Secure Multi-tenant Application in Software as a Service
|
|
- Oswin Washington
- 8 years ago
- Views:
Transcription
1 M. D. Samrajesh 1, andn.p.gopalan 2 1 Research and Development Centre, Bharathiar University, Coimbatore, Tamil Nadu , India. 2 Professor, National Institute of Technology, Tiruchirappalli, Tamil Nadu , India. samrajesh.md@gmail.com; npgopalan@nitt.edu Abstract. A multi-tenant application in Software as a Service (SaaS) is accessed by multiple organizations called tenants who have several users attached to them. Multi-tendency enhances resource utilization by effectively sharing resources and reducing cost, increasing productivity and online collaboration. However, providing a secure multi-tenant access to various tenants is still a challenge. Traditional security methods of applications are not effective in a multi-tenant application model due to multiple tenants access on a single application instance at runtime. This paper focuses on providing an integrated security model for SaaS application. The tenant specific security specifications are defined using a pluggable component that can be easily integrated to the SaaS application. It works effectively in enforcing security controls, and monitoring SaaS application security. The pluggable security definitions can be easily interlaced with the application at runtime without any interference from the provider. Thereby the multitenant SaaS provider focuses more on the application functionality rather on application security. The proposed Secure Multi-tenant Application (SMA) model provides security isolation among tenants at various levels during runtime, reduces security risks and protects sensitive tenant data. Our evaluation and discussions show the effectiveness of the proposed model in securing SaaS multitenant application. Keywords: Application security, Cloud computing, Encryption, Multi-tenancy, SaaS. 1. Introduction Cloud Computing based Software as a Service (SaaS) multi-tenant application allow SaaS providers offer a single application that runs on top of shared hardware resources as shown in figure 1 to several users from multiple organizations called tenants [9]. In a SaaS multitenant environment operational overheads and maintenance is considerably low due to the sharing of hardware and software resources among multiple tenants. Moreover, upgrades need to be applied only to the shared application instance giving all tenants access the most recent version of the application. Maximum resource utilization and efficiency is achieved by application-level multi-tenancy where the infrastructure, data storage, operating system, and the application are shared among multiple tenants [2]. SaaS offers tremendous benefits, however concerns of security is one of the primary obstacle that makes organizations avoid its adoption [1]. Traditional model of application security that is fixed and hard coded by service providers are not well suited for multitenant applications that run on single shared instance. Moreover, earlier models of security are system based rather than tenant based. Additional, various commercial cloud platforms have limited security solutions [17]. The proposed secure multi-tenant application model is an integrated security model that defines a flexible pluggable component which is tenant specific and that can be easily integrated to the SaaS application. It works effectively in enforcing security controls and monitoring SaaS application security. The pluggable component s tenant security specifications can be easily interlaced with the application at runtime without any interference from the provider. Thereby the multitenant SaaS provider focuses more on the application functionality rather on application security. The proposed SMA provides effective tenant isolation at the database level, application level, and during runtime. We evaluated our proposed method by Monte Carlo method using Arena [15] and our customized tool [12]. Our evaluation and discussions based on parameters in [6] shows the effectiveness of the proposed model in securing SaaS multitenant application. Corresponding author Elsevier Publications 2013.
2 Figure 1. General multi-tenant application architecture. The paper is structured as follows: Motivation & problem definition is presented in Section 2; Section 3 discusses related work, background information on multitenant architecture is presented in Section 4. Our proposed secure multitenant application model is presented in Section 5, the evaluation and discussions on the proposed model are presented in Section 6 and finally, the conclusion and future work are in Section Motivation and Problem Definition Data security is another important area of research in cloud computing [3]. In SaaS model, the tenants depend on the SaaS application providers for their application security. The provider has to ensure that no tenant can view each other s data; it is often complex for the provider to ensure the presence of right security measures [9]. Moreover the provider might replicate tenant s data to multiple locations for maintaining high availability, the security measures should not be compromised during the process. Clients of cloud computing services currently have no means of verifying the condentiality and integrity of their data and computation [5]. SaaS offers various features that can significantly reduce IT costs by placing data and computation onto cloud platform. However, many organizations are reluctant move to cloud, primarily due to the security concerns [5]. The dynamic nature of multi-tenant application model further intensifies the application complexity and makes security more challenging [14]. Auditability can be generally achieved using remote verification methods. Remote verification requires a Trusted Platform Module (TPM). However, in a cloud where resources are virtualized, and virtual machines (VMs) dynamically migrate from one location to another, the above verification is not sufficient [5]. Enterprises are still not confident with the SaaS model due to lack of visibility about the means their data is stored and secured. Moreover, there is a huge anxiety over the lack of control and knowledge about tenant s data in SaaS [8]. 3. Related Work Current multi-tenant cloud security solutions take an inert stand to permissions as systems are functioning around a simple concept relating to the access rights of the user [18], for example the user is granted entry or denied entry based on a key. All subsequent actions are carried out based on the outcome of the initial attempt to access. Not much research has been done in the area of security of multi-tenant SaaS applications [16]. Different commercial cloud platforms have limited security solutions [17]. An approach that transforms existing web applications into multi-tenant SaaS applications is proposed in [19,20]. It focused on isolation problem by investigating application to identify the potential isolation points that should be handled by the application developers. A framework that supports a set of common services that provide security isolation, performance isolation is presented in [21]. The security isolation pattern considers the case of different security requirements while still using a predefined, built-in, security controls. Moreover security policies depend on Elsevier Publications
3 M. D. Samrajesh and N. P. Gopalan Figure 2. Block diagram of secure multi-tenant application. the tenant s administration personnel configuration that is done manually which maps users and their roles in the application. A model-driven platform that creates SaaS applications as a set of services is presented in [22]. The approach focuses on enabling cloud customers to create their system instances and specify their security requirements. However, tenants instances need to be deployed on separate VMs. Moreover, it lacks facility to update or reconfigure the defined security. A hierarchical based access control model is presented in [23]. The model increases the number of levels to the access control policy hierarchy; it includes new roles such as service providers administrators and tenants administrators. Service provider administrators delegate the authorization to the tenant s administrators to grant access rights to their predefined resources. Secure load distribution SaaS architecture is presented in [13]. The architecture is based on a set of services that provide routing, logging, and security. Their proposed security service delivers predefined authentication and authorization mechanisms. However, no isolation is provided between the authentication and authorization data of different tenants. Our proposed method considers tenant specific custom security implementations which are integrated with the SaaS application provider s security model thereby providing an integrated pluggable security model as shown in figure Multitenant Architecture Multi-tenancy is an application architecture where multiple clients or organizations (tenants) are served by a single application as illustrated in figure 1. A Multi-Tenant Application (MTA) is highly scalable and shared among multiple tenants hence it reduces cost, reduces software development time and brings down maintenance cost [7]. All tenants accessing the multi-tenant application run on the same source code, however certain tenant specific requirements are generated at run-time. Having a shared code benefits all tenants as updates can be applied centrally, moreover this enhances productivity and online collaboration. To accomplish large scale scalability, a multi-tenant application is designed to be stateless. Tenant-specific data are kept either at the tenant side or at the database. Moreover, unlike traditionally systems, tenant-specific implementations of application logic are created during run-time for each tenant. The MTA queries the database for necessary tenantspecific business logic and creates a customized implementation at run-time. Multitenant application is multifarious in nature and accomplishes individual tenant s requirements [10]. Tenants are offered with a well customized application that makes them experience as if the application is exclusively designed for them [7]. 5. Proposed Secure Multi-tenant Application (SMA) Model 5.1 Assumptions One single multitenant application is used simultaneously by multiple tenants. Each tenant has n number of users attached to them. The multitenant application consists of components that are modules of the application which is designed based on the business processes. Tenant s users by default access the core application components, all add-on components including the security component are accessed based on tenant specific needs. 828 Elsevier Publications 2013.
4 Figure 3. Intersection of security entities. Figure 4. Proposed secure multi-tenant application (SMA) model 5.2 Secure multi-tenant application (SMA) The proposed Secure Multi-tenant Application (SMA) model as shown in figure 4 consists of a Tenant Security Specification (TSS) which consists of custom security specification, securely stored either at the tenant side or the provider side; it is used to generate the pluggable secure component that secures the application. As shown is figure 3 the framework consists of a tenant pluggable security component that is integrated with the application of the tenant at run-time. The Tenant pluggable components consists of the following core entities Digital Signature with IdM for Authentication and Authorization. Relevant tenant information is securely replicated to the SaaS providers. Authorization using XACML (extensible Access Control Markup Language) delegation method is used to provide decentralized administration of access policy. The custom TenantSecurity Specification (TSS) is configuredby the tenants with their location MAC address or using directory lookup LDAP. Network security is provided with the pluggable custom security options configured by the tenant s predefined Application Programming Interface (APIs) signatures using Secure Socket Layer (SSL) and the Transport Layer Security (TLS) with an encrypted connection between a customer s data and application. Data Security is implemented for all tenants data by encryption using the key of tenant and the provider; hence it is neither accessible nor tampered by unauthorized person. Elsevier Publications
5 M. D. Samrajesh and N. P. Gopalan Figure 5. Application security risk factor, SMA- Secure multi-tenant application, GM- General Model Data integrity is provided by data segregation and confidentiality by allowing fine-grained authorization controlled access to application and data. Accountability is effectively implemented by comprehensive logging. All actions on tenant specific data and application component access are monitored, correlated and alerts are sent to tenants and the provider. The pluggable custom TSS is configured by the tenant with their location Media Access control (MAC) address or by using directory lookup Lightweight Directory Access Protocol (LDAP). This along with digital signatures, secure network access, data encryption ensures enforcing security at runtime based on the tenants configuration, moreover the proposed framework monitors the potential security breaches on the tenant data, manages data isolation between tenants services. These integrated measures ensure elevated application security by enforcing varied sets of custom security measures in application. 6. Evaluation and Discussions 6.1 Simulation setup The application security risk analysis is done by Monte Carlo method [4] using automation software Arena [15] and our customized tool [12]. We simulate risk factors with inputs generated according to probability distribution model; this allows us to make optimal choices against composite cyber-attack models that otherwise cannot be easily identified. A risk level is defined as the probability of some defencelessness or weakness within a specific timeframe. Undesirable risks that occur either at the tenant or SaaS application provider side impact the system and reduces the availability, integrity, confidentiality of the MTA. Each risk is quantitatively measured using a scale that ranges between 1 and Parameters for evaluation We use multi-variable defensive criterion (X i ) to evaluate the proposed model. X 1 -Unsafe Identify Management, X 2 -Absence of Tenant application monitoring X 3 -Absence of finer Granularity of application and data access, X 4 -Absence of Tenant data isolation, X 5 -Absence of Secure Network access, X 6 -Insecure Backups storage, X 7 -Absence of High availability, X 8 -Absence of Data recovery mechanism Risk classification We consider 2 scenarios based on [11], scenario-i uses 3 categories of risks labeled a) Low b) Medium, and c) High; and in scenario-ii we use of 6 categories of risks labeled as a) Not possible, b) Most unlikely c) Unlikely d) Likely e) Most Likely and f) Surely; for each of the variable, the defensive criterion (Xi) is expressed by probability distributions. 830 Elsevier Publications 2013.
6 6.1.3 Discussions The proposed SMA provides security isolation among tenants at various levels during runtime and for data offline. Our assessment of the proposed system in terms of probability of adversary risk factor shows that, the security risk associated in SaaS application is based upon multidimensional aspects. It can be expressed numerically as the product of the probability of occurrence and expected risk associated with one or many undesirable event that is defined in defensive criterion. Our evaluation is based on parameters in [6]. Our evaluation outcome in Fig.5 shows that the security risks of General Model (GM) and SMA using the 6, 3 risk factors respectively, the risk factor fluctuates in GM when compared to SMA. Moreover, the average risk factor of SMA is less than GM. This shows the effectiveness of the proposed solution in securing SaaS multitenant applications. Application security risks can be reduced by incorporating the pluggable SMA based security framework in SaaS application. Implementation the proposed SaaS security model increases the SaaS providers and tenants confidence and enables its speedy and wider adoption. 7. Conclusion and Future Work Today, SaaS tenants demand transparency from the provider on how their data is secured at the datacenter. The challenge is to have a customizable tenant based approach that securely provide access to the tenant s data and monitors any illegal access of both application and tenant data. We proposed an integrated Secure Multi-tenant Application (SMA) model that is custom defined and pluggable to multi-tenant application. Our evaluation based on the multivariable defensive criterion and our discussions show that the proposed SMA framework is effective in reducing the security risk associated with multi-tenant application and alleviate the security concerns of the tenants. Our future work is to integrate the security framework with the overall architecture of multi-tenant SaaS application. References [1] M. Armbrust, A. Fox, R. Griffith, A. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica and M. Zaharia, Above the Clouds: A Berkeley View of Cloud Computing. Technical Report No. UCB/EECS , University of California at Berkley, USA, Feb. 10, [2] F. Chong and G. Carraro, Architecture Strategies for Catching the Long Tail. Microsoft Corporation, April [3] Zhang, Qi, Lu Cheng and Raouf Boutaba, Cloud computing: state-of-the-art and research challenges. Journal of Internet Services and Applications vol. 1.1, pp. 7 18, (2010). [4] Sahinoglu and Mehmet, Security meter: A practical decision-tree model to quantify risk. Security & Privacy, IEEE,vol. 3.3, pp , (2005). [5] Santos, Nuno, Krishna P. Gummadi and Rodrigo Rodrigues, Towards trusted cloud computing. Proceedings of the 2009 conference on Hot topics in cloud computing, [6] S. Subashini and V. Kavitha, A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications, vol. 34.1, pp. 1 11, (2011). [7] Bezemer, Cor-Paul and Andy Zaidman, Multi-tenant SaaS applications: maintenance dream or nightmare?. Proceedings of the Joint ERCIM Workshop on Software Evolution (EVOL) and International Workshop on Principles of Software Evolution (IWPSE). ACM, [8] Popovic, Kresimir and Zeljko Hocenski. Cloud computing security issues and challenges. MIPRO, 2010 proceedings of the 33rd international convention. IEEE, [9] Choudhary and Vidyanand, Software as a service: Implications for investment in software development. System Sciences, HICSS th Annual Hawaii International Conference on. IEEE, [10] Weissman, D. Craig and Steve Bobrowski, The design of the force. com multitenant internet application development platform. Proceedings of the 35th SIGMOD international conference on Management of data. ACM, [11] Kaplan, Stanley and B. John Garrick, On the quantitative definition of risk. Risk analysis, vol. 1.1, pp , (1981). [12] M. D. Samrajesh and N. P. Gopalan, AppSIM: An Application Simulator for Software as a Service (SaaS), Proceedings of the International Conference on Computational Techniques and Mobile Computing (ICCTMC 2012), Dec , Singapore, pp , ISBN: , [13] Z. Pervez, S. Lee, et al, Multi-tenant, secure, load disseminated SaaS architecture, In Proc. 12th Int. Conf. on Advanced Communication Technology, South Korea, pp , [14] Ren, Kui, Cong Wang and Qian Wang, Security challenges for the public cloud. Internet Computing, IEEE, vol. 16.1, pp , (2012). [15] Kelton, W. David, Randall P. Sadowski and Deborah A. Sadowski, Simulation with ARENA, vol. 2. New York: McGraw-Hill, [16] Almorsy, Mohamed, John Grundy and Amani S. Ibrahim, TOSSMA: A Tenant-Oriented SaaS Security Management Architecture. Cloud Computing (CLOUD), 2012 IEEE 5th International Conference on. IEEE, Elsevier Publications
7 M. D. Samrajesh and N. P. Gopalan [17] M. Brock and A. Goscinski, Toward a Framework for Cloud Security, Algorithms and Architectures for Parallel Processing. vol. 6082, C.-H. Hsu, L. Yang, J. Park and S.-S. Yeo, Eds., ed: Springer Berlin / Heidelberg, pp , [18] Flood, Jason and Anthony Keane, A Proposed Framework for the Active Detection of Security Vulnerabilities in Multitenancy Cloud Systems. Emerging Intelligent Data and Web Technologies (EIDWT), 2012 Third International Conference on. IEEE, [19] H. Cai, N. Wang, et al., A Transparent Approach of Enabling SaaS Multi-tenancy in the Cloud, in Proc th IEEE World Congress on Services, pp , [20] H. Cai, K. Zhang, et al., An End-to-End Methodology and Toolkit for Fine Granularity SaaS-ization, in Proc IEEE Int. Conf. on Cloud Computing, pp , [21] C. Guo, W. Sun, et al., A Framework for Native Multi-Tenancy Application Development and Management, in Proc. 9th IEEE Int. Conf. on E-Commerce Technology, pp [22] M. Menzel, R. Warschofsky, et al., The Service Security Lab: A Model-Driven Platform to Compose and Explore Service Security in the Cloud, in Proc. World Congress on Services, pp , [23] T. J. Jing Xu, H. Dongjian, et al., Research and implementation on access control of management-type SaaS, in Proc. IEEE Int. Conf. on Information Management and Engineering, pp , Elsevier Publications 2013.
An Analysis of Data Security Threats and Solutions in Cloud Computing Environment
An Analysis of Data Security Threats and Solutions in Cloud Computing Environment Rajbir Singh 1, Vivek Sharma 2 1, 2 Assistant Professor, Rayat Institute of Engineering and Information Technology Ropar,
More informationData Integrity for Secure Dynamic Cloud Storage System Using TPA
International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 7-12 International Research Publication House http://www.irphouse.com Data Integrity for Secure
More informationIndex Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.
Secure Privacy-Preserving Cloud Services. Abhaya Ghatkar, Reena Jadhav, Renju Georgekutty, Avriel William, Amita Jajoo DYPCOE, Akurdi, Pune ghatkar.abhaya@gmail.com, jadhavreena70@yahoo.com, renjug03@gmail.com,
More informationSecure Attack Measure Selection and Intrusion Detection in Virtual Cloud Networks. Karnataka. www.ijreat.org
Secure Attack Measure Selection and Intrusion Detection in Virtual Cloud Networks Kruthika S G 1, VenkataRavana Nayak 2, Sunanda Allur 3 1, 2, 3 Department of Computer Science, Visvesvaraya Technological
More informationSECURITY THREATS TO CLOUD COMPUTING
IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 2, Issue 3, Mar 2014, 101-106 Impact Journals SECURITY THREATS TO CLOUD
More informationEFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department
More informationData Integrity Check using Hash Functions in Cloud environment
Data Integrity Check using Hash Functions in Cloud environment Selman Haxhijaha 1, Gazmend Bajrami 1, Fisnik Prekazi 1 1 Faculty of Computer Science and Engineering, University for Business and Tecnology
More informationMulti-Tenant Engineering Architecture in SaaS
Multi-Tenant Engineering Architecture in SaaS Sunil Kumar Khatri Himanshu Singhal Khushboo Bahri ABSTRACT Multi-Tenancy in SaaS (Software as a Service) architecture is the concept leveraging cloud computing
More informationAnalysis of Privacy Challenges and Security Concerns in Cloud Computing Varun Shukla Department of EC, PSIT
Analysis of Privacy Challenges and Security Concerns in Cloud Computing Varun Shukla Department of EC, PSIT Abstract Cloud computing is a method to enhance the capacity dynamically without investing in
More informationPublic Auditing for Shared Data in the Cloud by Using AES
Public Auditing for Shared Data in the Cloud by Using AES 1 Syagamreddy Subbareddy, 2 P.Tejaswi, 3 D.Krishna 1 M.Tech(CSE) Pursuing, 2 Associate Professor, 3 Associate Professor,HOD, 1,2,3 Dept. of Computer
More informationDynamic Resource Pricing on Federated Clouds
Dynamic Resource Pricing on Federated Clouds Marian Mihailescu and Yong Meng Teo Department of Computer Science National University of Singapore Computing 1, 13 Computing Drive, Singapore 117417 Email:
More informationTOSSMA: A Tenant-Oriented SaaS Security Management Architecture
TOSSMA: A Tenant-Oriented SaaS Security Management Architecture Mohamed Almorsy, John Grundy, and Amani S. Ibrahim Centre for Computing & Engineering Software Systems Swinburne University of Technology
More informationConceptual Approach for Performance Isolation in Multi-Tenant Systems
Conceptual Approach for Performance Isolation in Multi-Tenant Systems Manuel Loesch 1 and Rouven Krebs 2 1 FZI Research Center for Information Technology, Karlsruhe, Germany 2 SAP AG, Global Research and
More informationA Hybrid Load Balancing Policy underlying Cloud Computing Environment
A Hybrid Load Balancing Policy underlying Cloud Computing Environment S.C. WANG, S.C. TSENG, S.S. WANG*, K.Q. YAN* Chaoyang University of Technology 168, Jifeng E. Rd., Wufeng District, Taichung 41349
More informationAn Overview on Important Aspects of Cloud Computing
An Overview on Important Aspects of Cloud Computing 1 Masthan Patnaik, 2 Ruksana Begum 1 Asst. Professor, 2 Final M Tech Student 1,2 Dept of Computer Science and Engineering 1,2 Laxminarayan Institute
More informationInternational Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 Software as a Model for Security in Cloud over Virtual Environments S.Vengadesan, B.Muthulakshmi PG Student,
More informationA Comparative Study of Applying Real- Time Encryption in Cloud Computing Environments
A Comparative Study of Applying Real- Time Encryption in Cloud Computing Environments Faraz Fatemi Moghaddam (f.fatemi@ieee.org) Omidreza Karimi (omid@medicatak.com.my) Dr. Ma en T. Alrashdan (dr.maen@apu.edu.my)
More informationINTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK IMPLEMENTATION OF AN APPROACH TO ENHANCE QOS AND QOE BY MIGRATING SERVICES IN CLOUD
More informationTHE CLOUD AND ITS EFFECTS ON WEB DEVELOPMENT
TREX WORKSHOP 2013 THE CLOUD AND ITS EFFECTS ON WEB DEVELOPMENT Jukka Tupamäki, Relevantum Oy Software Specialist, MSc in Software Engineering (TUT) tupamaki@gmail.com / @tukkajukka 30.10.2013 1 e arrival
More informationIMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD
IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD 1 Ms.Nita R. Mhaske, 2 Prof. S.M.Rokade 1 student, Master of Engineering, Dept. of Computer Engineering Sir Visvesvaraya
More informationArchitectural Concerns in Multi-Tenant SaaS Applications
Architectural Concerns in Multi-Tenant SaaS Applications Rouven Krebs 1, Christof Momm 1 and Samuel Kounev 2 1 SAP AG, Dietmar-Hopp-Allee 16, 69190 Walldorf, Germany 2 Karlsruhe Institute of Technology,
More informationAN EFFICIENT STRATEGY OF THE DATA INTEGRATION BASED CLOUD
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF THE DATA INTEGRATION BASED CLOUD Koncha Anantha Laxmi Prasad 1, M.Yaseen Pasha 2, V.Hari Prasad 3 1
More informationSheltered Multi-Owner Data distribution For vibrant Groups in the Cloud
Sheltered Multi-Owner Data distribution For vibrant Groups in the Cloud I.sriram murthy 1 N.Jagajeevan 2 II M-Tech student Assistant.Professor Department of computer science & Engineering Department of
More informationSecurity Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
More informationNessus or Metasploit: Security Assessment of OpenStack Cloud
Nessus or Metasploit: Security Assessment of OpenStack Cloud Aleksandar Donevski, Sasko Ristov and Marjan Gusev Ss. Cyril and Methodius University, Faculty of Information Sciences and Computer Engineering,
More informationADVANCE SECURITY TO CLOUD DATA STORAGE
Journal homepage: www.mjret.in ADVANCE SECURITY TO CLOUD DATA STORAGE ISSN:2348-6953 Yogesh Bhapkar, Mitali Patil, Kishor Kale,Rakesh Gaikwad ISB&M, SOT, Pune, India Abstract: Cloud Computing is the next
More informationCloud Database Storage Model by Using Key-as-a-Service (KaaS)
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 7 July 2015, Page No. 13284-13288 Cloud Database Storage Model by Using Key-as-a-Service (KaaS) J.Sivaiah
More informationAgent Based Framework for Scalability in Cloud Computing
Agent Based Framework for Scalability in Computing Aarti Singh 1, Manisha Malhotra 2 1 Associate Prof., MMICT & BM, MMU, Mullana 2 Lecturer, MMICT & BM, MMU, Mullana 1 Introduction: Abstract: computing
More informationComparison of Request Admission Based Performance Isolation Approaches in Multi-tenant SaaS Applications
Comparison of Request Admission Based Performance Isolation Approaches in Multi-tenant SaaS Applications Rouven Kreb 1 and Manuel Loesch 2 1 SAP AG, Walldorf, Germany 2 FZI Research Center for Information
More informationA Study on the Cloud Computing Architecture, Service Models, Applications and Challenging Issues
A Study on the Cloud Computing Architecture, Service Models, Applications and Challenging Issues Rajbir Singh 1, Vivek Sharma 2 1, 2 Assistant Professor, Rayat Institute of Engineering and Information
More informationMona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud Arpitha.K 1,Aawini.T 2,Divya J. 3, Kalyani P 4, Prof. Sudhakar Avareddy 5 1,2,3,4 Department of CSE, BITM Bellary, Karnataka. 5 Department
More informationA Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services
A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services Ronnie D. Caytiles and Byungjoo Park * Department of Multimedia Engineering, Hannam University
More informationCloud Computing: A Question of Trust Maintaining Control and Compliance with Data-centric Information Security
Russ Dietz Vice President & Chief Technology Officer Cloud Computing: A Question of Trust Maintaining Control and Compliance with Data-centric Information Security By Russ Dietz Vice President & Chief
More informationH Y T RUST: S OLUTION B RIEF. Solve the Nosy Neighbor Problem in Multi-Tenant Environments
H Y T RUST: S OLUTION B RIEF Solve the Nosy Neighbor Problem in Multi-Tenant Environments Summary A private cloud with multiple tenants such as business units of an enterprise or customers of a cloud service
More informationA Review of Load Balancing Algorithms for Cloud Computing
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Issue -9 September, 2014 Page No. 8297-8302 A Review of Load Balancing Algorithms for Cloud Computing Dr.G.N.K.Sureshbabu
More informationSecurity Issues in Cloud Computing
Security Issues in Cloud Computing Dr. A. Askarunisa Professor and Head Vickram College of Engineering, Madurai, Tamilnadu, India N.Ganesh Sr.Lecturer Vickram College of Engineering, Madurai, Tamilnadu,
More informationHow To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System
REVIEW ARTICAL A Novel Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage Dumala Harisha 1, V.Gouthami 2 1 Student, Computer Science & Engineering-Department, JNTU Hyderabad India
More informationMulti-Tenant Architecture Comparison
Multi-Tenant Architecture Comparison Jaap Kabbedijk, Michiel Pors, Slinger Jansen, and Sjaak Brinkkemper Department of Information and Computing Sciences Utrecht University, Netherlands {J.Kabbedijk, M.Pors,
More informationA Proposed Secure Framework for Safe Data Transmission in Private Cloud
A Proposed Secure Framework for Safe Data Transmission in Private Cloud Rohit Maheshwari, Sunil Pathak Abstract Cloud security is the current discussion in the IT world. In the cloud, the data is transferred
More informationA Proposed Case for the Cloud Software Engineering in Security
A Proposed Case for the Cloud Software Engineering in Security Victor Chang and Muthu Ramachandran School of Computing, Creative Technologies and Engineering, Leeds Metropolitan University, Headinley,
More informationSecurity Aspects of Cloud Computing
Security Aspects of Cloud Computing Kunal Chadha Scholar, CSE Department University of Southern California, USA Anvita Bajpai X-Scholar, CSE Department Marist College, NY, USA ABSTRACT Cloud Computing
More informationDevelopment of enhanced Third party Auditing Scheme for Secure Cloud Storage
Development of enhanced Third party Auditing Scheme for Secure Cloud Storage Bhanu Prakash Chamakuri*1, D. Srikar*2, Dr. M.Suresh Babu*3 M.Tech Scholar, Dept of CSE, Grandhi Varalakshmi Institute Of Technology,
More informationThe Analysis of Cloud Computing Major Security Concerns & Their Solutions
Journal of Information & Communication Technology Vol. 6, No. 2, (Fall 2012) 48-53 The Analysis of Cloud Computing Major Security Concerns & Their Solutions Farhat Sharif * Institute of Business and Technology
More informationN TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD. R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 ABSTRACT
N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 1 M.Tech Student, Department of Computer Science and Engineering, S.R.M. University Chennai 2 Asst.Professor,
More informationKeywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption
Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer
More informationHOST SCHEDULING ALGORITHM USING GENETIC ALGORITHM IN CLOUD COMPUTING ENVIRONMENT
International Journal of Research in Engineering & Technology (IJRET) Vol. 1, Issue 1, June 2013, 7-12 Impact Journals HOST SCHEDULING ALGORITHM USING GENETIC ALGORITHM IN CLOUD COMPUTING ENVIRONMENT TARUN
More informationKeywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving,
Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Third Party
More informationPRIVACY PRESERVATION ALGORITHM USING EFFECTIVE DATA LOOKUP ORGANIZATION FOR STORAGE CLOUDS
PRIVACY PRESERVATION ALGORITHM USING EFFECTIVE DATA LOOKUP ORGANIZATION FOR STORAGE CLOUDS Amar More 1 and Sarang Joshi 2 1 Department of Computer Engineering, Pune Institute of Computer Technology, Maharashtra,
More informationMutual Authentication Cloud Computing Platform based on TPM
Mutual Authentication Cloud Computing Platform based on TPM Lei Peng 1, Yanli Xiao 2 1 College of Information Engineering, Taishan Medical University, Taian Shandong, China 2 Department of Graduate, Taishan
More informationCloud Information Accountability Framework for Auditing the Data Usage in Cloud Environment
International Journal of Computational Engineering Research Vol, 03 Issue, 11 Cloud Information Accountability Framework for Auditing the Data Usage in Cloud Environment D.Dhivya 1, S.CHINNADURAI 2 1,M.E.(Cse),
More informationPerformance Gathering and Implementing Portability on Cloud Storage Data
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 17 (2014), pp. 1815-1823 International Research Publications House http://www. irphouse.com Performance Gathering
More informationAN APPROACH TOWARDS FUNCTIONING OF PUBLIC AUDITABILITY FOR CLOUD ENRICHMENT
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN APPROACH TOWARDS FUNCTIONING OF PUBLIC AUDITABILITY FOR CLOUD ENRICHMENT Mohd Abdul Shoaib 1, Akheel Mohammed 2, Ayesha 3
More informationPRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING T.Vidhya Sree M.Phil Research Scholar,CS, MGR College, Hosur (India) ABSTRACT Cloud Computing is the long dreamed vision
More informationCloud Template, a Big Data Solution
Template, a Big Data Solution Mehdi Bahrami Electronic Engineering and Computer Science Department University of California, Merced, USA MBahrami@UCMerced.edu Abstract. Today cloud computing has become
More informationReallocation and Allocation of Virtual Machines in Cloud Computing Manan D. Shah a, *, Harshad B. Prajapati b
Proceedings of International Conference on Emerging Research in Computing, Information, Communication and Applications (ERCICA-14) Reallocation and Allocation of Virtual Machines in Cloud Computing Manan
More informationAn Approach Towards Customized Multi- Tenancy
I.J.Modern Education and Computer Science, 2012, 9, 39-44 Published Online September 2012 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijmecs.2012.09.05 An Approach Towards Customized Multi- Tenancy
More informationDecentralized Access Control Secure Cloud Storage using Key Policy Attribute Based Encryption
Decentralized Access Control Secure Cloud Storage using Key Policy Attribute Based Encryption 1 Thota Naresh Kumar, 2 K.SRINIVAS, 3 Y.Raju 2 Associate Professor, 3 Associate Professor 1,2,3 Department
More informationSeed4C: A Cloud Security Infrastructure validated on Grid 5000
Seed4C: A Cloud Security Infrastructure validated on Grid 5000 E. Caron 1, A. Lefray 1, B. Marquet 2, and J. Rouzaud-Cornabas 1 1 Université de Lyon. LIP Laboratory. UMR CNRS - ENS Lyon - INRIA - UCBL
More informationDecentralized Information Accountability Framework for Information Sharing In Cloud Environment
Decentralized Information Accountability Framework for Information Sharing In Cloud Environment Deepthi Srinivas, Shylaja BR, Rajeev RK, Muruli R 1 BNM Institute of technology 2,3,4 Rai Technology University
More informationHow To Understand The Individual Competences Of An It Manager
ORGANIZATIONS ARE GOING TO THE CLOUD: WHICH COMPETENCES FOR THE IT MANAGER? Luca Sabini, Stefano Za, Paolo Spagnoletti LUISS Guido Carli University Rome Italy {lsabini, sza, pspagnoletti}@luiss.it ABSTRACT
More informationAn Approach for Secure Data Transmission in Private Cloud
An Approach for Secure Data Transmission in Private Cloud Anurag Porwal, Rohit Maheshwari, B.L.Pal, Gaurav Kakhani Abstract In the cloud, the data is transferred among the server and client. Cloud security
More informationEnabling Public Accountability and Data Sharing for Storage Security in Cloud Computing
VOLUME 1, NUMBER 1, JUNE 2014 OPEN JOURNAL OF INFORMATION SECURITY AND APPLICATIONS Enabling Public Accountability and Data Sharing for Storage Security in Cloud Computing K. Mohammed Aaqib Ameen, A. Anny
More informationSECURING CLOUD DATA COMMUNICATION USING AUTHENTICATION TECHNIQUE
SECURING CLOUD DATA COMMUNICATION USING AUTHENTICATION TECHNIQUE 1 PARISHA TYAGI, 2 VIRENDRA KUMAR 1Department of Information Technology, Suresh Gyan Vihar University, Rajasthan, India 2 Department of
More informationPrivacy Preservation and Secure Data Sharing in Cloud Storage
OPEN ACCESS Int. Res. J. of Science & Engineering, 2015; Vol. 3 (6): 231-236 ISSN: 2322-0015 RESEARCH ARTICLE Privacy Preservation and Secure Data Sharing in Cloud Storage Chavhan Bhaurao* and Deshmukh
More informationSelective dependable storage services for providing security in cloud computing
Selective dependable storage services for providing security in cloud computing Gade Lakshmi Thirupatamma*1, M.Jayaram*2, R.Pitchaiah*3 M.Tech Scholar, Dept of CSE, UCET, Medikondur, Dist: Guntur, AP,
More informationSecurity Analysis of Cloud Computing: A Survey
Security Analysis of Cloud Computing: A Survey Kamaljeet Pakhre 1, Navdeep Singh 2, Sanket Mani Tiwari 3 1,2,3 Research Scholar, M. Tech. (CSE), Galgotias University, Greater Noida, India. Abstract Now
More informationModel-Driven Engineering meets the Platform-as-a-Service Model
Model-Driven Engineering meets the Platform-as-a-Service Model Adrián Juan-Verdejo Information Systems Chair Stuttgart University, Germany adrianppg@gmail.com Abstract. Organisations who want to migrate
More informationMonitoring Performances of Quality of Service in Cloud with System of Systems
Monitoring Performances of Quality of Service in Cloud with System of Systems Helen Anderson Akpan 1, M. R. Sudha 2 1 MSc Student, Department of Information Technology, 2 Assistant Professor, Department
More informationEnsuring Security in Cloud with Multi-Level IDS and Log Management System
Ensuring Security in Cloud with Multi-Level IDS and Log Management System 1 Prema Jain, 2 Ashwin Kumar PG Scholar, Mangalore Institute of Technology & Engineering, Moodbidri, Karnataka1, Assistant Professor,
More informationAn Efficient Secure Multi Owner Data Sharing for Dynamic Groups in Cloud Computing
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 6, June 2014, pg.730
More informationEnable Public Audit ability for Secure Cloud Storage
Enable Public Audit ability for Secure Cloud Storage Leela Poornima 1, D.Hari Krishna 2 1 Student, Nova College of Engineering and Technology, Ibrahimpatnam,Krishna Dist., Andhra Pradesh, India 2 Assistant
More informationInternational Journal of Enterprise Computing and Business Systems ISSN (Online) : 2230-8849
WINDOWS-BASED APPLICATION AWARE NETWORK INTERCEPTOR Ms. Shalvi Dave [1], Mr. Jimit Mahadevia [2], Prof. Bhushan Trivedi [3] [1] Asst.Prof., MCA Department, IITE, Ahmedabad, INDIA [2] Chief Architect, Elitecore
More informationSECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE
International Journal of Computer Network and Security(IJCNS) Vol 7. No.1 2015 Pp. 1-8 gopalax Journals, Singapore available at : www.ijcns.com ISSN: 0975-8283 ----------------------------------------------------------------------------------------------------------------------------------------------------------
More informationCloud Data Protection for the Masses
Cloud Data Protection for the Masses N.Janardhan 1, Y.Raja Sree 2, R.Himaja 3, 1,2,3 {Department of Computer Science and Engineering, K L University, Guntur, Andhra Pradesh, India} Abstract Cloud computing
More informationNear Sheltered and Loyal storage Space Navigating in Cloud
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 8 (August. 2013), V2 PP 01-05 Near Sheltered and Loyal storage Space Navigating in Cloud N.Venkata Krishna, M.Venkata
More informationSecuring Virtual Applications and Servers
White Paper Securing Virtual Applications and Servers Overview Security concerns are the most often cited obstacle to application virtualization and adoption of cloud-computing models. Merely replicating
More informationSymantec Enterprise Vault.cloud Overview
Fact Sheet: Archiving and ediscovery Introduction The data explosion that has burdened corporations and governments across the globe for the past decade has become increasingly expensive and difficult
More informationOptimized and Secured Educlouds by Implementing Virtualization
International Journal of Electronics and Computer Science Engineering 2404 Available Online at www.ijecse.org ISSN- 2277-1956 Optimized and Secured Educlouds by Implementing Virtualization R. Rajesh 1,
More informationVerifying Correctness of Trusted data in Clouds
Volume-3, Issue-6, December-2013, ISSN No.: 2250-0758 International Journal of Engineering and Management Research Available at: www.ijemr.net Page Number: 21-25 Verifying Correctness of Trusted data in
More informationIMPROVED FAIR SCHEDULING ALGORITHM FOR TASKTRACKER IN HADOOP MAP-REDUCE
IMPROVED FAIR SCHEDULING ALGORITHM FOR TASKTRACKER IN HADOOP MAP-REDUCE Mr. Santhosh S 1, Mr. Hemanth Kumar G 2 1 PG Scholor, 2 Asst. Professor, Dept. Of Computer Science & Engg, NMAMIT, (India) ABSTRACT
More informationSecure Data Sharing in Cloud Computing using Hybrid cloud
International Journal of Electronics and Computer Science Engineering 144 Available Online at www.ijecse.org ISSN: 2277-1956 Secure Data Sharing in Cloud Computing using Hybrid cloud Er. Inderdeep Singh
More informationDifferent Patterns of Identity Management Implemented in Cloud Computing
2011 International Conference on Advancements in Information Technology With workshop of ICBMG 2011 IPCSIT vol.20 (2011) (2011) IACSIT Press, Singapore Different Patterns of Identity Management Implemented
More informationSPACK FIREWALL RESTRICTION WITH SECURITY IN CLOUD OVER THE VIRTUAL ENVIRONMENT
SPACK FIREWALL RESTRICTION WITH SECURITY IN CLOUD OVER THE VIRTUAL ENVIRONMENT V. Devi PG Scholar, Department of CSE, Indira Institute of Engineering & Technology, India. J. Chenni Kumaran Associate Professor,
More informationMulti Tenancy Access Control Using Cloud Service in MVC
Multi Tenancy Access Control Using Cloud Service in MVC 1 Sonia Gupta, 2 Rubal Choudary Indo Global College of Engg, Abhipur, Mohali Abstract - Cloud Computing is the next generation Internet service and
More informationKeyword Ranked MetaData Indexed Object Clawler in Cloud Servers
Keyword Ranked MetaData Indexed Object Clawler in Cloud Servers R.Bakyalakshmi 1, Dr.R.Rameh 2 PG Student of computer science and engineering. Chennai institute of technology College, India 1. Associate.Professor,
More informationISACA Presentation. Cloud, Forensics and Cloud Forensics
ISACA Presentation Cloud, Forensics and Cloud Forensics Agenda What is the Cloud What is Forensics Challenges Cloud poses to Information Security and Forensic Investigations Using Cloud technologies to
More informationFrom mini-clouds to Cloud Computing
From mini-clouds to Cloud Computing Boris Mejías, Peter Van Roy Université catholique de Louvain Belgium {boris.mejias peter.vanroy}@uclouvain.be Abstract Cloud computing has many definitions with different
More informationImproving data integrity on cloud storage services
International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services
More informationEfficient Backingup Data for Migrating Cloud to Cloud
Efficient Backingup Data for Migrating Cloud to Cloud 1 PS.Vijayabaskaran, Assistant Professor, Department of Information Technology, Sri Manakula Vinayagar Engineering College, Pondicherry, India. 2 U.Prabu,
More informationPerformance Analysis of VM Scheduling Algorithm of CloudSim in Cloud Computing
IJECT Vo l. 6, Is s u e 1, Sp l-1 Ja n - Ma r c h 2015 ISSN : 2230-7109 (Online) ISSN : 2230-9543 (Print) Performance Analysis Scheduling Algorithm CloudSim in Cloud Computing 1 Md. Ashifuddin Mondal,
More informationSecurity in Data Storage and Transmission in Cloud Computing
Security in Data Storage and Transmission in Cloud Computing Ramawat Lokesh Kumar B. Tech 3 rd year, Alliance College of Engineering and Design Alliance University, Bengaluru, India P Dhananjay B. Tech
More informationIntroduction to Cloud Computing
Discovery 2015: Cloud Computing Workshop June 20-24, 2011 Berkeley, CA Introduction to Cloud Computing Keith R. Jackson Lawrence Berkeley National Lab What is it? NIST Definition Cloud computing is a model
More informationSecurity Considerations for Public Mobile Cloud Computing
Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea rdcaytiles@gmail.com 2 Research Institute of
More informationAn Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud
An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud T.Vijayalakshmi 1, Balika J Chelliah 2,S.Alagumani 3 and Dr.J.Jagadeesan 4 1 PG
More informationGENERIC SECURITY FRAMEWORK FOR CLOUD COMPUTING USING CRYPTONET
http:// GENERIC SECURITY FRAMEWORK FOR CLOUD COMPUTING USING CRYPTONET Manisha Dawra 1, Ramdev Singh 2 1 Al-Falah School of Engg. & Tech., Vill-Dhauj, Ballabgarh-Sohna Road, Faridabad, Haryana (INDIA)-121004
More informationA Comprehensive Data Forwarding Technique under Cloud with Dynamic Notification
Research Journal of Applied Sciences, Engineering and Technology 7(14): 2946-2953, 2014 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2014 Submitted: July 7, 2013 Accepted: August
More informationA survey on cost effective multi-cloud storage in cloud computing
A survey on cost effective multi-cloud storage in cloud computing Nitesh Shrivastava, Ganesh Kumar Abstract As novel storage model, cloud storage has gain attentions from both the academics and industrial
More informationCS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
More informationAnalysis of Service Broker Policies in Cloud Analyst Framework
Journal of The International Association of Advanced Technology and Science Analysis of Service Broker Policies in Cloud Analyst Framework Ashish Sankla G.B Pant Govt. Engineering College, Computer Science
More informationSecure Cloud Service Management and its Resource Utilization of Server Using Volunteer Computing
Secure Cloud Service Management and its Resource Utilization of Server Using Volunteer Computing Nirupadi Tidigol, Thrilochana Kumara Y.P, T.P.Lokesh, nirupadi.tidigol@gmail.com thrilochankumaryp@gmail.com
More information