Enhanced Dynamic Protection Scheme In Saas In Clouds Using Anomaly Software Agent System Arunkumar K.R #1, Madhusudan G *2

Size: px
Start display at page:

Download "Enhanced Dynamic Protection Scheme In Saas In Clouds Using Anomaly Software Agent System Arunkumar K.R #1, Madhusudan G *2"

Transcription

1 Enhanced Dynamic Protection Scheme In Saas In Clouds Using Anomaly Software Agent System Arunkumar K.R #1, Madhusudan G *2 #1 M.Tech. in Computer Engineering,PG Scholor, SJCE, Mysore. *2 Asst. Professor, SJCE, Mysore. kr.arunkumar@gmail.com madhusjce@yahoo.co.in Abstract--In general, cloud suppliers use public cloud assets to make their virtual private cloud to make of distributed computing access for versatile processing assets and IT benefits. SaaS is one of the administration conveyance models where of Software as a service will change the way individuals construct, offer, purchase and utilization of software s. In this model Software is given as an administration where cloud client can get to the product from his web program without the concerns of organization or establishment & support. In this paper, we present an effective technique namely, Enhanced Dynamic Protection Scheme (EDPS) in SaaS in Clouds using Anomaly Software Agent system. The goal of this scheme is to establish the potential of Agent based Information Leakage Detection System. It outperforms in qualifying and appending the detection abilities, standardizing those abilities and deploys the abilities using a Controller Agents (CA). The role of Mobile Agent is an important segment to analyze the information leakage in the system and concurrently protects the communication medium from the malicious attackers. The experimental result is carried out by handling files efficient and effectively without compromising the accuracy and security of the system. Keywords: Cloud suppliers, Dynamic Protection Schemes, SaaS, Anomaly system, Controller agents and Mobile agents I. INTRODUCTION Cloud computing is an advancing idea that depicts the improvement of numerous current innovations and ways to deal with processing into something other than what's expected. Cloud is the conveyance of processing services over the Internet. Cloud administrations permit users and endeavors to utilize software and its equipment that are overseen by suppliers at the remote areas. The cloud registering model permits access to data and PC assets from anyplace that a system association is accessible [1]. Additionally, it gives a common pool of assets, including information storage room, systems and PC handling force. These parts can be quickly sent, provisioned, actualized and scaled up or down. It gives a model of designation and utilization on request. Cloud upgrades joint effort, adaptability, scaling and accessibility which pave the way for possibility to cost diminishment through enhanced and proficient processing. In the meantime, the transformational way of the cloud is connected with huge security and protection dangers [2], [3], [4]. The rapid development of cloud computing innovation presents a greater amount of the vulnerabilities. Security is thought to be a standout amongst the most basic perspectives in cloud computing environment because of the private and vital data stored in the cloud. System security apparatuses, for example, IDS and NIDS are generally conveyed in favorable position focuses and assume an imperative part in shielding the system from assaults [5], [6]. The vast majority of these apparatuses work without joint effort, their discovery results are segregated, and can't be gathered and dissected efficiently. Notwithstanding, cloud computing frameworks are frequently shared by Application Service Providers (ASPs) [5], [6] from diverse security spaces, which make them defenseless against malevolent assaults [9], [10]. For illustration, aggressors can claim to be fake administration suppliers to give fake administration segments and the administration segments gave by benign administration suppliers may incorporate security openings that can be misused by assailants. Our work concentrates on Service Integrity using Anomaly Software Agent System that causes the client to get 116

2 untruthful information processing results, represented by Fig. 1. In spite of the fact that the privacy and integrity protection issues have been widely concentrated on by past researchers [11], [12], [13], [14], the service integrity attestation issue has not been appropriately analyzed. In addition, service integrity is the most predominant issue, which should be tended to regardless of whether public or private information are handled by the cloud framework. Fig.1. Service integrity attack in cloud based data processing [1] In this paper, we presented an efficient technique Enhanced Dynamic Protection Scheme (EDPS) in SaaS in Clouds using Anomaly Software Agent system. Our novel contribution is as follows: We render a proficient service integrity attestation framework for scalable cloud computing infrastructures using Controller Agents (CA). We develop a novel anomaly detecting system to detect the malicious attackers who provides the root cause analysis for leaking the information. We present a Queue Agents (QA) that processes the information and automatically ensures the task prioritization. We present Monitor Agents (MA) that monitors all the processes handled by the client and servers in order to provide the accurate results and also concurrently enhance the detection of information leakage. II. RELATED WORK From previous studies, we can infer the use of IDS, NIDS (Snort and Signature apriori estimation) and Mobile Agents in the cloud computing. In this area, we display three works, the first work is in view of Snort consolidated with signature apriori estimation, the second work is in view of IDS and mobile operators and Atlast work is on the Mobile Agents. The work depicted by Chirag N. Modi et al, consolidate (Snort-Home page N.d.) and signature apriori calculation in their NIDS module. The goal of this methodology is to lessen effect of system assaults (referred to assaults and in addition subordinate of known assaults). The system may be external or internal network. Snort will screen those system parcels and permit/deny them in view of the standard rules. Additionally, captured packets, incompletely known assault marks (put away in known mark database) and bolster edge are given as information to the signature apriori estimation. Utilizing given data, signature apriori creates new conceivable signature and overhauls them as guidelines in Snort. Along these lines, subordinate assaults can be distinguished by Snort [15]. In any case, this work is not able to identify interruption at the hosts and Distributed Denial of Service (DDOS). The second work, A.V. Dastjerdi et al. they attempted to offer a line of barrier by applying Mobile Agents innovation to give interruption recognition for Cloud applications in paying little respect to their location. These scientists develop a vigorous conveyed mixture model scalable, adaptable and financially savvy technique in view of Mobile Agents (MA). VMs are connected to MA which gathers proofs of an assault from all the assaulted VMs for further investigation and inspection. At that point, they need to correspond furthermore, total that information to distinguish dispersed assaults [17]. This sort of work is restricted to the identification of assaults at machines. They didn't think to screen network traffic at the same time. The third work is basically the proposition of a building design that can react to client needs through access to a distributed computing secure with Mobile Agents. A. Alwesabi et al. they are depending on the capacity of versatility and security operators. Their building design is in light of Mobile Agents that have kept the objective of correspondence in security in distributed computing. The idea of Mobile Agents shows up in this connection as a solution to encourage the usage of dynamic systems and gives a bland system to the advancement of cloud computing applications [18]. In any case, they didn't misuse Mobile agents for security against interruption assaults. After an intensive investigation of different security strategies, we discovered the requirement for joint effort of a few security arrangements. This joint effort is for the most part in light of Mobile Agents. 117

3 III. ENHANCED DYNAMIC PROTECTION SCHEME The majority of cloud computing applications utilize the conventional client/server system in which an operation requires a permanent and stable correspondence between the client and the server, hence the customary client/server approach constitute a snag to the improvement of cloud computing applications. The idea of Mobile Agents shows up in this setting as a solution to provide a domain specific structure to the dynamically allocated systems. In this model "Mobile Agents" implies an agent is a procedure with an execution connection, including code and information can move from machine to machine (called servers) to perform the errand doled out to it. The system architecture is given as: 2. Detection Agents (DA): The function of the DA is validated by two actions: a) Identification b) Verification. The Identification phase identifies the refreshed connections in networks. The verification phase verifies the present state of the identified networks. The connection state is segregated as presence or absence of Trusted Cloud Server and Untrusted Cloud Server. The current state of the network is predicted and this information is reported to the Controller Agents to assist in anticipating the actions. 3. Queue Agents(QA): The assigned task should be in a scheduled manner to compute the accuracy of the system and also to lessen the data processing time. The QA conjoins with the CA in order to avoid the risks of data collapsing or congestion. The information predicted by DA will send to the CA and this CA will prioritize the refreshed connections with the assistance of QA in an efficient and organized manner. 4. Monitor Agents (MA): Fig.2. Proposed Architecture Our proposed work is performed as follows: 1. Controller Agents (CA) 2. Detection Agents (DA) 3. Queue Agents (QA) 4. Monitor Agents (MA) The Monitor Agents (MA) is the dynamic and adaptable application systems. It enables the files access mechanism such as file insertion, file deletion and file updation. The file actions performed by the client will be monitored as per the status of the system. IV. EXPERIMENTAL RESULTS For evaluating the performance of the proposed agent system, the obtained results are displayed as screenshots. 1. Controller Agents (CA) The role of Controller Agents (CA) is to establish a coarse layer in the cloud environment. The agents may be primary and secondary agents. The task doled out to as the perfect installation of the software requested by the clients and dispatch the secondary agents in order to precise the task as well as the efficiency of the system. The CA will conjoin the task in the environment agent to the designated networks. 118

4 Fig.3. Cloud Registration Process The client details are captured by the server. The registration process inquiries the information such as Username, Password, id, Address and role. When the client information is gathered, it is stored in the cloud server for future verification. Fig.5. Sensor Router for Monitor Agents. Fig. 6. Owner connection with cloud application using sensor router. Fig.4. Selecting the server In the login page, the client should type the id and password. Once the verification is done by the server, it automatically opens up the space of sourced clients in the cloud. Here the client should select the cloud server. 119

5 Fig.7. File request process after selecting the appropriate server. V. CONCLUSION In this paper, we presented cloud security issues and the Software as a Service using Anomaly Detection Software framework. To alleviate the weaknesses of customary anomaly detection frameworks, we demonstrated the benefits of utilizing an automatic anomaly detection agent system as a source for sensor data. Since SaaS can be moved business stream people to cloud occurrences amid runtime, the framework recognizes a cloud adaptability and scalability. It has been demonstrated in a few samples, that behavior observing can identify cross client part, which for instance can help to farthest the assaults. As a future work, we delve into the study of load balancing mechanism in cloud storage infrastructure. [8] D.J. Abadi et al., The Design of the Borealis Stream Processing Engine, Proc. Second Biennial Conf. Innovative Data Systems Research (CIDR 05), [9] B. Gedik et al., SPADE: The System S Declarative Stream Processing Engine, Proc. ACM SIGMOD Int l Conf. Management of Data (SIGMOD 08), Apr [10] S. Berger et al., TVDc: Managing Security in the Trusted Virtual Datacenter, ACM SIGOPS Operating Systems Rev., vol. 42, no. 1, pp , [11] T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, Hey, You Get Off My Cloud! Exploring Information Leakage in Third-Party Compute Clouds, Proc. 16th ACM Conf. Computer and Communications Security (CCS), [12] W. Xu, V.N. Venkatakrishnan, R. Sekar, and I.V. Ramakrishnan, A Framework for Building Privacy- Conscious Composite Web Services, Proc. IEEE Int l Conf. Web Services, pp , Sept [13] P.C.K. Hung, E. Ferrari, and B. Carminati, Towards Standardized Web Services Privacy Technologies, IEEE Int l Conf. Web Services, pp , June [14] L. Alchaal, V. Roca, and M. Habert, Managing and Securing Web Services with VPNs, Proc. IEEE Int l Conf. Web Services, pp , June [15] H. Zhang, M. Savoie, S. Campbell, S. Figuerola, G. von Bochmann, and B.S. Arnaud, Service-Oriented Virtual Private Networks for Grid Applications, Proc. IEEE Int l Conf. Web Services, pp , July [16] M. Burnside and A.D. Keromytis, F3ildCrypt: End-to- End Protection of Sensitive Information in Web Services, Proc. 12 th Int l Conf. Information Security (ISC), pp , [17] I. Roy et al., Airavat: Security and Privacy for MapReduce, Proc. Seventh USENIX Conf. Networked Systems Design and Implementation (NSDI), Apr [18] J. Garay and L. Huelsbergen, Software Integrity Protection Using Timed Executable Agents, Proc. ACM Symp. Information, Computer and Comm. Security (ASIACCS), Mar [19] T. Garfinkel et al., Terra: A Virtual Machine-Based Platform for Trusted Computing, Proc. 19th ACM Symp. Operating Systems Principles (SOSP), Oct REFERENCES [1] Juan Du et al, Scalable Distributed Service Integrity Attestation for Software-As-A-Service Clouds, IEEE Transactions on Parallel And Distributed Systems, Vol. 25, No. 3, [2] Amazon Web Services, [3] Google App Engine, [4] Software as a Service, as a Service, [5] G. Alonso, F. Casati, H. Kuno, and V. Machiraju, Web Services Concepts, Architectures and Applications (Data-Centric Systems and Applications). Addison- Wesley Professional, [6] T. Erl, Service-Oriented Architecture (SOA): Concepts, Technology, and Design. Prentice Hall, [7] T.S. Group, STREAM: The Stanford Stream Data Manager, IEEE Data Eng. Bull., vol. 26, no. 1, pp , Mar

ASSURING INTEGRITY OF DATAFLOW PROCESSING IN CLOUD COMPUTING INFRASTRUCTURE

ASSURING INTEGRITY OF DATAFLOW PROCESSING IN CLOUD COMPUTING INFRASTRUCTURE ASSURING INTEGRITY OF DATAFLOW PROCESSING IN CLOUD COMPUTING INFRASTRUCTURE R.Genga devi 1, K.Anitha 2, M.Murugeshwari 3,S.vidhya 4, Dr.K.Ramasamy 5 1, 2, 3- UG STUDENT, P.S.R.RENGASAMY COLLEGE OF ENGINEERING

More information

ISSN: 2321-7782 (Online) Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies

ISSN: 2321-7782 (Online) Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online

More information

International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 Software as a Model for Security in Cloud over Virtual Environments S.Vengadesan, B.Muthulakshmi PG Student,

More information

Providing Flexible Security as a Service Model for Cloud Infrastructure

Providing Flexible Security as a Service Model for Cloud Infrastructure Providing Flexible Security as a Service Model for Cloud Infrastructure Dr. M. Newlin Rajkumar, P. Banu Priya, Dr. V. Venkatesakumar Abstract Security-as-a-Service model for cloud systems enable application

More information

Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment

Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment Deepa Noorandevarmath 1, Rameshkumar H.K 2, C M Parameshwarappa 3 1 PG Student, Dept of CS&E, STJIT, Ranebennur. Karnataka, India

More information

Dynamic Resource management with VM layer and Resource prediction algorithms in Cloud Architecture

Dynamic Resource management with VM layer and Resource prediction algorithms in Cloud Architecture Dynamic Resource management with VM layer and Resource prediction algorithms in Cloud Architecture 1 Shaik Fayaz, 2 Dr.V.N.Srinivasu, 3 Tata Venkateswarlu #1 M.Tech (CSE) from P.N.C & Vijai Institute of

More information

Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System

Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System 1 K.Valli Madhavi A.P vallimb@yahoo.com Mobile: 9866034900 2 R.Tamilkodi A.P tamil_kodiin@yahoo.co.in Mobile:

More information

Iaas for Private and Public Cloud using Openstack

Iaas for Private and Public Cloud using Openstack Iaas for Private and Public Cloud using Openstack J. Beschi Raja, Assistant Professor, Department of CSE, Kalasalingam Institute of Technology, TamilNadu, India, K.Vivek Rabinson, PG Student, Department

More information

CONSIDERATION OF TRUST LEVELS IN CLOUD ENVIRONMENT

CONSIDERATION OF TRUST LEVELS IN CLOUD ENVIRONMENT INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE CONSIDERATION OF TRUST LEVELS IN CLOUD ENVIRONMENT Bhukya Ganesh 1, Mohd Mukram 2, MD.Tajuddin 3 1 M.Tech Student, Dept of CSE, Shaaz

More information

Keywords: Cloud; Security; privacy; multi-cloud; Application Partitioning; Tier Partitioning; Data Partitioning; Multi-party Computation.

Keywords: Cloud; Security; privacy; multi-cloud; Application Partitioning; Tier Partitioning; Data Partitioning; Multi-party Computation. An Secure Data Storage Multi Cloud Architecture Mr. Gajendrasing Chandel, Mr.Rajkumar R. Yadav Assistant Professor, Student M.Tech 2 nd Year Computer Science & Engineering, SSSIST, Sehor ABSTRACT In recent

More information

EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE

EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE Reshma Mary Abraham and P. Sriramya Computer Science Engineering, Saveetha University, Chennai, India E-Mail: reshmamaryabraham@gmail.com

More information

Selective dependable storage services for providing security in cloud computing

Selective dependable storage services for providing security in cloud computing Selective dependable storage services for providing security in cloud computing Gade Lakshmi Thirupatamma*1, M.Jayaram*2, R.Pitchaiah*3 M.Tech Scholar, Dept of CSE, UCET, Medikondur, Dist: Guntur, AP,

More information

Multi Tiered Security and Privacy- Enhancing Multi-cloud Environment

Multi Tiered Security and Privacy- Enhancing Multi-cloud Environment Multi Tiered Security and Privacy- Enhancing Multi-cloud Environment Akanksha Rana 1, Srinivas Arukonda 2 1 M.Tech Student, Computer Science Department, Galgotias University, India 2 Assistant Professor,

More information

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD Volume 1, Issue 7, PP:, JAN JUL 2015. SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD B ANNAPURNA 1*, G RAVI 2*, 1. II-M.Tech Student, MRCET 2. Assoc. Prof, Dept.

More information

An Alternative Model Of Virtualization Based Intrusion Detection System In Cloud Computing

An Alternative Model Of Virtualization Based Intrusion Detection System In Cloud Computing An Alternative Model Of Virtualization Based Intrusion Detection System In Cloud Computing Partha Ghosh, Ria Ghosh, Ruma Dutta Abstract: The massive jumps in technology led to the expansion of Cloud Computing

More information

Analyze & Classify Intrusions to Detect Selective Measures to Optimize Intrusions in Virtual Network

Analyze & Classify Intrusions to Detect Selective Measures to Optimize Intrusions in Virtual Network Analyze & Classify Intrusions to Detect Selective Measures to Optimize Intrusions in Virtual Network 1 T.Ganesh, 2 K.Santhi 1 M.Tech Student, Department of Computer Science and Engineering, SV Collge of

More information

International Journal of Advance Research in Computer Science and Management Studies

International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 11, November 2014 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online

More information

Optimal Service Pricing for a Cloud Cache

Optimal Service Pricing for a Cloud Cache Optimal Service Pricing for a Cloud Cache K.SRAVANTHI Department of Computer Science & Engineering (M.Tech.) Sindura College of Engineering and Technology Ramagundam,Telangana G.LAKSHMI Asst. Professor,

More information

SPACK FIREWALL RESTRICTION WITH SECURITY IN CLOUD OVER THE VIRTUAL ENVIRONMENT

SPACK FIREWALL RESTRICTION WITH SECURITY IN CLOUD OVER THE VIRTUAL ENVIRONMENT SPACK FIREWALL RESTRICTION WITH SECURITY IN CLOUD OVER THE VIRTUAL ENVIRONMENT V. Devi PG Scholar, Department of CSE, Indira Institute of Engineering & Technology, India. J. Chenni Kumaran Associate Professor,

More information

Securing Cloud using Third Party Threaded IDS

Securing Cloud using Third Party Threaded IDS Securing Cloud using Third Party Threaded IDS Madagani Rajeswari, Madhu babu Janjanam 1 Student, Dept. of CSE, Vasireddy Venkatadri Institute of Technology, Guntur, AP 2 Assistant Professor, Dept. of CSE,

More information

Public Auditing for Shared Data in the Cloud by Using AES

Public Auditing for Shared Data in the Cloud by Using AES Public Auditing for Shared Data in the Cloud by Using AES 1 Syagamreddy Subbareddy, 2 P.Tejaswi, 3 D.Krishna 1 M.Tech(CSE) Pursuing, 2 Associate Professor, 3 Associate Professor,HOD, 1,2,3 Dept. of Computer

More information

Second-generation (GenII) honeypots

Second-generation (GenII) honeypots Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. b.zdrnja@auckland.ac.nz Abstract Honeypots are security resources which trap malicious activities, so they

More information

Cloud Information Accountability Framework for Auditing the Data Usage in Cloud Environment

Cloud Information Accountability Framework for Auditing the Data Usage in Cloud Environment International Journal of Computational Engineering Research Vol, 03 Issue, 11 Cloud Information Accountability Framework for Auditing the Data Usage in Cloud Environment D.Dhivya 1, S.CHINNADURAI 2 1,M.E.(Cse),

More information

Service and Data Security for Multi Cloud Environment

Service and Data Security for Multi Cloud Environment Service and Data Security for Multi Cloud Environment Rajkumar B 1, Balamurugan K 2 M.Tech, Dept of IT, K.S.R. College of Engineering, Tamilnadu, India 1 Associate Professor, Dept of IT, K.S.R. College

More information

Security Model for VM in Cloud

Security Model for VM in Cloud Security Model for VM in Cloud 1 Venkataramana.Kanaparti, 2 Naveen Kumar R, 3 Rajani.S, 4 Padmavathamma M, 5 Anitha.C 1,2,3,5 Research Scholars, 4Research Supervisor 1,2,3,4,5 Dept. of Computer Science,

More information

Exploring Resource Provisioning Cost Models in Cloud Computing

Exploring Resource Provisioning Cost Models in Cloud Computing Exploring Resource Provisioning Cost Models in Cloud Computing P.Aradhya #1, K.Shivaranjani *2 #1 M.Tech, CSE, SR Engineering College, Warangal, Andhra Pradesh, India # Assistant Professor, Department

More information

Secure Cloud Service Management and its Resource Utilization of Server Using Volunteer Computing

Secure Cloud Service Management and its Resource Utilization of Server Using Volunteer Computing Secure Cloud Service Management and its Resource Utilization of Server Using Volunteer Computing Nirupadi Tidigol, Thrilochana Kumara Y.P, T.P.Lokesh, nirupadi.tidigol@gmail.com thrilochankumaryp@gmail.com

More information

Secure Cloud Transactions by Performance, Accuracy, and Precision

Secure Cloud Transactions by Performance, Accuracy, and Precision Secure Cloud Transactions by Performance, Accuracy, and Precision Patil Vaibhav Nivrutti M.Tech Student, ABSTRACT: In distributed transactional database systems deployed over cloud servers, entities cooperate

More information

PERFORMANCE OF BALANCED STORAGE SERVICES IN CLOUD SYSTEM

PERFORMANCE OF BALANCED STORAGE SERVICES IN CLOUD SYSTEM INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE PERFORMANCE OF BALANCED STORAGE SERVICES IN CLOUD SYSTEM Byagari Kumar 1, K.Pradeep Kumar 2 1 M.Tech Student, Dept of CSE, RRS College

More information

Ensuring Security in Cloud with Multi-Level IDS and Log Management System

Ensuring Security in Cloud with Multi-Level IDS and Log Management System Ensuring Security in Cloud with Multi-Level IDS and Log Management System 1 Prema Jain, 2 Ashwin Kumar PG Scholar, Mangalore Institute of Technology & Engineering, Moodbidri, Karnataka1, Assistant Professor,

More information

IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD ENVIRONMENT

IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD ENVIRONMENT IJRRECS/November 2014/Volume-2/Issue-11/3699-3703 ISSN 2321-5461 INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD

More information

Accessing Private Network via Firewall Based On Preset Threshold Value

Accessing Private Network via Firewall Based On Preset Threshold Value IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 3, Ver. V (May-Jun. 2014), PP 55-60 Accessing Private Network via Firewall Based On Preset Threshold

More information

A Survey on Secure Storage Services in Cloud Computing

A Survey on Secure Storage Services in Cloud Computing Global Journal of Computer Science and Technology Cloud & Distributed Volume 12 Issue 12 Version 1.0 Year 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

Identifying Data Integrity in the Cloud Storage

Identifying Data Integrity in the Cloud Storage www.ijcsi.org 403 Identifying Data Integrity in the Cloud Storage Saranya Eswaran 1 and Dr.Sunitha Abburu 2 1 Adhiyamaan College of Engineering, Department of Computer Application, Hosur. 2 Professor and

More information

A Survey on Service Integrity in Software as a Service

A Survey on Service Integrity in Software as a Service A Survey on Service Integrity in Software as a Service Gohila Priyadharshini.C #1, Mohana.S *2 #1 PG scholar, Computer Science Department, *2 Assistant Proffesor, M.I.E.T.Engineering college, Trichy,India

More information

Resistance of Denial-of-Service Attack in Network Coding using Node Authenticity

Resistance of Denial-of-Service Attack in Network Coding using Node Authenticity Resistance of Denial-of-Service Attack in Network Coding using Node Authenticity P. ANITHA PG Scholar Dept. of Computer Science Velalar College of Engineering and Technology ANNA UNIVERSITY, CHENNAI anita4890@gmail.com

More information

Ensuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication

Ensuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication Ensuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication Sanjay Kumar Baghel Mtech Scholar, CSE, CSIT DURG Sanju5878@gmail.com Bhupesh Kumar Dewangan Assistant Professor,CSE,

More information

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION K.Anusha 1, K.Sudha 2 1 M.Tech Student, Dept of CSE, Aurora's Technological

More information

Application Based Access Control on Cloud Networks for Data Security

Application Based Access Control on Cloud Networks for Data Security Application Based Access Control on Cloud Networks for Data Security Ms. Smitha P M.Tech in DCN, Department of ECE GSSSIETW, Mysuru Karnataka, India Smitha.21sn @gmail.com Mrs. Manjula G Associate. Proffesor,

More information

[Sudhagar*, 5(5): May, 2016] ISSN: 2277-9655 Impact Factor: 3.785

[Sudhagar*, 5(5): May, 2016] ISSN: 2277-9655 Impact Factor: 3.785 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY AVOID DATA MINING BASED ATTACKS IN RAIN-CLOUD D.Sudhagar * * Assistant Professor, Department of Information Technology, Jerusalem

More information

Enabling Public Accountability and Data Sharing for Storage Security in Cloud Computing

Enabling Public Accountability and Data Sharing for Storage Security in Cloud Computing VOLUME 1, NUMBER 1, JUNE 2014 OPEN JOURNAL OF INFORMATION SECURITY AND APPLICATIONS Enabling Public Accountability and Data Sharing for Storage Security in Cloud Computing K. Mohammed Aaqib Ameen, A. Anny

More information

Secure Way of Storing Data in Cloud Using Third Party Auditor

Secure Way of Storing Data in Cloud Using Third Party Auditor IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 4 (Jul. - Aug. 2013), PP 69-74 Secure Way of Storing Data in Cloud Using Third Party Auditor 1 Miss.

More information

Cloud deployment model and cost analysis in Multicloud

Cloud deployment model and cost analysis in Multicloud IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) ISSN: 2278-2834, ISBN: 2278-8735. Volume 4, Issue 3 (Nov-Dec. 2012), PP 25-31 Cloud deployment model and cost analysis in Multicloud

More information

Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks

Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Prashil S. Waghmare PG student, Sinhgad College of Engineering, Vadgaon, Pune University, Maharashtra, India. prashil.waghmare14@gmail.com

More information

EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM

EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM Macha Arun 1, B.Ravi Kumar 2 1 M.Tech Student, Dept of CSE, Holy Mary

More information

Near Sheltered and Loyal storage Space Navigating in Cloud

Near Sheltered and Loyal storage Space Navigating in Cloud IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 8 (August. 2013), V2 PP 01-05 Near Sheltered and Loyal storage Space Navigating in Cloud N.Venkata Krishna, M.Venkata

More information

Improving data integrity on cloud storage services

Improving data integrity on cloud storage services International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services

More information

Cloud Computing and Business Intelligence

Cloud Computing and Business Intelligence Database Systems Journal vol. V, no. 4/2014 49 Cloud Computing and Business Intelligence Alexandru Adrian TOLE Romanian American University, Bucharest, Romania adrian.tole@yahoo.com The complexity of data

More information

Double guard: Detecting Interruptions in N- Tier Web Applications

Double guard: Detecting Interruptions in N- Tier Web Applications Vol. 3, Issue. 4, Jul - Aug. 2013 pp-2014-2018 ISSN: 2249-6645 Double guard: Detecting Interruptions in N- Tier Web Applications P. Krishna Reddy 1, T. Manjula 2, D. Srujan Chandra Reddy 3, T. Dayakar

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental

More information

A NOVEL APPROACH FOR PROTECTING EXPOSED INTRANET FROM INTRUSIONS

A NOVEL APPROACH FOR PROTECTING EXPOSED INTRANET FROM INTRUSIONS A NOVEL APPROACH FOR PROTECTING EXPOSED INTRANET FROM INTRUSIONS K.B.Chandradeep Department of Centre for Educational Technology, IIT Kharagpur, Kharagpur, India kbchandradeep@gmail.com ABSTRACT This paper

More information

An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud

An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud T.Vijayalakshmi 1, Balika J Chelliah 2,S.Alagumani 3 and Dr.J.Jagadeesan 4 1 PG

More information

Ashok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram.

Ashok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram. Protection of Vulnerable Virtual machines from being compromised as zombies during DDoS attacks using a multi-phase distributed vulnerability detection & counter-attack framework Ashok Kumar Gonela MTech

More information

ISSN 2278-3091. Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability

ISSN 2278-3091. Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability Outsourcing and Discovering Storage Inconsistencies in Cloud Through TPA Sumathi Karanam 1, GL Varaprasad 2 Student, Department of CSE, QIS College of Engineering and Technology, Ongole, AndhraPradesh,India

More information

International Journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online http://www.ijoer.

International Journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online http://www.ijoer. REVIEW ARTICLE ISSN: 2321-7758 UPS EFFICIENT SEARCH ENGINE BASED ON WEB-SNIPPET HIERARCHICAL CLUSTERING MS.MANISHA DESHMUKH, PROF. UMESH KULKARNI Department of Computer Engineering, ARMIET, Department

More information

System Specification. Author: CMU Team

System Specification. Author: CMU Team System Specification Author: CMU Team Date: 09/23/2005 Table of Contents: 1. Introduction...2 1.1. Enhancement of vulnerability scanning tools reports 2 1.2. Intelligent monitoring of traffic to detect

More information

How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System

How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System REVIEW ARTICAL A Novel Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage Dumala Harisha 1, V.Gouthami 2 1 Student, Computer Science & Engineering-Department, JNTU Hyderabad India

More information

ASSURANCE OF PATIENT CONTROL TOWARDS PERSONAL HEALTH DATA

ASSURANCE OF PATIENT CONTROL TOWARDS PERSONAL HEALTH DATA INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE ASSURANCE OF PATIENT CONTROL TOWARDS PERSONAL HEALTH DATA Mahammad Zennyfor Sulthana 1, Shaik Habeeba 2 1 M.Tech Student, Dept of CS

More information

AN APPROACH TOWARDS FUNCTIONING OF PUBLIC AUDITABILITY FOR CLOUD ENRICHMENT

AN APPROACH TOWARDS FUNCTIONING OF PUBLIC AUDITABILITY FOR CLOUD ENRICHMENT INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN APPROACH TOWARDS FUNCTIONING OF PUBLIC AUDITABILITY FOR CLOUD ENRICHMENT Mohd Abdul Shoaib 1, Akheel Mohammed 2, Ayesha 3

More information

MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS

MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS Kanchupati Kondaiah 1, B.Sudhakar 2 1 M.Tech Student, Dept of CSE,

More information

IMPLEMENTATION OF VIRTUAL MACHINES FOR DISTRIBUTION OF DATA RESOURCES

IMPLEMENTATION OF VIRTUAL MACHINES FOR DISTRIBUTION OF DATA RESOURCES INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE IMPLEMENTATION OF VIRTUAL MACHINES FOR DISTRIBUTION OF DATA RESOURCES M.Nagesh 1, N.Vijaya Sunder Sagar 2, B.Goutham 3, V.Naresh 4

More information

DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR

DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR Journal homepage: www.mjret.in DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR Maharudra V. Phalke, Atul D. Khude,Ganesh T. Bodkhe, Sudam A. Chole Information Technology, PVPIT Bhavdhan Pune,India maharudra90@gmail.com,

More information

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA U.Pandi Priya 1, R.Padma Priya 2 1 Research Scholar, Department of Computer Science and Information Technology,

More information

Mutual Authentication Cloud Computing Platform based on TPM

Mutual Authentication Cloud Computing Platform based on TPM Mutual Authentication Cloud Computing Platform based on TPM Lei Peng 1, Yanli Xiao 2 1 College of Information Engineering, Taishan Medical University, Taian Shandong, China 2 Department of Graduate, Taishan

More information

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

A Review of Anomaly Detection Techniques in Network Intrusion Detection System A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In

More information

CONSIDERATION OF DYNAMIC STORAGE ATTRIBUTES IN CLOUD

CONSIDERATION OF DYNAMIC STORAGE ATTRIBUTES IN CLOUD INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE CONSIDERATION OF DYNAMIC STORAGE ATTRIBUTES IN CLOUD Ravi Sativada 1, M.Prabhakar Rao 2 1 M.Tech Student, Dept of CSE, Chilkur Balaji

More information

A Catechistic Method for Traffic Pattern Discovery in MANET

A Catechistic Method for Traffic Pattern Discovery in MANET A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer

More information

Proof of Retrivability: A Third Party Auditor Using Cloud Computing

Proof of Retrivability: A Third Party Auditor Using Cloud Computing Proof of Retrivability: A Third Party Auditor Using Cloud Computing Vijayaraghavan U 1, Madonna Arieth R 2, Geethanjali K 3 1,2 Asst. Professor, Dept of CSE, RVS College of Engineering& Technology, Pondicherry

More information

A Novel Multi Ring Forwarding Protocol for Avoiding the Void Nodes for Balanced Energy Consumption

A Novel Multi Ring Forwarding Protocol for Avoiding the Void Nodes for Balanced Energy Consumption International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-4 E-ISSN: 2347-2693 A Novel Multi Ring Forwarding Protocol for Avoiding the Void Nodes for Balanced Energy

More information

A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS

A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS *Dr Umesh Sehgal, #Shalini Guleria *Associate Professor,ARNI School of Computer Science,Arni University,KathagarhUmeshsehgalind@gmail.com

More information

SURVEY OF INTRUSION DETECTION SYSTEM

SURVEY OF INTRUSION DETECTION SYSTEM SURVEY OF INTRUSION DETECTION SYSTEM PRAJAPATI VAIBHAVI S. SHARMA DIPIKA V. ASST. PROF. ASST. PROF. MANISH INSTITUTE OF COMPUTER STUDIES MANISH INSTITUTE OF COMPUTER STUDIES VISNAGAR VISNAGAR GUJARAT GUJARAT

More information

February. ISSN: 2321-8134

February. ISSN: 2321-8134 IJFEAT INTERNATIONAL JOURNAL FOR ENGINEERING APPLICATIONS AND TECHNOLOGY TITLE: DATA PLACE & MANAGE SECURITY IN CLOUD COMPUTING FOR EFFECTIVE AND FLEXIBLE DISTRIBUTED SYSTEM 1 Mr. Pritam S. Bhoyar, 2 Mr.

More information

Decentralized Access Control Secure Cloud Storage using Key Policy Attribute Based Encryption

Decentralized Access Control Secure Cloud Storage using Key Policy Attribute Based Encryption Decentralized Access Control Secure Cloud Storage using Key Policy Attribute Based Encryption 1 Thota Naresh Kumar, 2 K.SRINIVAS, 3 Y.Raju 2 Associate Professor, 3 Associate Professor 1,2,3 Department

More information

Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing.

Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing. Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Privacy - Preserving

More information

Device-based Secure Data Management Scheme in a Smart Home

Device-based Secure Data Management Scheme in a Smart Home Int'l Conf. Security and Management SAM'15 231 Device-based Secure Data Management Scheme in a Smart Home Ho-Seok Ryu 1, and Jin Kwak 2 1 ISAA Lab., Department of Computer Engineering, Ajou University,

More information

An Efficient Data Correctness Approach over Cloud Architectures

An Efficient Data Correctness Approach over Cloud Architectures International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 8, Issue 12 (October 2013), PP. 33-37 An Efficient Data Correctness Approach over

More information

Secure Private Cloud Architecture for Mobile Infrastructure as a Service

Secure Private Cloud Architecture for Mobile Infrastructure as a Service 2012 IEEE Eighth World Congress on Services Secure Private Cloud Architecture for Mobile Infrastructure as a Service Susmita Horrow Department of mathematics IIT Roorkee, India hsusmita4@gmail.com Sanchika

More information

Development of enhanced Third party Auditing Scheme for Secure Cloud Storage

Development of enhanced Third party Auditing Scheme for Secure Cloud Storage Development of enhanced Third party Auditing Scheme for Secure Cloud Storage Bhanu Prakash Chamakuri*1, D. Srikar*2, Dr. M.Suresh Babu*3 M.Tech Scholar, Dept of CSE, Grandhi Varalakshmi Institute Of Technology,

More information

INCREASING THE CLOUD PERFORMANCE WITH LOCAL AUTHENTICATION

INCREASING THE CLOUD PERFORMANCE WITH LOCAL AUTHENTICATION INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 INCREASING THE CLOUD PERFORMANCE WITH LOCAL AUTHENTICATION Sanjay Razdan Department of Computer Science and Eng. Mewar

More information

15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM

15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM Dhanashri Bamane Vinayak Pottigar Subhash Pingale Department of Computer Science and Engineering SKN

More information

Detection and mitigation of Web Services Attacks using Markov Model

Detection and mitigation of Web Services Attacks using Markov Model Detection and mitigation of Web Services Attacks using Markov Model Vivek Relan RELAN1@UMBC.EDU Bhushan Sonawane BHUSHAN1@UMBC.EDU Department of Computer Science and Engineering, University of Maryland,

More information

International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April-2015 36 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April-2015 36 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April-2015 36 An Efficient Approach for Load Balancing in Cloud Environment Balasundaram Ananthakrishnan Abstract Cloud computing

More information

DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION

DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION Prof. M. Ben Swarup Professor, Department of CSE Vignan's Institute of Information Technology Visakhapatnam-49, India Chukkala

More information

Wlan Monitoring Using Android Phone

Wlan Monitoring Using Android Phone International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 10, Issue 7 (July 2014), PP.23-27 Wlan Monitoring Using Android Phone Pooja Chaudhary

More information

Security Considerations for Public Mobile Cloud Computing

Security Considerations for Public Mobile Cloud Computing Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea rdcaytiles@gmail.com 2 Research Institute of

More information

IDS IMPLEMENTATION IN A PRIVATE CLOUD

IDS IMPLEMENTATION IN A PRIVATE CLOUD Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 6, June 2014, pg.208

More information

Monitoring Performances of Quality of Service in Cloud with System of Systems

Monitoring Performances of Quality of Service in Cloud with System of Systems Monitoring Performances of Quality of Service in Cloud with System of Systems Helen Anderson Akpan 1, M. R. Sudha 2 1 MSc Student, Department of Information Technology, 2 Assistant Professor, Department

More information

Data Security in Cloud

Data Security in Cloud Data Security in Cloud Mr. Pankaj Sareen Assistant Professor, Department of Computer Applications SPN College, Mukerian, Punjab pankaj.sareen1480@gmail.com Dr. Tripat Deep Singh Assistant Professor, Department

More information

Keywords Distributed Computing, On Demand Resources, Cloud Computing, Virtualization, Server Consolidation, Load Balancing

Keywords Distributed Computing, On Demand Resources, Cloud Computing, Virtualization, Server Consolidation, Load Balancing Volume 5, Issue 1, January 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Survey on Load

More information

Figure 1 Cloud Computing. 1.What is Cloud: Clouds are of specific commercial interest not just on the acquiring tendency to outsource IT

Figure 1 Cloud Computing. 1.What is Cloud: Clouds are of specific commercial interest not just on the acquiring tendency to outsource IT An Overview Of Future Impact Of Cloud Computing Shiva Chaudhry COMPUTER SCIENCE DEPARTMENT IFTM UNIVERSITY MORADABAD Abstraction: The concept of cloud computing has broadcast quickly by the information

More information

A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments

A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining

More information

Multi Tenancy Access Control Using Cloud Service in MVC

Multi Tenancy Access Control Using Cloud Service in MVC Multi Tenancy Access Control Using Cloud Service in MVC 1 Sonia Gupta, 2 Rubal Choudary Indo Global College of Engg, Abhipur, Mohali Abstract - Cloud Computing is the next generation Internet service and

More information

Advancement in Virtualization Based Intrusion Detection System in Cloud Environment

Advancement in Virtualization Based Intrusion Detection System in Cloud Environment Advancement in Virtualization Based Intrusion Detection System in Cloud Environment Jaimin K. Khatri IT Systems and Network Security GTU PG School, Ahmedabad, Gujarat, India Mr. Girish Khilari Senior Consultant,

More information

A UPS Framework for Providing Privacy Protection in Personalized Web Search

A UPS Framework for Providing Privacy Protection in Personalized Web Search A UPS Framework for Providing Privacy Protection in Personalized Web Search V. Sai kumar 1, P.N.V.S. Pavan Kumar 2 PG Scholar, Dept. of CSE, G Pulla Reddy Engineering College, Kurnool, Andhra Pradesh,

More information

INTRUSION DETECTION SYSTEMS and Network Security

INTRUSION DETECTION SYSTEMS and Network Security INTRUSION DETECTION SYSTEMS and Network Security Intrusion Detection System IDS A layered network security approach starts with : A well secured system which starts with: Up-to-date application and OS

More information

DELEGATING LOG MANAGEMENT TO THE CLOUD USING SECURE LOGGING

DELEGATING LOG MANAGEMENT TO THE CLOUD USING SECURE LOGGING Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IJCSMC, Vol. 3, Issue.

More information

Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds

Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds ABSTRACT: Software-as-a-service (SaaS) cloud systems enable application service providers to deliver their applications

More information

Ch. 4 - Topics of Discussion

Ch. 4 - Topics of Discussion CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies Lecture 6 Cloud Platform Architecture over Virtualized Data Centers Part -4 Cloud Security and Trust Management Text Book: Distributed

More information

Overview - Snort Intrusion Detection System in Cloud Environment

Overview - Snort Intrusion Detection System in Cloud Environment International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 3 (2014), pp. 329-334 International Research Publications House http://www. irphouse.com /ijict.htm Overview

More information

SHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING

SHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING SHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING Er. Kavin M 1, Mr.J.Jayavel 2 1 PG Scholar, 2 Teaching Assistant, Department of Information Technology, Anna University Regional

More information