Secure Multi-tenant Application in Software as a Service

Size: px
Start display at page:

Download "Secure Multi-tenant Application in Software as a Service"

Transcription

1 M. D. Samrajesh 1, andn.p.gopalan 2 1 Research and Development Centre, Bharathiar University, Coimbatore, Tamil Nadu , India. 2 Professor, National Institute of Technology, Tiruchirappalli, Tamil Nadu , India. samrajesh.md@gmail.com; npgopalan@nitt.edu Abstract. A multi-tenant application in Software as a Service (SaaS) is accessed by multiple organizations called tenants who have several users attached to them. Multi-tendency enhances resource utilization by effectively sharing resources and reducing cost, increasing productivity and online collaboration. However, providing a secure multi-tenant access to various tenants is still a challenge. Traditional security methods of applications are not effective in a multi-tenant application model due to multiple tenants access on a single application instance at runtime. This paper focuses on providing an integrated security model for SaaS application. The tenant specific security specifications are defined using a pluggable component that can be easily integrated to the SaaS application. It works effectively in enforcing security controls, and monitoring SaaS application security. The pluggable security definitions can be easily interlaced with the application at runtime without any interference from the provider. Thereby the multitenant SaaS provider focuses more on the application functionality rather on application security. The proposed Secure Multi-tenant Application (SMA) model provides security isolation among tenants at various levels during runtime, reduces security risks and protects sensitive tenant data. Our evaluation and discussions show the effectiveness of the proposed model in securing SaaS multitenant application. Keywords: Application security, Cloud computing, Encryption, Multi-tenancy, SaaS. 1. Introduction Cloud Computing based Software as a Service (SaaS) multi-tenant application allow SaaS providers offer a single application that runs on top of shared hardware resources as shown in figure 1 to several users from multiple organizations called tenants [9]. In a SaaS multitenant environment operational overheads and maintenance is considerably low due to the sharing of hardware and software resources among multiple tenants. Moreover, upgrades need to be applied only to the shared application instance giving all tenants access the most recent version of the application. Maximum resource utilization and efficiency is achieved by application-level multi-tenancy where the infrastructure, data storage, operating system, and the application are shared among multiple tenants [2]. SaaS offers tremendous benefits, however concerns of security is one of the primary obstacle that makes organizations avoid its adoption [1]. Traditional model of application security that is fixed and hard coded by service providers are not well suited for multitenant applications that run on single shared instance. Moreover, earlier models of security are system based rather than tenant based. Additional, various commercial cloud platforms have limited security solutions [17]. The proposed secure multi-tenant application model is an integrated security model that defines a flexible pluggable component which is tenant specific and that can be easily integrated to the SaaS application. It works effectively in enforcing security controls and monitoring SaaS application security. The pluggable component s tenant security specifications can be easily interlaced with the application at runtime without any interference from the provider. Thereby the multitenant SaaS provider focuses more on the application functionality rather on application security. The proposed SMA provides effective tenant isolation at the database level, application level, and during runtime. We evaluated our proposed method by Monte Carlo method using Arena [15] and our customized tool [12]. Our evaluation and discussions based on parameters in [6] shows the effectiveness of the proposed model in securing SaaS multitenant application. Corresponding author Elsevier Publications 2013.

2 Figure 1. General multi-tenant application architecture. The paper is structured as follows: Motivation & problem definition is presented in Section 2; Section 3 discusses related work, background information on multitenant architecture is presented in Section 4. Our proposed secure multitenant application model is presented in Section 5, the evaluation and discussions on the proposed model are presented in Section 6 and finally, the conclusion and future work are in Section Motivation and Problem Definition Data security is another important area of research in cloud computing [3]. In SaaS model, the tenants depend on the SaaS application providers for their application security. The provider has to ensure that no tenant can view each other s data; it is often complex for the provider to ensure the presence of right security measures [9]. Moreover the provider might replicate tenant s data to multiple locations for maintaining high availability, the security measures should not be compromised during the process. Clients of cloud computing services currently have no means of verifying the condentiality and integrity of their data and computation [5]. SaaS offers various features that can significantly reduce IT costs by placing data and computation onto cloud platform. However, many organizations are reluctant move to cloud, primarily due to the security concerns [5]. The dynamic nature of multi-tenant application model further intensifies the application complexity and makes security more challenging [14]. Auditability can be generally achieved using remote verification methods. Remote verification requires a Trusted Platform Module (TPM). However, in a cloud where resources are virtualized, and virtual machines (VMs) dynamically migrate from one location to another, the above verification is not sufficient [5]. Enterprises are still not confident with the SaaS model due to lack of visibility about the means their data is stored and secured. Moreover, there is a huge anxiety over the lack of control and knowledge about tenant s data in SaaS [8]. 3. Related Work Current multi-tenant cloud security solutions take an inert stand to permissions as systems are functioning around a simple concept relating to the access rights of the user [18], for example the user is granted entry or denied entry based on a key. All subsequent actions are carried out based on the outcome of the initial attempt to access. Not much research has been done in the area of security of multi-tenant SaaS applications [16]. Different commercial cloud platforms have limited security solutions [17]. An approach that transforms existing web applications into multi-tenant SaaS applications is proposed in [19,20]. It focused on isolation problem by investigating application to identify the potential isolation points that should be handled by the application developers. A framework that supports a set of common services that provide security isolation, performance isolation is presented in [21]. The security isolation pattern considers the case of different security requirements while still using a predefined, built-in, security controls. Moreover security policies depend on Elsevier Publications

3 M. D. Samrajesh and N. P. Gopalan Figure 2. Block diagram of secure multi-tenant application. the tenant s administration personnel configuration that is done manually which maps users and their roles in the application. A model-driven platform that creates SaaS applications as a set of services is presented in [22]. The approach focuses on enabling cloud customers to create their system instances and specify their security requirements. However, tenants instances need to be deployed on separate VMs. Moreover, it lacks facility to update or reconfigure the defined security. A hierarchical based access control model is presented in [23]. The model increases the number of levels to the access control policy hierarchy; it includes new roles such as service providers administrators and tenants administrators. Service provider administrators delegate the authorization to the tenant s administrators to grant access rights to their predefined resources. Secure load distribution SaaS architecture is presented in [13]. The architecture is based on a set of services that provide routing, logging, and security. Their proposed security service delivers predefined authentication and authorization mechanisms. However, no isolation is provided between the authentication and authorization data of different tenants. Our proposed method considers tenant specific custom security implementations which are integrated with the SaaS application provider s security model thereby providing an integrated pluggable security model as shown in figure Multitenant Architecture Multi-tenancy is an application architecture where multiple clients or organizations (tenants) are served by a single application as illustrated in figure 1. A Multi-Tenant Application (MTA) is highly scalable and shared among multiple tenants hence it reduces cost, reduces software development time and brings down maintenance cost [7]. All tenants accessing the multi-tenant application run on the same source code, however certain tenant specific requirements are generated at run-time. Having a shared code benefits all tenants as updates can be applied centrally, moreover this enhances productivity and online collaboration. To accomplish large scale scalability, a multi-tenant application is designed to be stateless. Tenant-specific data are kept either at the tenant side or at the database. Moreover, unlike traditionally systems, tenant-specific implementations of application logic are created during run-time for each tenant. The MTA queries the database for necessary tenantspecific business logic and creates a customized implementation at run-time. Multitenant application is multifarious in nature and accomplishes individual tenant s requirements [10]. Tenants are offered with a well customized application that makes them experience as if the application is exclusively designed for them [7]. 5. Proposed Secure Multi-tenant Application (SMA) Model 5.1 Assumptions One single multitenant application is used simultaneously by multiple tenants. Each tenant has n number of users attached to them. The multitenant application consists of components that are modules of the application which is designed based on the business processes. Tenant s users by default access the core application components, all add-on components including the security component are accessed based on tenant specific needs. 828 Elsevier Publications 2013.

4 Figure 3. Intersection of security entities. Figure 4. Proposed secure multi-tenant application (SMA) model 5.2 Secure multi-tenant application (SMA) The proposed Secure Multi-tenant Application (SMA) model as shown in figure 4 consists of a Tenant Security Specification (TSS) which consists of custom security specification, securely stored either at the tenant side or the provider side; it is used to generate the pluggable secure component that secures the application. As shown is figure 3 the framework consists of a tenant pluggable security component that is integrated with the application of the tenant at run-time. The Tenant pluggable components consists of the following core entities Digital Signature with IdM for Authentication and Authorization. Relevant tenant information is securely replicated to the SaaS providers. Authorization using XACML (extensible Access Control Markup Language) delegation method is used to provide decentralized administration of access policy. The custom TenantSecurity Specification (TSS) is configuredby the tenants with their location MAC address or using directory lookup LDAP. Network security is provided with the pluggable custom security options configured by the tenant s predefined Application Programming Interface (APIs) signatures using Secure Socket Layer (SSL) and the Transport Layer Security (TLS) with an encrypted connection between a customer s data and application. Data Security is implemented for all tenants data by encryption using the key of tenant and the provider; hence it is neither accessible nor tampered by unauthorized person. Elsevier Publications

5 M. D. Samrajesh and N. P. Gopalan Figure 5. Application security risk factor, SMA- Secure multi-tenant application, GM- General Model Data integrity is provided by data segregation and confidentiality by allowing fine-grained authorization controlled access to application and data. Accountability is effectively implemented by comprehensive logging. All actions on tenant specific data and application component access are monitored, correlated and alerts are sent to tenants and the provider. The pluggable custom TSS is configured by the tenant with their location Media Access control (MAC) address or by using directory lookup Lightweight Directory Access Protocol (LDAP). This along with digital signatures, secure network access, data encryption ensures enforcing security at runtime based on the tenants configuration, moreover the proposed framework monitors the potential security breaches on the tenant data, manages data isolation between tenants services. These integrated measures ensure elevated application security by enforcing varied sets of custom security measures in application. 6. Evaluation and Discussions 6.1 Simulation setup The application security risk analysis is done by Monte Carlo method [4] using automation software Arena [15] and our customized tool [12]. We simulate risk factors with inputs generated according to probability distribution model; this allows us to make optimal choices against composite cyber-attack models that otherwise cannot be easily identified. A risk level is defined as the probability of some defencelessness or weakness within a specific timeframe. Undesirable risks that occur either at the tenant or SaaS application provider side impact the system and reduces the availability, integrity, confidentiality of the MTA. Each risk is quantitatively measured using a scale that ranges between 1 and Parameters for evaluation We use multi-variable defensive criterion (X i ) to evaluate the proposed model. X 1 -Unsafe Identify Management, X 2 -Absence of Tenant application monitoring X 3 -Absence of finer Granularity of application and data access, X 4 -Absence of Tenant data isolation, X 5 -Absence of Secure Network access, X 6 -Insecure Backups storage, X 7 -Absence of High availability, X 8 -Absence of Data recovery mechanism Risk classification We consider 2 scenarios based on [11], scenario-i uses 3 categories of risks labeled a) Low b) Medium, and c) High; and in scenario-ii we use of 6 categories of risks labeled as a) Not possible, b) Most unlikely c) Unlikely d) Likely e) Most Likely and f) Surely; for each of the variable, the defensive criterion (Xi) is expressed by probability distributions. 830 Elsevier Publications 2013.

6 6.1.3 Discussions The proposed SMA provides security isolation among tenants at various levels during runtime and for data offline. Our assessment of the proposed system in terms of probability of adversary risk factor shows that, the security risk associated in SaaS application is based upon multidimensional aspects. It can be expressed numerically as the product of the probability of occurrence and expected risk associated with one or many undesirable event that is defined in defensive criterion. Our evaluation is based on parameters in [6]. Our evaluation outcome in Fig.5 shows that the security risks of General Model (GM) and SMA using the 6, 3 risk factors respectively, the risk factor fluctuates in GM when compared to SMA. Moreover, the average risk factor of SMA is less than GM. This shows the effectiveness of the proposed solution in securing SaaS multitenant applications. Application security risks can be reduced by incorporating the pluggable SMA based security framework in SaaS application. Implementation the proposed SaaS security model increases the SaaS providers and tenants confidence and enables its speedy and wider adoption. 7. Conclusion and Future Work Today, SaaS tenants demand transparency from the provider on how their data is secured at the datacenter. The challenge is to have a customizable tenant based approach that securely provide access to the tenant s data and monitors any illegal access of both application and tenant data. We proposed an integrated Secure Multi-tenant Application (SMA) model that is custom defined and pluggable to multi-tenant application. Our evaluation based on the multivariable defensive criterion and our discussions show that the proposed SMA framework is effective in reducing the security risk associated with multi-tenant application and alleviate the security concerns of the tenants. Our future work is to integrate the security framework with the overall architecture of multi-tenant SaaS application. References [1] M. Armbrust, A. Fox, R. Griffith, A. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica and M. Zaharia, Above the Clouds: A Berkeley View of Cloud Computing. Technical Report No. UCB/EECS , University of California at Berkley, USA, Feb. 10, [2] F. Chong and G. Carraro, Architecture Strategies for Catching the Long Tail. Microsoft Corporation, April [3] Zhang, Qi, Lu Cheng and Raouf Boutaba, Cloud computing: state-of-the-art and research challenges. Journal of Internet Services and Applications vol. 1.1, pp. 7 18, (2010). [4] Sahinoglu and Mehmet, Security meter: A practical decision-tree model to quantify risk. Security & Privacy, IEEE,vol. 3.3, pp , (2005). [5] Santos, Nuno, Krishna P. Gummadi and Rodrigo Rodrigues, Towards trusted cloud computing. Proceedings of the 2009 conference on Hot topics in cloud computing, [6] S. Subashini and V. Kavitha, A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications, vol. 34.1, pp. 1 11, (2011). [7] Bezemer, Cor-Paul and Andy Zaidman, Multi-tenant SaaS applications: maintenance dream or nightmare?. Proceedings of the Joint ERCIM Workshop on Software Evolution (EVOL) and International Workshop on Principles of Software Evolution (IWPSE). ACM, [8] Popovic, Kresimir and Zeljko Hocenski. Cloud computing security issues and challenges. MIPRO, 2010 proceedings of the 33rd international convention. IEEE, [9] Choudhary and Vidyanand, Software as a service: Implications for investment in software development. System Sciences, HICSS th Annual Hawaii International Conference on. IEEE, [10] Weissman, D. Craig and Steve Bobrowski, The design of the force. com multitenant internet application development platform. Proceedings of the 35th SIGMOD international conference on Management of data. ACM, [11] Kaplan, Stanley and B. John Garrick, On the quantitative definition of risk. Risk analysis, vol. 1.1, pp , (1981). [12] M. D. Samrajesh and N. P. Gopalan, AppSIM: An Application Simulator for Software as a Service (SaaS), Proceedings of the International Conference on Computational Techniques and Mobile Computing (ICCTMC 2012), Dec , Singapore, pp , ISBN: , [13] Z. Pervez, S. Lee, et al, Multi-tenant, secure, load disseminated SaaS architecture, In Proc. 12th Int. Conf. on Advanced Communication Technology, South Korea, pp , [14] Ren, Kui, Cong Wang and Qian Wang, Security challenges for the public cloud. Internet Computing, IEEE, vol. 16.1, pp , (2012). [15] Kelton, W. David, Randall P. Sadowski and Deborah A. Sadowski, Simulation with ARENA, vol. 2. New York: McGraw-Hill, [16] Almorsy, Mohamed, John Grundy and Amani S. Ibrahim, TOSSMA: A Tenant-Oriented SaaS Security Management Architecture. Cloud Computing (CLOUD), 2012 IEEE 5th International Conference on. IEEE, Elsevier Publications

7 M. D. Samrajesh and N. P. Gopalan [17] M. Brock and A. Goscinski, Toward a Framework for Cloud Security, Algorithms and Architectures for Parallel Processing. vol. 6082, C.-H. Hsu, L. Yang, J. Park and S.-S. Yeo, Eds., ed: Springer Berlin / Heidelberg, pp , [18] Flood, Jason and Anthony Keane, A Proposed Framework for the Active Detection of Security Vulnerabilities in Multitenancy Cloud Systems. Emerging Intelligent Data and Web Technologies (EIDWT), 2012 Third International Conference on. IEEE, [19] H. Cai, N. Wang, et al., A Transparent Approach of Enabling SaaS Multi-tenancy in the Cloud, in Proc th IEEE World Congress on Services, pp , [20] H. Cai, K. Zhang, et al., An End-to-End Methodology and Toolkit for Fine Granularity SaaS-ization, in Proc IEEE Int. Conf. on Cloud Computing, pp , [21] C. Guo, W. Sun, et al., A Framework for Native Multi-Tenancy Application Development and Management, in Proc. 9th IEEE Int. Conf. on E-Commerce Technology, pp [22] M. Menzel, R. Warschofsky, et al., The Service Security Lab: A Model-Driven Platform to Compose and Explore Service Security in the Cloud, in Proc. World Congress on Services, pp , [23] T. J. Jing Xu, H. Dongjian, et al., Research and implementation on access control of management-type SaaS, in Proc. IEEE Int. Conf. on Information Management and Engineering, pp , Elsevier Publications 2013.

An Analysis of Data Security Threats and Solutions in Cloud Computing Environment

An Analysis of Data Security Threats and Solutions in Cloud Computing Environment An Analysis of Data Security Threats and Solutions in Cloud Computing Environment Rajbir Singh 1, Vivek Sharma 2 1, 2 Assistant Professor, Rayat Institute of Engineering and Information Technology Ropar,

More information

Data Integrity for Secure Dynamic Cloud Storage System Using TPA

Data Integrity for Secure Dynamic Cloud Storage System Using TPA International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 7-12 International Research Publication House http://www.irphouse.com Data Integrity for Secure

More information

Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.

Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption. Secure Privacy-Preserving Cloud Services. Abhaya Ghatkar, Reena Jadhav, Renju Georgekutty, Avriel William, Amita Jajoo DYPCOE, Akurdi, Pune ghatkar.abhaya@gmail.com, jadhavreena70@yahoo.com, renjug03@gmail.com,

More information

Secure Attack Measure Selection and Intrusion Detection in Virtual Cloud Networks. Karnataka. www.ijreat.org

Secure Attack Measure Selection and Intrusion Detection in Virtual Cloud Networks. Karnataka. www.ijreat.org Secure Attack Measure Selection and Intrusion Detection in Virtual Cloud Networks Kruthika S G 1, VenkataRavana Nayak 2, Sunanda Allur 3 1, 2, 3 Department of Computer Science, Visvesvaraya Technological

More information

SECURITY THREATS TO CLOUD COMPUTING

SECURITY THREATS TO CLOUD COMPUTING IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 2, Issue 3, Mar 2014, 101-106 Impact Journals SECURITY THREATS TO CLOUD

More information

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department

More information

Data Integrity Check using Hash Functions in Cloud environment

Data Integrity Check using Hash Functions in Cloud environment Data Integrity Check using Hash Functions in Cloud environment Selman Haxhijaha 1, Gazmend Bajrami 1, Fisnik Prekazi 1 1 Faculty of Computer Science and Engineering, University for Business and Tecnology

More information

Multi-Tenant Engineering Architecture in SaaS

Multi-Tenant Engineering Architecture in SaaS Multi-Tenant Engineering Architecture in SaaS Sunil Kumar Khatri Himanshu Singhal Khushboo Bahri ABSTRACT Multi-Tenancy in SaaS (Software as a Service) architecture is the concept leveraging cloud computing

More information

Analysis of Privacy Challenges and Security Concerns in Cloud Computing Varun Shukla Department of EC, PSIT

Analysis of Privacy Challenges and Security Concerns in Cloud Computing Varun Shukla Department of EC, PSIT Analysis of Privacy Challenges and Security Concerns in Cloud Computing Varun Shukla Department of EC, PSIT Abstract Cloud computing is a method to enhance the capacity dynamically without investing in

More information

Public Auditing for Shared Data in the Cloud by Using AES

Public Auditing for Shared Data in the Cloud by Using AES Public Auditing for Shared Data in the Cloud by Using AES 1 Syagamreddy Subbareddy, 2 P.Tejaswi, 3 D.Krishna 1 M.Tech(CSE) Pursuing, 2 Associate Professor, 3 Associate Professor,HOD, 1,2,3 Dept. of Computer

More information

Dynamic Resource Pricing on Federated Clouds

Dynamic Resource Pricing on Federated Clouds Dynamic Resource Pricing on Federated Clouds Marian Mihailescu and Yong Meng Teo Department of Computer Science National University of Singapore Computing 1, 13 Computing Drive, Singapore 117417 Email:

More information

TOSSMA: A Tenant-Oriented SaaS Security Management Architecture

TOSSMA: A Tenant-Oriented SaaS Security Management Architecture TOSSMA: A Tenant-Oriented SaaS Security Management Architecture Mohamed Almorsy, John Grundy, and Amani S. Ibrahim Centre for Computing & Engineering Software Systems Swinburne University of Technology

More information

Conceptual Approach for Performance Isolation in Multi-Tenant Systems

Conceptual Approach for Performance Isolation in Multi-Tenant Systems Conceptual Approach for Performance Isolation in Multi-Tenant Systems Manuel Loesch 1 and Rouven Krebs 2 1 FZI Research Center for Information Technology, Karlsruhe, Germany 2 SAP AG, Global Research and

More information

A Hybrid Load Balancing Policy underlying Cloud Computing Environment

A Hybrid Load Balancing Policy underlying Cloud Computing Environment A Hybrid Load Balancing Policy underlying Cloud Computing Environment S.C. WANG, S.C. TSENG, S.S. WANG*, K.Q. YAN* Chaoyang University of Technology 168, Jifeng E. Rd., Wufeng District, Taichung 41349

More information

An Overview on Important Aspects of Cloud Computing

An Overview on Important Aspects of Cloud Computing An Overview on Important Aspects of Cloud Computing 1 Masthan Patnaik, 2 Ruksana Begum 1 Asst. Professor, 2 Final M Tech Student 1,2 Dept of Computer Science and Engineering 1,2 Laxminarayan Institute

More information

International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 Software as a Model for Security in Cloud over Virtual Environments S.Vengadesan, B.Muthulakshmi PG Student,

More information

A Comparative Study of Applying Real- Time Encryption in Cloud Computing Environments

A Comparative Study of Applying Real- Time Encryption in Cloud Computing Environments A Comparative Study of Applying Real- Time Encryption in Cloud Computing Environments Faraz Fatemi Moghaddam (f.fatemi@ieee.org) Omidreza Karimi (omid@medicatak.com.my) Dr. Ma en T. Alrashdan (dr.maen@apu.edu.my)

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK IMPLEMENTATION OF AN APPROACH TO ENHANCE QOS AND QOE BY MIGRATING SERVICES IN CLOUD

More information

THE CLOUD AND ITS EFFECTS ON WEB DEVELOPMENT

THE CLOUD AND ITS EFFECTS ON WEB DEVELOPMENT TREX WORKSHOP 2013 THE CLOUD AND ITS EFFECTS ON WEB DEVELOPMENT Jukka Tupamäki, Relevantum Oy Software Specialist, MSc in Software Engineering (TUT) tupamaki@gmail.com / @tukkajukka 30.10.2013 1 e arrival

More information

IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD

IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD 1 Ms.Nita R. Mhaske, 2 Prof. S.M.Rokade 1 student, Master of Engineering, Dept. of Computer Engineering Sir Visvesvaraya

More information

Architectural Concerns in Multi-Tenant SaaS Applications

Architectural Concerns in Multi-Tenant SaaS Applications Architectural Concerns in Multi-Tenant SaaS Applications Rouven Krebs 1, Christof Momm 1 and Samuel Kounev 2 1 SAP AG, Dietmar-Hopp-Allee 16, 69190 Walldorf, Germany 2 Karlsruhe Institute of Technology,

More information

AN EFFICIENT STRATEGY OF THE DATA INTEGRATION BASED CLOUD

AN EFFICIENT STRATEGY OF THE DATA INTEGRATION BASED CLOUD INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF THE DATA INTEGRATION BASED CLOUD Koncha Anantha Laxmi Prasad 1, M.Yaseen Pasha 2, V.Hari Prasad 3 1

More information

Sheltered Multi-Owner Data distribution For vibrant Groups in the Cloud

Sheltered Multi-Owner Data distribution For vibrant Groups in the Cloud Sheltered Multi-Owner Data distribution For vibrant Groups in the Cloud I.sriram murthy 1 N.Jagajeevan 2 II M-Tech student Assistant.Professor Department of computer science & Engineering Department of

More information

Security Issues in Cloud Computing

Security Issues in Cloud Computing Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources

More information

Nessus or Metasploit: Security Assessment of OpenStack Cloud

Nessus or Metasploit: Security Assessment of OpenStack Cloud Nessus or Metasploit: Security Assessment of OpenStack Cloud Aleksandar Donevski, Sasko Ristov and Marjan Gusev Ss. Cyril and Methodius University, Faculty of Information Sciences and Computer Engineering,

More information

ADVANCE SECURITY TO CLOUD DATA STORAGE

ADVANCE SECURITY TO CLOUD DATA STORAGE Journal homepage: www.mjret.in ADVANCE SECURITY TO CLOUD DATA STORAGE ISSN:2348-6953 Yogesh Bhapkar, Mitali Patil, Kishor Kale,Rakesh Gaikwad ISB&M, SOT, Pune, India Abstract: Cloud Computing is the next

More information

Cloud Database Storage Model by Using Key-as-a-Service (KaaS)

Cloud Database Storage Model by Using Key-as-a-Service (KaaS) www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 7 July 2015, Page No. 13284-13288 Cloud Database Storage Model by Using Key-as-a-Service (KaaS) J.Sivaiah

More information

Agent Based Framework for Scalability in Cloud Computing

Agent Based Framework for Scalability in Cloud Computing Agent Based Framework for Scalability in Computing Aarti Singh 1, Manisha Malhotra 2 1 Associate Prof., MMICT & BM, MMU, Mullana 2 Lecturer, MMICT & BM, MMU, Mullana 1 Introduction: Abstract: computing

More information

Comparison of Request Admission Based Performance Isolation Approaches in Multi-tenant SaaS Applications

Comparison of Request Admission Based Performance Isolation Approaches in Multi-tenant SaaS Applications Comparison of Request Admission Based Performance Isolation Approaches in Multi-tenant SaaS Applications Rouven Kreb 1 and Manuel Loesch 2 1 SAP AG, Walldorf, Germany 2 FZI Research Center for Information

More information

A Study on the Cloud Computing Architecture, Service Models, Applications and Challenging Issues

A Study on the Cloud Computing Architecture, Service Models, Applications and Challenging Issues A Study on the Cloud Computing Architecture, Service Models, Applications and Challenging Issues Rajbir Singh 1, Vivek Sharma 2 1, 2 Assistant Professor, Rayat Institute of Engineering and Information

More information

Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud

Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud Arpitha.K 1,Aawini.T 2,Divya J. 3, Kalyani P 4, Prof. Sudhakar Avareddy 5 1,2,3,4 Department of CSE, BITM Bellary, Karnataka. 5 Department

More information

A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services

A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services Ronnie D. Caytiles and Byungjoo Park * Department of Multimedia Engineering, Hannam University

More information

Cloud Computing: A Question of Trust Maintaining Control and Compliance with Data-centric Information Security

Cloud Computing: A Question of Trust Maintaining Control and Compliance with Data-centric Information Security Russ Dietz Vice President & Chief Technology Officer Cloud Computing: A Question of Trust Maintaining Control and Compliance with Data-centric Information Security By Russ Dietz Vice President & Chief

More information

H Y T RUST: S OLUTION B RIEF. Solve the Nosy Neighbor Problem in Multi-Tenant Environments

H Y T RUST: S OLUTION B RIEF. Solve the Nosy Neighbor Problem in Multi-Tenant Environments H Y T RUST: S OLUTION B RIEF Solve the Nosy Neighbor Problem in Multi-Tenant Environments Summary A private cloud with multiple tenants such as business units of an enterprise or customers of a cloud service

More information

A Review of Load Balancing Algorithms for Cloud Computing

A Review of Load Balancing Algorithms for Cloud Computing www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Issue -9 September, 2014 Page No. 8297-8302 A Review of Load Balancing Algorithms for Cloud Computing Dr.G.N.K.Sureshbabu

More information

Security Issues in Cloud Computing

Security Issues in Cloud Computing Security Issues in Cloud Computing Dr. A. Askarunisa Professor and Head Vickram College of Engineering, Madurai, Tamilnadu, India N.Ganesh Sr.Lecturer Vickram College of Engineering, Madurai, Tamilnadu,

More information

How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System

How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System REVIEW ARTICAL A Novel Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage Dumala Harisha 1, V.Gouthami 2 1 Student, Computer Science & Engineering-Department, JNTU Hyderabad India

More information

Multi-Tenant Architecture Comparison

Multi-Tenant Architecture Comparison Multi-Tenant Architecture Comparison Jaap Kabbedijk, Michiel Pors, Slinger Jansen, and Sjaak Brinkkemper Department of Information and Computing Sciences Utrecht University, Netherlands {J.Kabbedijk, M.Pors,

More information

A Proposed Secure Framework for Safe Data Transmission in Private Cloud

A Proposed Secure Framework for Safe Data Transmission in Private Cloud A Proposed Secure Framework for Safe Data Transmission in Private Cloud Rohit Maheshwari, Sunil Pathak Abstract Cloud security is the current discussion in the IT world. In the cloud, the data is transferred

More information

A Proposed Case for the Cloud Software Engineering in Security

A Proposed Case for the Cloud Software Engineering in Security A Proposed Case for the Cloud Software Engineering in Security Victor Chang and Muthu Ramachandran School of Computing, Creative Technologies and Engineering, Leeds Metropolitan University, Headinley,

More information

Security Aspects of Cloud Computing

Security Aspects of Cloud Computing Security Aspects of Cloud Computing Kunal Chadha Scholar, CSE Department University of Southern California, USA Anvita Bajpai X-Scholar, CSE Department Marist College, NY, USA ABSTRACT Cloud Computing

More information

Development of enhanced Third party Auditing Scheme for Secure Cloud Storage

Development of enhanced Third party Auditing Scheme for Secure Cloud Storage Development of enhanced Third party Auditing Scheme for Secure Cloud Storage Bhanu Prakash Chamakuri*1, D. Srikar*2, Dr. M.Suresh Babu*3 M.Tech Scholar, Dept of CSE, Grandhi Varalakshmi Institute Of Technology,

More information

The Analysis of Cloud Computing Major Security Concerns & Their Solutions

The Analysis of Cloud Computing Major Security Concerns & Their Solutions Journal of Information & Communication Technology Vol. 6, No. 2, (Fall 2012) 48-53 The Analysis of Cloud Computing Major Security Concerns & Their Solutions Farhat Sharif * Institute of Business and Technology

More information

N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD. R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 ABSTRACT

N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD. R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 ABSTRACT N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 1 M.Tech Student, Department of Computer Science and Engineering, S.R.M. University Chennai 2 Asst.Professor,

More information

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer

More information

HOST SCHEDULING ALGORITHM USING GENETIC ALGORITHM IN CLOUD COMPUTING ENVIRONMENT

HOST SCHEDULING ALGORITHM USING GENETIC ALGORITHM IN CLOUD COMPUTING ENVIRONMENT International Journal of Research in Engineering & Technology (IJRET) Vol. 1, Issue 1, June 2013, 7-12 Impact Journals HOST SCHEDULING ALGORITHM USING GENETIC ALGORITHM IN CLOUD COMPUTING ENVIRONMENT TARUN

More information

Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving,

Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving, Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Third Party

More information

PRIVACY PRESERVATION ALGORITHM USING EFFECTIVE DATA LOOKUP ORGANIZATION FOR STORAGE CLOUDS

PRIVACY PRESERVATION ALGORITHM USING EFFECTIVE DATA LOOKUP ORGANIZATION FOR STORAGE CLOUDS PRIVACY PRESERVATION ALGORITHM USING EFFECTIVE DATA LOOKUP ORGANIZATION FOR STORAGE CLOUDS Amar More 1 and Sarang Joshi 2 1 Department of Computer Engineering, Pune Institute of Computer Technology, Maharashtra,

More information

Mutual Authentication Cloud Computing Platform based on TPM

Mutual Authentication Cloud Computing Platform based on TPM Mutual Authentication Cloud Computing Platform based on TPM Lei Peng 1, Yanli Xiao 2 1 College of Information Engineering, Taishan Medical University, Taian Shandong, China 2 Department of Graduate, Taishan

More information

Cloud Information Accountability Framework for Auditing the Data Usage in Cloud Environment

Cloud Information Accountability Framework for Auditing the Data Usage in Cloud Environment International Journal of Computational Engineering Research Vol, 03 Issue, 11 Cloud Information Accountability Framework for Auditing the Data Usage in Cloud Environment D.Dhivya 1, S.CHINNADURAI 2 1,M.E.(Cse),

More information

Performance Gathering and Implementing Portability on Cloud Storage Data

Performance Gathering and Implementing Portability on Cloud Storage Data International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 17 (2014), pp. 1815-1823 International Research Publications House http://www. irphouse.com Performance Gathering

More information

AN APPROACH TOWARDS FUNCTIONING OF PUBLIC AUDITABILITY FOR CLOUD ENRICHMENT

AN APPROACH TOWARDS FUNCTIONING OF PUBLIC AUDITABILITY FOR CLOUD ENRICHMENT INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN APPROACH TOWARDS FUNCTIONING OF PUBLIC AUDITABILITY FOR CLOUD ENRICHMENT Mohd Abdul Shoaib 1, Akheel Mohammed 2, Ayesha 3

More information

PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING

PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING T.Vidhya Sree M.Phil Research Scholar,CS, MGR College, Hosur (India) ABSTRACT Cloud Computing is the long dreamed vision

More information

Cloud Template, a Big Data Solution

Cloud Template, a Big Data Solution Template, a Big Data Solution Mehdi Bahrami Electronic Engineering and Computer Science Department University of California, Merced, USA MBahrami@UCMerced.edu Abstract. Today cloud computing has become

More information

Reallocation and Allocation of Virtual Machines in Cloud Computing Manan D. Shah a, *, Harshad B. Prajapati b

Reallocation and Allocation of Virtual Machines in Cloud Computing Manan D. Shah a, *, Harshad B. Prajapati b Proceedings of International Conference on Emerging Research in Computing, Information, Communication and Applications (ERCICA-14) Reallocation and Allocation of Virtual Machines in Cloud Computing Manan

More information

An Approach Towards Customized Multi- Tenancy

An Approach Towards Customized Multi- Tenancy I.J.Modern Education and Computer Science, 2012, 9, 39-44 Published Online September 2012 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijmecs.2012.09.05 An Approach Towards Customized Multi- Tenancy

More information

Decentralized Access Control Secure Cloud Storage using Key Policy Attribute Based Encryption

Decentralized Access Control Secure Cloud Storage using Key Policy Attribute Based Encryption Decentralized Access Control Secure Cloud Storage using Key Policy Attribute Based Encryption 1 Thota Naresh Kumar, 2 K.SRINIVAS, 3 Y.Raju 2 Associate Professor, 3 Associate Professor 1,2,3 Department

More information

Seed4C: A Cloud Security Infrastructure validated on Grid 5000

Seed4C: A Cloud Security Infrastructure validated on Grid 5000 Seed4C: A Cloud Security Infrastructure validated on Grid 5000 E. Caron 1, A. Lefray 1, B. Marquet 2, and J. Rouzaud-Cornabas 1 1 Université de Lyon. LIP Laboratory. UMR CNRS - ENS Lyon - INRIA - UCBL

More information

Decentralized Information Accountability Framework for Information Sharing In Cloud Environment

Decentralized Information Accountability Framework for Information Sharing In Cloud Environment Decentralized Information Accountability Framework for Information Sharing In Cloud Environment Deepthi Srinivas, Shylaja BR, Rajeev RK, Muruli R 1 BNM Institute of technology 2,3,4 Rai Technology University

More information

How To Understand The Individual Competences Of An It Manager

How To Understand The Individual Competences Of An It Manager ORGANIZATIONS ARE GOING TO THE CLOUD: WHICH COMPETENCES FOR THE IT MANAGER? Luca Sabini, Stefano Za, Paolo Spagnoletti LUISS Guido Carli University Rome Italy {lsabini, sza, pspagnoletti}@luiss.it ABSTRACT

More information

An Approach for Secure Data Transmission in Private Cloud

An Approach for Secure Data Transmission in Private Cloud An Approach for Secure Data Transmission in Private Cloud Anurag Porwal, Rohit Maheshwari, B.L.Pal, Gaurav Kakhani Abstract In the cloud, the data is transferred among the server and client. Cloud security

More information

Enabling Public Accountability and Data Sharing for Storage Security in Cloud Computing

Enabling Public Accountability and Data Sharing for Storage Security in Cloud Computing VOLUME 1, NUMBER 1, JUNE 2014 OPEN JOURNAL OF INFORMATION SECURITY AND APPLICATIONS Enabling Public Accountability and Data Sharing for Storage Security in Cloud Computing K. Mohammed Aaqib Ameen, A. Anny

More information

SECURING CLOUD DATA COMMUNICATION USING AUTHENTICATION TECHNIQUE

SECURING CLOUD DATA COMMUNICATION USING AUTHENTICATION TECHNIQUE SECURING CLOUD DATA COMMUNICATION USING AUTHENTICATION TECHNIQUE 1 PARISHA TYAGI, 2 VIRENDRA KUMAR 1Department of Information Technology, Suresh Gyan Vihar University, Rajasthan, India 2 Department of

More information

Privacy Preservation and Secure Data Sharing in Cloud Storage

Privacy Preservation and Secure Data Sharing in Cloud Storage OPEN ACCESS Int. Res. J. of Science & Engineering, 2015; Vol. 3 (6): 231-236 ISSN: 2322-0015 RESEARCH ARTICLE Privacy Preservation and Secure Data Sharing in Cloud Storage Chavhan Bhaurao* and Deshmukh

More information

Selective dependable storage services for providing security in cloud computing

Selective dependable storage services for providing security in cloud computing Selective dependable storage services for providing security in cloud computing Gade Lakshmi Thirupatamma*1, M.Jayaram*2, R.Pitchaiah*3 M.Tech Scholar, Dept of CSE, UCET, Medikondur, Dist: Guntur, AP,

More information

Security Analysis of Cloud Computing: A Survey

Security Analysis of Cloud Computing: A Survey Security Analysis of Cloud Computing: A Survey Kamaljeet Pakhre 1, Navdeep Singh 2, Sanket Mani Tiwari 3 1,2,3 Research Scholar, M. Tech. (CSE), Galgotias University, Greater Noida, India. Abstract Now

More information

Model-Driven Engineering meets the Platform-as-a-Service Model

Model-Driven Engineering meets the Platform-as-a-Service Model Model-Driven Engineering meets the Platform-as-a-Service Model Adrián Juan-Verdejo Information Systems Chair Stuttgart University, Germany adrianppg@gmail.com Abstract. Organisations who want to migrate

More information

Monitoring Performances of Quality of Service in Cloud with System of Systems

Monitoring Performances of Quality of Service in Cloud with System of Systems Monitoring Performances of Quality of Service in Cloud with System of Systems Helen Anderson Akpan 1, M. R. Sudha 2 1 MSc Student, Department of Information Technology, 2 Assistant Professor, Department

More information

Ensuring Security in Cloud with Multi-Level IDS and Log Management System

Ensuring Security in Cloud with Multi-Level IDS and Log Management System Ensuring Security in Cloud with Multi-Level IDS and Log Management System 1 Prema Jain, 2 Ashwin Kumar PG Scholar, Mangalore Institute of Technology & Engineering, Moodbidri, Karnataka1, Assistant Professor,

More information

An Efficient Secure Multi Owner Data Sharing for Dynamic Groups in Cloud Computing

An Efficient Secure Multi Owner Data Sharing for Dynamic Groups in Cloud Computing Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 6, June 2014, pg.730

More information

Enable Public Audit ability for Secure Cloud Storage

Enable Public Audit ability for Secure Cloud Storage Enable Public Audit ability for Secure Cloud Storage Leela Poornima 1, D.Hari Krishna 2 1 Student, Nova College of Engineering and Technology, Ibrahimpatnam,Krishna Dist., Andhra Pradesh, India 2 Assistant

More information

International Journal of Enterprise Computing and Business Systems ISSN (Online) : 2230-8849

International Journal of Enterprise Computing and Business Systems ISSN (Online) : 2230-8849 WINDOWS-BASED APPLICATION AWARE NETWORK INTERCEPTOR Ms. Shalvi Dave [1], Mr. Jimit Mahadevia [2], Prof. Bhushan Trivedi [3] [1] Asst.Prof., MCA Department, IITE, Ahmedabad, INDIA [2] Chief Architect, Elitecore

More information

SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE

SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE International Journal of Computer Network and Security(IJCNS) Vol 7. No.1 2015 Pp. 1-8 gopalax Journals, Singapore available at : www.ijcns.com ISSN: 0975-8283 ----------------------------------------------------------------------------------------------------------------------------------------------------------

More information

Cloud Data Protection for the Masses

Cloud Data Protection for the Masses Cloud Data Protection for the Masses N.Janardhan 1, Y.Raja Sree 2, R.Himaja 3, 1,2,3 {Department of Computer Science and Engineering, K L University, Guntur, Andhra Pradesh, India} Abstract Cloud computing

More information

Near Sheltered and Loyal storage Space Navigating in Cloud

Near Sheltered and Loyal storage Space Navigating in Cloud IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 8 (August. 2013), V2 PP 01-05 Near Sheltered and Loyal storage Space Navigating in Cloud N.Venkata Krishna, M.Venkata

More information

Securing Virtual Applications and Servers

Securing Virtual Applications and Servers White Paper Securing Virtual Applications and Servers Overview Security concerns are the most often cited obstacle to application virtualization and adoption of cloud-computing models. Merely replicating

More information

Symantec Enterprise Vault.cloud Overview

Symantec Enterprise Vault.cloud Overview Fact Sheet: Archiving and ediscovery Introduction The data explosion that has burdened corporations and governments across the globe for the past decade has become increasingly expensive and difficult

More information

Optimized and Secured Educlouds by Implementing Virtualization

Optimized and Secured Educlouds by Implementing Virtualization International Journal of Electronics and Computer Science Engineering 2404 Available Online at www.ijecse.org ISSN- 2277-1956 Optimized and Secured Educlouds by Implementing Virtualization R. Rajesh 1,

More information

Verifying Correctness of Trusted data in Clouds

Verifying Correctness of Trusted data in Clouds Volume-3, Issue-6, December-2013, ISSN No.: 2250-0758 International Journal of Engineering and Management Research Available at: www.ijemr.net Page Number: 21-25 Verifying Correctness of Trusted data in

More information

IMPROVED FAIR SCHEDULING ALGORITHM FOR TASKTRACKER IN HADOOP MAP-REDUCE

IMPROVED FAIR SCHEDULING ALGORITHM FOR TASKTRACKER IN HADOOP MAP-REDUCE IMPROVED FAIR SCHEDULING ALGORITHM FOR TASKTRACKER IN HADOOP MAP-REDUCE Mr. Santhosh S 1, Mr. Hemanth Kumar G 2 1 PG Scholor, 2 Asst. Professor, Dept. Of Computer Science & Engg, NMAMIT, (India) ABSTRACT

More information

Secure Data Sharing in Cloud Computing using Hybrid cloud

Secure Data Sharing in Cloud Computing using Hybrid cloud International Journal of Electronics and Computer Science Engineering 144 Available Online at www.ijecse.org ISSN: 2277-1956 Secure Data Sharing in Cloud Computing using Hybrid cloud Er. Inderdeep Singh

More information

Different Patterns of Identity Management Implemented in Cloud Computing

Different Patterns of Identity Management Implemented in Cloud Computing 2011 International Conference on Advancements in Information Technology With workshop of ICBMG 2011 IPCSIT vol.20 (2011) (2011) IACSIT Press, Singapore Different Patterns of Identity Management Implemented

More information

SPACK FIREWALL RESTRICTION WITH SECURITY IN CLOUD OVER THE VIRTUAL ENVIRONMENT

SPACK FIREWALL RESTRICTION WITH SECURITY IN CLOUD OVER THE VIRTUAL ENVIRONMENT SPACK FIREWALL RESTRICTION WITH SECURITY IN CLOUD OVER THE VIRTUAL ENVIRONMENT V. Devi PG Scholar, Department of CSE, Indira Institute of Engineering & Technology, India. J. Chenni Kumaran Associate Professor,

More information

Multi Tenancy Access Control Using Cloud Service in MVC

Multi Tenancy Access Control Using Cloud Service in MVC Multi Tenancy Access Control Using Cloud Service in MVC 1 Sonia Gupta, 2 Rubal Choudary Indo Global College of Engg, Abhipur, Mohali Abstract - Cloud Computing is the next generation Internet service and

More information

Keyword Ranked MetaData Indexed Object Clawler in Cloud Servers

Keyword Ranked MetaData Indexed Object Clawler in Cloud Servers Keyword Ranked MetaData Indexed Object Clawler in Cloud Servers R.Bakyalakshmi 1, Dr.R.Rameh 2 PG Student of computer science and engineering. Chennai institute of technology College, India 1. Associate.Professor,

More information

ISACA Presentation. Cloud, Forensics and Cloud Forensics

ISACA Presentation. Cloud, Forensics and Cloud Forensics ISACA Presentation Cloud, Forensics and Cloud Forensics Agenda What is the Cloud What is Forensics Challenges Cloud poses to Information Security and Forensic Investigations Using Cloud technologies to

More information

From mini-clouds to Cloud Computing

From mini-clouds to Cloud Computing From mini-clouds to Cloud Computing Boris Mejías, Peter Van Roy Université catholique de Louvain Belgium {boris.mejias peter.vanroy}@uclouvain.be Abstract Cloud computing has many definitions with different

More information

Improving data integrity on cloud storage services

Improving data integrity on cloud storage services International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services

More information

Efficient Backingup Data for Migrating Cloud to Cloud

Efficient Backingup Data for Migrating Cloud to Cloud Efficient Backingup Data for Migrating Cloud to Cloud 1 PS.Vijayabaskaran, Assistant Professor, Department of Information Technology, Sri Manakula Vinayagar Engineering College, Pondicherry, India. 2 U.Prabu,

More information

Performance Analysis of VM Scheduling Algorithm of CloudSim in Cloud Computing

Performance Analysis of VM Scheduling Algorithm of CloudSim in Cloud Computing IJECT Vo l. 6, Is s u e 1, Sp l-1 Ja n - Ma r c h 2015 ISSN : 2230-7109 (Online) ISSN : 2230-9543 (Print) Performance Analysis Scheduling Algorithm CloudSim in Cloud Computing 1 Md. Ashifuddin Mondal,

More information

Security in Data Storage and Transmission in Cloud Computing

Security in Data Storage and Transmission in Cloud Computing Security in Data Storage and Transmission in Cloud Computing Ramawat Lokesh Kumar B. Tech 3 rd year, Alliance College of Engineering and Design Alliance University, Bengaluru, India P Dhananjay B. Tech

More information

Introduction to Cloud Computing

Introduction to Cloud Computing Discovery 2015: Cloud Computing Workshop June 20-24, 2011 Berkeley, CA Introduction to Cloud Computing Keith R. Jackson Lawrence Berkeley National Lab What is it? NIST Definition Cloud computing is a model

More information

Security Considerations for Public Mobile Cloud Computing

Security Considerations for Public Mobile Cloud Computing Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea rdcaytiles@gmail.com 2 Research Institute of

More information

An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud

An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud T.Vijayalakshmi 1, Balika J Chelliah 2,S.Alagumani 3 and Dr.J.Jagadeesan 4 1 PG

More information

GENERIC SECURITY FRAMEWORK FOR CLOUD COMPUTING USING CRYPTONET

GENERIC SECURITY FRAMEWORK FOR CLOUD COMPUTING USING CRYPTONET http:// GENERIC SECURITY FRAMEWORK FOR CLOUD COMPUTING USING CRYPTONET Manisha Dawra 1, Ramdev Singh 2 1 Al-Falah School of Engg. & Tech., Vill-Dhauj, Ballabgarh-Sohna Road, Faridabad, Haryana (INDIA)-121004

More information

A Comprehensive Data Forwarding Technique under Cloud with Dynamic Notification

A Comprehensive Data Forwarding Technique under Cloud with Dynamic Notification Research Journal of Applied Sciences, Engineering and Technology 7(14): 2946-2953, 2014 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2014 Submitted: July 7, 2013 Accepted: August

More information

A survey on cost effective multi-cloud storage in cloud computing

A survey on cost effective multi-cloud storage in cloud computing A survey on cost effective multi-cloud storage in cloud computing Nitesh Shrivastava, Ganesh Kumar Abstract As novel storage model, cloud storage has gain attentions from both the academics and industrial

More information

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013 CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control

More information

Analysis of Service Broker Policies in Cloud Analyst Framework

Analysis of Service Broker Policies in Cloud Analyst Framework Journal of The International Association of Advanced Technology and Science Analysis of Service Broker Policies in Cloud Analyst Framework Ashish Sankla G.B Pant Govt. Engineering College, Computer Science

More information

Secure Cloud Service Management and its Resource Utilization of Server Using Volunteer Computing

Secure Cloud Service Management and its Resource Utilization of Server Using Volunteer Computing Secure Cloud Service Management and its Resource Utilization of Server Using Volunteer Computing Nirupadi Tidigol, Thrilochana Kumara Y.P, T.P.Lokesh, nirupadi.tidigol@gmail.com thrilochankumaryp@gmail.com

More information