physical entity to keep regular check. Third party cloud auditor is the trusted party or friend who will keep regular check in the multi cloud environment.

Conclusion Started with single cloud, But not able to satisfy users need. Multi Cloud is able to satisfy user needs, but still poses some threats and limitations. Trust is the key issue in multi cloud architecture. We propose three method to generate full of trust architecture. Our architecture and methods if implemented can provide high level secure and conflict environment.