Mobile Data Sharing over Cloud Group No. 8 - Akshay Kantak - Swapnil Chavan - Harish Singh.

Slides:



Advertisements
Similar presentations
Creating HIPAA-Compliant Medical Data Applications with Amazon Web Services Presented by, Tulika Srivastava Purdue University.
Advertisements

Thomas S. Messerges, Ezzat A. Dabbish Motorola Labs Shin Seung Uk.
ICS 434 Advanced Database Systems
Cobalt: Separating content distribution from authorization in distributed file systems Kaushik Veeraraghavan Andrew Myrick Jason Flinn University of Michigan.
Chapter 22: Cloud Computing and Related Security Issues Guide to Computer Network Security.
Building and Deploying Safe and Secure Android Apps for Enterprise Presented by Technology Consulting Group at Endeavour Software Technologies.
Page 1 of 29 Net-Scale Technologies, Inc. Network Based Personal Information and Messaging Services Urs Muller Beat Flepp
Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.
 Guy Jacob  Roee Shapiro Project B Spring, 2009 Cloudio  Project Supervisor: Eddie Bortnikov  Lab Chief Engineer: Dr. Ilana David.
“Turn you Smart phone into Business phone “
Notes to the presenter. I would like to thank Jim Waldo, Jon Bostrom, and Dennis Govoni. They helped me put this presentation together for the field.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
Andrew Schroeder Networking Aspects of Cloud Computing.
12 Chapter 12 Client/Server Systems Hachim Haddouti.
Chapter 9: The Client/Server Database Environment
What is it? CLOUD COMPUTING.  Connects to the cloud via the Internet  Does computing tasks, or  Runs applications, or  Stores Data THE AVERAGE CLOUD.
CLOUD COMPUTING.  It is a collection of integrated and networked hardware, software and Internet infrastructure (called a platform).  One can use.
Lecture The Client/Server Database Environment
The Client/Server Database Environment
Plan Introduction What is Cloud Computing?
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
Company/Product Overview. You have lots of files all over the place.
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
Why consider the cloud? Cloud innovation presents challenges for IT.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Introduction to Cloud Computing
For more notes and topics visit:
By Mihir Joshi Nikhil Dixit Limaye Pallavi Bhide Payal Godse.
GIS and Cloud Computing. Flickr  Upload and manage your photos online  Share your photos with your family and friends  Post your photos everywhere.
Zentrum für sichere Informationstechnologie - Austria Bojan Suzic Open Identity Summit 2013 September 10th, Kloster Banz Secure Hardware-Based Public Cloud.
File-Mate 1500 Design Review II
Dell Connected Security Solutions Simplify & unify.
 Cloud Computing is an emerging field wherein the focus is on providing virtualized resources as service.  Also the user is almost entirely blinded.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Client – Server Architecture. Client Server Architecture A network architecture in which each computer or process on the network is either a client or.
By: Ashish Gohel 8 th sem ISE.. Why Cloud Computing ? Cloud Computing platforms provides easy access to a company’s high-performance computing and storage.
1 Introduction to Middleware. 2 Outline What is middleware? Purpose and origin Why use it? What Middleware does? Technical details Middleware services.
File-Mate 1500 Design Review III Keven Abbott Tyler Crouse Kiana Delventhal Liam Westby.
Plan  Introduction  What is Cloud Computing?  Why is it called ‘’Cloud Computing’’?  Characteristics of Cloud Computing  Advantages of Cloud Computing.
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
Amit Warke Jerry Philip Lateef Yusuf Supraja Narasimhan Back2Cloud: Remote Backup Service.
COMP1321 Digital Infrastructure Richard Henson University of Worcester December 2012.
Securely Synchronize and Share Enterprise Files across Desktops, Web, and Mobile with EasiShare on the Powerful Microsoft Azure Cloud Platform MICROSOFT.
{ Cloud computing. Exciting and relatively new technologies allow computing to be a part of our everyday lives. Cloud computing allows users to save their.
HUSKY CONSULTANTS FRANKLIN VALENCIA WIOLETA MILCZAREK ANTHONY GAGLIARDI JR. BRIAN CONNERY.
TM 8-1 Copyright © 1999 Addison Wesley Longman, Inc. Client/Server and Middleware.
User and Device Management
Client – Server Architecture A Basic Introduction 1.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
69% of employees say they are accessing business apps on personal devices Organizations say 34% of their employees are accessing business apps on.
Tomaž Čebul Principal Consultant Microsoft Bring Your Own Device, kaj pa je to?
[FUNCTIONALITY AND SAFETY OF A MODERN TECHNOLOGY] [CLOUD COMPUTING FOR INDIVIDUAL CONSUMERS]
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
Fault – Tolerant Distributed Multimedia Streaming Web Application By Nirvan Sagar – Srishti Ganjoo – Syed Shahbaaz Safir
CMSC 818J: Privacy enhancing technologies Lecture 2.
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
The Client/Server Database Environment
Amazon Storage- S3 and Glacier
Recommendation 6: Using ‘cloud computing’ to meet the societal need ‘Faster and transparent access to public sector services’ Cloud computing Faster and.
Chapter 9: The Client/Server Database Environment
Chapter 21: Cloud Computing and Related Security Issues
Chapter 22: Cloud Computing Technology and Security
CLOUD COMPUTING SECURITY
BluVault Provides Secure and Cost-Effective Cloud Endpoint Backup and Recovery Using Power of Microsoft OneDrive Business and Microsoft Azure OFFICE 365.
An Introduction to Cloud Computing
Enterprise Data Solution Running on the Azure Cloud Platform Protects, Preserves Critical Data “Druva takes a proactive approach to help customers address.
Salesforce.com Salesforce.com is the world leader in on-demand customer relationship management (CRM) services Manages sales, marketing, customer service,
Topic 12: Virtual Private Networks
Presentation transcript:

Mobile Data Sharing over Cloud Group No. 8 - Akshay Kantak - Swapnil Chavan - Harish Singh

Introduction Mobile cloud computing is integration of cloud computing into mobile environment. The basic idea is to use cloud for complex computations or just as a storage to extend mobile capability. Advantages like paying only for the infrastructure, scalability of applications, reductions in cost by getting rid of servers are achieved. The main aim of our project is to give a service to users to share data with others over cloud.

Problem statement There are many cloud providers available where users can store their data. Most of these can be accessed through PC and need an account to store data. Our system enables users to store their data from cell phone onto cloud and also share it with their friends. Also, user’s data can be compromised by the cloud provider. So, user’s cannot trust the cloud provider fully. We aim to encrypt user’s file before uploading them to the cloud hence providing security.

Related Work DataVault provides user’s with service to share their data securely over cloud. But it is currently only for computers. Data Guard is another work going on which shares and protects users data. It preserves data confidentiality and integrity using a middleware technology. It also provides disaster recovery and high availability.

Architecture

Architecture Continued The mobile device establishes a socket connection with the proxy server (middleware). The mobile device then sends the file to the server over this socket connection. The server then encrypts the file and sends it to the cloud provider. Server also sends an acknowledgement back to the client along with the URL to access the file. The user can share this URL with others so as to share the file with his/her friends.

Services used The cloud provider used is Amazon S3. S3 provides API to create and manage “buckets” on its cloud. These buckets can be used to identify each user. Access control can be managed for these buckets using S3 API’s. Server maintains a database of users so as to identify each user with his/her allocated buffer and provide only access to his/her bucket.

Choice of Cloud Provider Cloud computing is a form of outsourcing, and you need a high level of trust in the entities you'll be partnering with. It may seem daunting at first to realize that your application depends on the trustworthiness of your cloud providers, but this is not really anything new -- today, even if you're not using the cloud, you already rely on and trust: -- network service providers, -- software vendors, -- service providers, The cloud provider will be just one more entity on that list.

Cloud Provider Transparency You will only be able to assess the sufficiency of cloud provider security practices if the cloud provider is willing to disclose its security practices to you. If your provider treats security practices as a confidential or business proprietary thing, and won't disclose their security practices to you, you'll have a hard time assessing the sufficiency of their security practices. Unfortunately, you may need to consider using a different provider. So it is essential that the data needs to be secured before putting it on cloud. Our system aims at providing this security by encrypting the data before uploading it to the cloud.

Security Encryption is achieved using Amazon S3’s API for client side encryption. In this, a private encryption key is used for encryption which is not shared with Amazon. This encryption is done on the proxy server and the key is shared with the user. User will have to communicate the key to anyone with whom the file is to be shared.

Initial Screenshots

Scope for Future Work Providing a better interface to view shared files. Synchronizing our app with PC to allow easy sharing of data. Providing better authentication and allow group access to shared accounts. Extending our app so that it can be used on multiplatform such a iOS, Blackberry OS.

Conclusion Mobile cloud computing is one of mobile technology trends in the future. Computing technology is undergoing important transitions and the changes are creating serious data security, privacy and management challenges. Encryption also can cause serious problem and latency issues. Our Application on Android is an attempt to accomplish sharing of files over the cloud.