Agent-Based Cloud Broker Architecture for Distributed Access Control

Size: px
Start display at page:

Download "Agent-Based Cloud Broker Architecture for Distributed Access Control"

Transcription

1 Agent-Based Cloud Broker Architecture for Distributed Access Control Manoj V. Thomas 1, and Chandra Sekaran K. Department of Computer Science and Engineering. NITK, Surathkal, Mangalore , India. 1 Abstract. Cloud computing is an emerging paradigm in the distributed computing environments where, users access various services and shared resources hosted by the service providers, to achieve their tasks done efficiently. Authentication and authorization are the two important functions to be performed in the context of cloud computing, to make sure that unauthorized users do not access the distributed system components. In this paper, we analyse the issue of distributed access control discussing the various approaches already adopted in this area considering the advantages and disadvantages. We propose an agentbased cloud broker architecture with computational intelligence for mediating the access requests of cloud customers, considering the present day requirements of the cloud computing paradigm. We also give the workflow model for the proposed agent-based cloud broker architecture. A few open issues in the area of distributed access control are also discussed. Keywords: access control, agents, authentication, authorization, cloud computing. 1. Introduction 1.1 Distributed Access Control In Cloud Computing or Services Computing, users access various resources or services after verification of their identity by the service provider. In open service-oriented systems, in many cases, the service providers and the service consumers are strangers. Since they do not have a pre-established trust value between them, the service provider must be able to authenticate the unfamiliar users and then determine whether the requestors have enough privileges to access the requested services. Trust establishment between consumers, Service Providers and Identity Providers also assumes very high importance in the current scenario. As the development of the internet is very fast, there are increasing demands to support cooperation among distributed, heterogeneous, and autonomous organizations, highlighting the need Corresponding author. K. R. Venugopal and L. M. Patnaik (Eds.) ICCN 2013, pp Elsevier Publications 2013.

2 Manoj V. Thomas and Chandra Sekaran K. to develop an efficient access control model to facilitate cooperation or collaboration in such a distributed environment. In open distributed systems, secure authentication and authorization processes are required before access privileges are granted to the users. The issue of access control in the domain of distributed applications, in collaborative, distributed, cooperative environments like cloud computing, where various users access the resources and services, with different access rights, is called the distributed access control. Various users have different access rights towards the available resources in the system, which need to be concisely specified and correctly enforced. Access control deals with the specification and enforcement of users access permissions and access restrictions relative to the resources of a system. 1.2 Agent-based computing Agents are normally autonomous programs, which can interact with the environment and act upon it to achieve their tasks [1]. An intelligent agent can perform flexible autonomous actions to meet its design objectives. A multi-agent system involves multiple interacting software components known as agents, which can cooperatively solve the problems that are beyond the capabilities of any individual entity. The agents are characterized by certain unique properties to be different from the standard programs. The mandatory properties [1] of the agents are: 1. Autonomy 2. Decision Making 3. Temporal Continuity and 4. Goal Oriented. The agents are characterised by the following orthogonal properties [1]: 1. Mobility 2. Communicative 3. Collaborative and 4. Learning. The main advantages of the agent based systems are [2]: 1. Reduce the network load 2. Minimize the network latency 3. Execute in asynchronous and autonomous mode 4. Adapt dynamically and 5. Robust and fault tolerant. Because of the inherent properties of cloud computing and agent-based systems, and also because of the advantages of an agent-based approach, it would be an efficient and secure approach to combine the two paradigms so that the access requests of the cloud customers could be mediated through the agents. The rest of the paper is organized as follows: Section 2 describes the work done in the area of distributed access control highlighting the advantages and disadvantages of various approaches. Section 3 presents an agent-based cloud broker architecture for mediating the access control requests of users, taking into account the current issues and present day requirements. Section 4 discusses the workflow model for the proposed access control architecture. Section 5 presents the analysis and results mentioning a few open issues in this area and Section 6 concludes the paper. 2. Work Done in the Area Many researchers have been working in this area of access control and, some of the works carried out by them follows. The work carried out in [3] presents an attribute and role based access control (ARBAC) model. Before invoking services, requestors of various services provide their attribute information to the service providers. In this work, access negotiation mechanism is not added into the ARBAC model. In [4], it presents an objected-oriented RBAC model (ORBAC) based on which, multiple domain access control is obtained. A method is presented to prevent the problem of separation of duty. In the work carried out in [5], a unified hierarchy is derived starting from an access relation between users and resources, which is used to specify the access relation that allows user 190

3 Agent-Based Cloud Broker Architecture for Distributed Access Control queries. But, this scheme does not consider the dynamics of access control (when users and resources are added and removed and when access rights change) and the specification of negative access relations in distributed systems. In [6], a method for managing the security policies using XML and role based access control are presented. A role-based access control model for web-based applications (ORBAC) is introduced. In [7], the design and development of a domain-based access control infrastructure for distributed collaborative environments is introduced. The concept of virtual laboratory (VL) is given. How to enforce access control, on the numerous users who are not defined in the system in the distributed computing environment is discussed in the work carried out in [8]. A trust representation and reasoning model, using fuzzy set theory is proposed in this work. In [9], the proposed scheme cryptographically provides role-based access control and delegation, based on Hierarchical Identity- Based Signature (IBS). Algorithms for role based access control and delegation scheme are proposed in this work. In the work carried out in [10], dynamic access control models have been proposed for distributed dynamic environments where the users (or agents) may not have a static role. In the Dynamic Event- Based Access Control (DEBAC), as well as in the Action-Status Access Control (ASAC) model, the users rights of access vary depending on the history of events involving the user. In [11], a Trust and Context based Access Control (TCAC) model, extending the RBAC model is proposed for open and distributed systems. When the trust value of the requester is not less than the trust threshold defined by the system policies, the user will be assigned to some roles. In [12], an access control model based on credibility is proposed. In open distributed systems, the access-control policy in the server changes quickly. The service providers adjust the threshold value of credibility and weight factor, instead of changing policies in the server. The service providers register their threshold value of trust on the servers. If a requestor s trustworthiness achieves this value in the server, access to the service provider is made possible. The authors in [13] put forward an access control model, based on roles and trust values of subjects and objects. In this work, the RBAC model is extended by adding trust factor. In the work carried out in [14], the authors present a framework for the verification of run-time constraints and security properties for RBAC systems, considering the dynamic behavior of users during an active session. Temporal and location based decision parameters are considered. In [15], it describes a Role-Based Access Control (RBAC) mechanism for distributed High Performance Computing (HPC) systems where both users and resources can be dynamic and can belong to multiple organizations, each with their own diverse security policies and mechanisms. In [16], the authors discuss the issue of identity management in the cloud computing scenario. In this work, loss of control, lack of trust and multitenancy issues are identified as major problems in the present cloud computing model. The work mentioned in [17] proposes solution for access control using trust management and agent concept, that could be applied to distributed information systems. The present day cloud computing paradigm is highly dynamic and the trust values between various cooperating domains change from time to time. This dynamic aspects related to the security and access control in the cloud computing is not taken care of. In [18], the authors present a security agent-based approach for the authorization aspects in the distributed environment. In this work, the security agents are used to manage the privileges for the distributed authorization. This work also does not consider the dynamic nature of the access control. Distributed access control architecture based on the concept of distributed, active authorization 191

4 Manoj V. Thomas and Chandra Sekaran K. Figure 1. Agent-Based cloud broker architecture. entities is proposed in [19]. This also lacks the dynamic trust management and the security policy conflict management when various users in the organization access the cloud resources at the same time. 3. Agent-Based Cloud Broker Architecture for the Distributed Access Control In the light of the literature review carried out by us, we propose an architecture for the Agent-Based Cloud Broker (ABCB) for the distributed access control as shown in the Figure 1. The main components in the proposed model are: 1) Cloud Service Consumer (CSC) 2) Agent Based Cloud Broker (ABCB) 3) Cloud Service Provider (CSP) and 4) Identity Provider (IdP). 3.1 Cloud service consumer (CSC) Cloud Service Consumers are the entities requesting the resources or services from the Cloud Service Providers (CSPs). The CSCs need to be properly authenticated in order to ensure that unauthorized users do not access the services hosted by the CSPs. 3.2 Agent-based cloud broker (ABCB) The ABCB mediates the access requests initiated by the cloud consumers. The main modules of the Agent-Based Cloud Broker (ABCB) are: Trust provider (TP) In a multi-domain environment like cloud computing, the trust needs to be established between the cloud service provider and service consumers and also between the providers of various services and the identity providers. Trust Provider module calculates the dynamic trust value of the entity concerned (e.g. Service Provider), considering various parameters such as the past behavior and the history of previous transactions with the same service provider and also by considering the trust values or information of the entity from the Trusted Third Parties. 192

5 Agent-Based Cloud Broker Architecture for Distributed Access Control User profiling (UP) This module of the ABCB collects, processes and stores the details of the cloud users such as identity information, preferences, contact details etc. This information could be used by the agent for further interaction with other components in the system with minimal user-agent interaction or user interference Access request analyzer (ARA) This module handles the access control requirements generated as a result of the CSCs trying to access some service from the service provider. This module anlyses the request type, resource required etc. and communicates with the Task Identification module Tasks identification (TI) This module identifies tasks such as communicating with the Identity Provider, initiating the access request to the CSP chosen, mediating Identification, Authentication and Authorization with the CSP, on behalf of the user. This activity may take information stored internally (user s identification data or preferences) or from the outside environment (any feedback data from other agents or entities in the system) Identity provider selector (IdPS) The selection of a particular Identity Provider (IdP) among the available ones can be based on parameters such as: 1) the type of the service requested (like the provider details, its authentication and authorization mechanism) 2) also, the security and privacy concerns of the cloud user regarding the degree of disclosure of his identity credentials such as partial or full disclosure of the Pesonally Identifiable Information (PII) Learning, autonomy and workflow management (LAWM) This module helps the agent to improve its knowledge base, so that it can act with minimal interaction of the human users in mediating the access control requests. 3.3 Cloud service providers (CSPs) The Cloud Service Provider provides the required services or resources to the various requesting users. Before providing services, the users need to be authenticated and their access rights need to be verified so that illegal or unauthorized access can be avoided. The main modules of the Cloud Service Provider (CSP) are: Authentication (AuthN) This module involves verifying the identity of the requesting user by interacting with the Identity Provider using SAML assertions. The CSP can have many IdPs in its trusted domain. The CSP and the CSC agree on a particular IdP for interaction between them. 193

6 Manoj V. Thomas and Chandra Sekaran K Authorization (AuthZ) This module verifies the privileges of each requestor (CSC). Policy Decision Point (PDP) interacts with policy storage database stored locally with the CSP. PDP also interacts with the Policy Conflict Manager (PCM) module. PDP is to be implemented with break-glass mechanism to allow emergency cases of accessing the resources. The decision taken by the PDP is implemented by the Policy Enforcement Point (PEP) Policy conflict manager (PCM) Events of possible policy conflicts, arising out of the various access requirements made by different users in the organization at the same time, are handled by this module Identity provider selector (IdPS) The Identity Provider Selector module on the CSP selects the trusted IdPs in its domain. IdPS interacts with the Trust Provider module to get the current trust value of various IdPs Trust provider (TP) The Trust Provider module on the service provider side monitors the trust value of various service consumers based on factors such as the previous experience with the customers and the current reputation value collected from the Trusted Third Parties. This module also calculates the trust information concerned with the various Identity Providers. This trust calculation should be dynamic because the trust value can change from time to time. 3.4 Identity provider(idp) In service computing, a user or an organization may subscribe to services from multiple service providers. The organization can also integrate the individual services from various cloud service providers and provide the final combined service to its customers. The users in a cloud federation don t need to use separate credentials for each cloud service provider or service they subscribe to; instead, they can have the identity issued by the Identity Provider (Ping Identity, Symplified etc.). They can submit the security tokens (normally SAML assertions) issued by the identity provider, to the service providers in the cloud federation. This is both efficient and secure, and relieves the users of the multiple credentials problem when accessing services from multiple cloud service providers. 4. Workflow Model for the Agent-Based Cloud Broker Architecture The diagram showing the workflow for the distributed access control is given in the Figure 2. As shown in the figure above, the various steps performed by the ABCB and the CSPs in this workflow are: (i) The Cloud Service Consumer (CSC) wants to access the service hosted by the Cloud Service Provider (CSP), and the Agent-Based Cloud Broker (ABCB) mediates the access control request. 194

7 Agent-Based Cloud Broker Architecture for Distributed Access Control Figure 2. Workflow model for the distributed access control. (ii) The dynamic trust value of the CSP is calculated by the agent based on the previous transaction and the information provided by the Trusted Third Parities. (iii) The agent performs the access request analysis and the tasks to be performed are identified. (iv) The Cloud Service Provider (CSP) selects the IdPs by calculating the trust values of various IdPs, based on the previous history of interaction and, the trust or reputation value provided by other trusted entities. (v) The agent interacts with the CSP to decide the IdP based on the type of service request and the security preferences. (vi) Agent interacts with the IdP to get the security tokens (SAML assertions). (vii) Agent then interacts with the CSP using the tokens given by the IdP. (viii) CSP verifies the tokens submitted by the agent by interacting with the IdP. (ix) Authorization request is handled by the PEP and PDP. (x) PDP decides if that request could be granted, considering the various issues such as policy conflict management, dynamic trust management of the agent and the proper break-glass mechanism of granting privileges. (xi) If the request could be granted, the CSC is given access to the services requested, otherwise the access is denied. 5. Analysis and Results We have adopted the agent-based system for mediating the distributed access control in the cloud computing scenario, because of the salient features and advantages it offers. It is seen that the establishment of dynamic trust relationship between user domains and cloud domains, and between various cloud domains is an important issue to be considered for active research. Privacy protection in consumer cloud has potential for further research. Also based on the analysis done, we can see that most of the research works do not give proper solutions for solving policy conflict in the cloud scenario, which needs to be further explored. In addition to that, an effective break-glass mechanism should be incorporated in the authorization process to handle emergency access requirements 195

8 Manoj V. Thomas and Chandra Sekaran K. of cloud consumers. The agent-based architecture has enough potential for further research as far as a reliable and scalable access control mechanism in cloud computing is considered. 6. Conclusion In this paper, the issue of distributed access control is discussed and the various approaches, mentioning their advantages and drawbacks are analyzed. Distributed Access Control is an important issue in the domain of distributed applications. It is evident that, there is no single efficient solution for distributed access control meeting the needs of the present day distributed applications, which entails further research in this direction. In this paper, we have proposed agent-based cloud broker architecture for mediating the access requests of various cloud users in cloud computing, by considering the requirements of the present cloud computing paradigm. Also, the workflow model for the Agent-Based Distributed Access Control architecture proposed, is explained. A few open issues for further research in the areas of distributed access control are also discussed. References [1] Manvi, S. S. and Venkataram, P.: Applications of Agent Technology in Communications: A Review. Computer Communications, 27, (2004). [2] Danny B. Lange and Mitsuru Oshima: Dispatch Your Agents; Shut Off Your Machine. Communications of the ACM, 42(3), (1999). [3] Yonghe Wei, Chunjing Shi and Weiping Shao: An Attribute and Role Based Access Control Model for Service-Oriented Environment. In Chinese Control and Decision Conference, (2010). [4] Chang N. Zang and Cungang Yang: An Object-Oriented RBAC Model for Distributed System. In Working IEEE/IFIP Conference on Software Architecture, (2001). [5] Birget, J. C., Zou, X., Noubir, G. and Ramamurthy, B.: Hierarchy-Based Access Control in Distributed Environments. In IEEE International Conference on Communication, 1, (2001). [6] Cungang Yang and Chang N. Zhang: Designing Secure E-Commerce with Role-based Access Control. In IEEE International Conference on E-Commerce (CEC 03), /03, (2003). [7] Yuri Demchenko and Cees de Laat: Domain Based Access Control Model for Distributed Collaborative Applications. In Second IEEE International Conference on e-science and Grid Computing (2006). [8] Bo Lang, Zhibin Wang and Qingwen Wang: Trust Representation and Reasoning for Access Control in Large Scale Distributed Systems. In 2nd International Conference on Pervasive Computing and Applications, (2007). [9] Jin Wang, Daxing Li, Qiang Li and Bai Xi: Constructing Role-Based Access Control and Delegation Based on Hierarchical IBS. In IFIP International Conference on Network and Parallel Computing- Workshops, (2007). [10] Clara Bertolissi and Maribel Fernandez: An Algebraic-Functional Framework for Distributed Access Control. In Third International Conference on Risks and Security of Internet and Systems, 1 8 (2008). [11] Fujun Feng, Chuang Lin, Dongsheng Peng and Junshan Li: A Trust and Context Based Access Control Model for Distributed Systems. In 10th IEEE International Conference on High Performance Computing and Communications, (2008). [12] Chang Chaowen, Wang Yuqiao and Liu Chen: Analysis and Design of an Access Control Model Based on Credibility. In International Conference on Computer Engineering and Technology, (2009). [13] Lingli Zhao, Shuai Liu, Junsheng Li and Haicheng Xu: A Dynamic Access Control Model Based on Trust. In 2nd Conference on Environmental Science and Information Application Technology, (2010). [14] Faith Turkmen, Eunjin (EJ) Jung and Bruno Crispo: Towards Run-time Verification in Access Control. In IEEE International Symposium on Policies for Distributed Systems and Networks, (2011). 196

9 Agent-Based Cloud Broker Architecture for Distributed Access Control [15] Anil L. Pereira: RBAC for High Performance Computing Systems Integration in Grid Computing and Cloud Computing. In IEEE International Symposium on Parallel & Distributed Processing, (2011). [16] Kumar Gunjan, Sahoo, G. and Tiwari, R. K.: Identity Management in Cloud Computing-A Review. International Journal of Engineering Research and Technology (IJERT), ISSN: , 1(4) (2012). [17] Kagal, L., Finin, T. and Joshi, A.: Trust-Based Security in Pervasive Computing Environments, Computer 34.12, (2001). [18] Varadharajan, V., Kumar, N. and Mu, Y.: Security Agent Based Distributed Authorization: An Approach. In 21st National Information Systems Security Conference (NISSC), USA, (1998). [19] Antonopoulos, N., Koukoumpetsos, K. and Shafarenko, A.: Access Control for Agent-based Computing: A Distributed Approach, Internet Research, 11(1), (2001). 197

An Object Oriented Role-based Access Control Model for Secure Domain Environments

An Object Oriented Role-based Access Control Model for Secure Domain Environments International Journal of Network Security, Vol.4, No.1, PP.10 16, Jan. 2007 10 An Object Oriented -based Access Control Model for Secure Domain Environments Cungang Yang Department of Electrical and Computer

More information

ISSN: 2321-7782 (Online) Volume 3, Issue 3, March 2015 International Journal of Advance Research in Computer Science and Management Studies

ISSN: 2321-7782 (Online) Volume 3, Issue 3, March 2015 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) Volume 3, Issue 3, March 2015 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online

More information

Security Analysis of Cloud Computing: A Survey

Security Analysis of Cloud Computing: A Survey Security Analysis of Cloud Computing: A Survey Kamaljeet Pakhre 1, Navdeep Singh 2, Sanket Mani Tiwari 3 1,2,3 Research Scholar, M. Tech. (CSE), Galgotias University, Greater Noida, India. Abstract Now

More information

Towards Securing APIs in Cloud Computing

Towards Securing APIs in Cloud Computing Towards Securing APIs in Cloud Computing Kumar Gunjan #1, R. K. Tiwari *2, G. Sahoo #3 # Department of Information Technology, Birla Institute of Technology, Mesra Ranchi, India * RVS College of Engineering&

More information

Cloud Computing for Agent-based Traffic Management Systems

Cloud Computing for Agent-based Traffic Management Systems Cloud Computing for Agent-based Traffic Management Systems Manoj A Patil Asst.Prof. IT Dept. Khyamling A Parane Asst.Prof. CSE Dept. D. Rajesh Asst.Prof. IT Dept. ABSTRACT Increased traffic congestion

More information

Multi Tenancy Access Control Using Cloud Service in MVC

Multi Tenancy Access Control Using Cloud Service in MVC Multi Tenancy Access Control Using Cloud Service in MVC 1 Sonia Gupta, 2 Rubal Choudary Indo Global College of Engg, Abhipur, Mohali Abstract - Cloud Computing is the next generation Internet service and

More information

Chapter 2 Taxonomy and Classification of Access Control Models for Cloud Environments

Chapter 2 Taxonomy and Classification of Access Control Models for Cloud Environments Chapter 2 Taxonomy and Classification of Access Control Models for Cloud Environments Abhishek Majumder, Suyel Namasudra and Samir Nath Abstract Cloud computing is an emerging and highly attractive technology

More information

Evolution Feature Oriented Model Driven Product Line Engineering Approach for Synergistic and Dynamic Service Evolution in Clouds

Evolution Feature Oriented Model Driven Product Line Engineering Approach for Synergistic and Dynamic Service Evolution in Clouds Evolution Feature Oriented Model Driven Product Line Engineering Approach for Synergistic and Dynamic Service Evolution in Clouds Zhe Wang, Xiaodong Liu, Kevin Chalmers School of Computing Edinburgh Napier

More information

Kerberos SecureSingleSign-onAuthenticationProtocolFrameworkforCloudAccessControl

Kerberos SecureSingleSign-onAuthenticationProtocolFrameworkforCloudAccessControl Global Journal of Computer Science and Technology: B Cloud and Distributed Volume 14 Issue 1 Version 1.0 Year 2014 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

Access Control of Cloud Service Based on UCON

Access Control of Cloud Service Based on UCON Access Control of Cloud Service Based on UCON Chen Danwei, Huang Xiuli, and Ren Xunyi Nanjing University of posts & Telecommunications, New Model Street No.66, 210003, Nanjing, China chendw@njupt.edu.cn,

More information

Access Control Framework of Personal Cloud based on XACML

Access Control Framework of Personal Cloud based on XACML Access Control Framework of Personal Cloud based on XACML 1 Jun-Young Park, 2 Young-Rok Shin, 3 Kyoung-Hun Kim, 4 Eui-Nam Huh 1First Author, 2 Kyung Hee University, {parkhans, shinyr}@khu.ac.kr 3 Gangdong

More information

ADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS NETWORKS USING AGLETS

ADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS NETWORKS USING AGLETS ANNALS OF THE FACULTY OF ENGINEERING HUNEDOARA 2006, Tome IV, Fascicole 1, (ISSN 1584 2665) FACULTY OF ENGINEERING HUNEDOARA, 5, REVOLUTIEI, 331128, HUNEDOARA ADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS

More information

TCloud: A Dynamic Framework and Policies for Access Control across Multiple Domains in Cloud Computing

TCloud: A Dynamic Framework and Policies for Access Control across Multiple Domains in Cloud Computing TCloud: A Dynamic Framework and Policies for Access Control across Multiple Domains in Cloud Computing Sultan Ullah School of Computer and Communication Engineering University of Science and Technology

More information

Role Based Encryption with Efficient Access Control in Cloud Storage

Role Based Encryption with Efficient Access Control in Cloud Storage Role Based Encryption with Efficient Access Control in Cloud Storage G. V. Bandewar 1, R. H. Borhade 2 1 Department of Information Technology, Sinhgad Technical Education Society s SKNCOE, Pune, India

More information

Research and realization of Resource Cloud Encapsulation in Cloud Manufacturing

Research and realization of Resource Cloud Encapsulation in Cloud Manufacturing www.ijcsi.org 579 Research and realization of Resource Cloud Encapsulation in Cloud Manufacturing Zhang Ming 1, Hu Chunyang 2 1 Department of Teaching and Practicing, Guilin University of Electronic Technology

More information

Federated Access Control in Heterogeneous Intercloud Environment: Basic Models and Architecture Patterns

Federated Access Control in Heterogeneous Intercloud Environment: Basic Models and Architecture Patterns Federated Access Control in Heterogeneous Intercloud Environment: Basic Models and Architecture Patterns Craig Lee, The Aerospace Corporation On behalf of Yuri Demchenko, Craig Lee, Canh Ngo, Cees de Laat

More information

Moving from Security to Distributed Trust in Ubiquitous Computing Environments

Moving from Security to Distributed Trust in Ubiquitous Computing Environments Moving from Security to Distributed Trust in Ubiquitous Computing Environments Lalana Kagal, Tim Finin and Anupam Joshi University of Maryland Baltimore County email : lkagal1,finin,ajoshi@cs.umbc.edu

More information

N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD. R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 ABSTRACT

N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD. R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 ABSTRACT N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 1 M.Tech Student, Department of Computer Science and Engineering, S.R.M. University Chennai 2 Asst.Professor,

More information

A CROSS - DOMAIN ROLE MAPPING AND AUTHORIZATION FRAMEWORK FOR RBAC IN GRID SYSTEMS

A CROSS - DOMAIN ROLE MAPPING AND AUTHORIZATION FRAMEWORK FOR RBAC IN GRID SYSTEMS International Journal of Computer Science and Applications c 2009 Technomathematics Research Foundation Vol.6 No.1, pp. 1-12 A CROSS - DOMAIN ROLE MAPPING AND AUTHORIZATION FRAMEWORK FOR RBAC IN GRID SYSTEMS

More information

Implementing XML-based Role and Schema Migration Scheme for Clouds

Implementing XML-based Role and Schema Migration Scheme for Clouds Implementing XML-based Role and Schema Migration Scheme for Clouds Gurleen Kaur 1, Sarbjeet Singh 2 Computer Science and Engineering, UIET Panjab University, Chandigarh, India 1 gurleenturka@gmail.com

More information

CLOUD-HOSTED PROXY BASED COLLABORATION IN MULTI- CLOUD COMPUTING ENVIRONMENTS WITH ABAC METHODS

CLOUD-HOSTED PROXY BASED COLLABORATION IN MULTI- CLOUD COMPUTING ENVIRONMENTS WITH ABAC METHODS CLOUD-HOSTED PROXY BASED COLLABORATION IN MULTI- CLOUD COMPUTING ENVIRONMENTS WITH ABAC METHODS Shilpa G S 1, Maria Navin J R 2 1 PG Student, Dept. of Computer Science and Engineering, SVCE Bangalore,

More information

Research on Mobile Agent-based E-Commerce System Framework

Research on Mobile Agent-based E-Commerce System Framework 440 Research on Mobile -based E-Commerce System Framework Wenna Liu 1, Deli Yang 2 School of Management, Dalian University of Technology, Dalian 116024, China 1 wenal@sina.com, 2 somdyang@dlut.edu.cn ABSTRACT

More information

DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION

DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION Hasna.R 1, S.Sangeetha 2 1 PG Scholar, Dhanalakshmi Srinivasan College of Engineering, Coimbatore. 2 Assistant Professor, Dhanalakshmi Srinivasan

More information

Adding Federated Identity Management to OpenStack

Adding Federated Identity Management to OpenStack Adding Federated Identity Management to OpenStack David Chadwick University of Kent 3 December 2012 University of Kent 1 Some Definitions What is Identity? A whole set of attributes that in combination

More information

Keywords Distributed Computing, On Demand Resources, Cloud Computing, Virtualization, Server Consolidation, Load Balancing

Keywords Distributed Computing, On Demand Resources, Cloud Computing, Virtualization, Server Consolidation, Load Balancing Volume 5, Issue 1, January 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Survey on Load

More information

Author. Ginés Dólera Tormo. Advisors Dr. Félix Gómez Mármol (NEC Laboratories Europe) Prof. Dr. Gregorio Martínez Pérez (University of Murcia)

Author. Ginés Dólera Tormo. Advisors Dr. Félix Gómez Mármol (NEC Laboratories Europe) Prof. Dr. Gregorio Martínez Pérez (University of Murcia) Systems with Faculty of Computer Science ENHANCING USER CENTRIC IDENTITY MANAGEMENT SYSTEMS WITH REPUTATION MODELS IN DISTRIBUTED ENVIRONMENTS Author Advisors Dr. Félix Gómez Mármol (NEC Laboratories Europe)

More information

Manisha R. Patil. Keywords Cloud service provider, Identity Provider, Enhanced Client Profile, Identity Management, Privacy, Trust Manager.

Manisha R. Patil. Keywords Cloud service provider, Identity Provider, Enhanced Client Profile, Identity Management, Privacy, Trust Manager. Volume 4, Issue 7, July 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Privacy and Dynamic

More information

UPS battery remote monitoring system in cloud computing

UPS battery remote monitoring system in cloud computing , pp.11-15 http://dx.doi.org/10.14257/astl.2014.53.03 UPS battery remote monitoring system in cloud computing Shiwei Li, Haiying Wang, Qi Fan School of Automation, Harbin University of Science and Technology

More information

A TRUST BASED DELEGATION SYSTEM FOR MANAGING ACCESS CONTROL. Rainer Steffen, Rudi Knorr*

A TRUST BASED DELEGATION SYSTEM FOR MANAGING ACCESS CONTROL. Rainer Steffen, Rudi Knorr* A TRUST BASED DELEGATION SYSTEM FOR MANAGING ACCESS CONTROL Rainer Steffen, Rudi Knorr* Abstract Trust is considered to be a powerful approach for managing access control in pervasive computing scenarios.

More information

A Layered Signcryption Model for Secure Cloud System Communication

A Layered Signcryption Model for Secure Cloud System Communication Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.1086

More information

Evaluation of different Open Source Identity management Systems

Evaluation of different Open Source Identity management Systems Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems

More information

http://www.paper.edu.cn

http://www.paper.edu.cn 5 10 15 20 25 30 35 A platform for massive railway information data storage # SHAN Xu 1, WANG Genying 1, LIU Lin 2** (1. Key Laboratory of Communication and Information Systems, Beijing Municipal Commission

More information

A Quality Model for E-Learning as a Service in Cloud Computing Framework

A Quality Model for E-Learning as a Service in Cloud Computing Framework A Quality Model for E-Learning as a Service in Cloud Computing Framework Dr Rajni Jindal Professor, Department of IT Indira Gandhi Institute of Technology, New Delhi, INDIA rajnijindal@dce.ac.in Alka Singhal

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 3, March 3 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Using Third Party

More information

Analysis of Different Access Control Mechanism in Cloud

Analysis of Different Access Control Mechanism in Cloud Analysis of Different Access Control Mechanism in Cloud Punithasurya K Post Graduate Scholar Department of Information Technology Karunya University, India Jeba Priya S Lecturer Department of Information

More information

SECURE INFORMATION INTEGRATION WITH A SEMANTIC WEB-BASED FRAMEWORK

SECURE INFORMATION INTEGRATION WITH A SEMANTIC WEB-BASED FRAMEWORK SECURE INFORMATION INTEGRATION WITH A SEMANTIC WEB-BASED FRAMEWORK Pranav Parikh, Murat Kantarcioglu, Vaibhav Khadilkar, Bhavani Thuraisingham, Latifur Khan The University of Texas at Dallas Abstract In

More information

Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication

Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication Volume 4, Issue 6, June 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Three Layered

More information

Optimized Offloading Services in Cloud Computing Infrastructure

Optimized Offloading Services in Cloud Computing Infrastructure Optimized Offloading Services in Cloud Computing Infrastructure 1 Dasari Anil Kumar, 2 J.Srinivas Rao 1 Dept. of CSE, Nova College of Engineerng & Technology,Vijayawada,AP,India. 2 Professor, Nova College

More information

Effective Third Party Auditing in Cloud Computing

Effective Third Party Auditing in Cloud Computing 2014 28th International Conference on Advanced Information Networking and Applications Workshops Effective Third Party Auditing in Cloud Computing Mohammed Hussain and Mohamed Basel Al-Mourad Department

More information

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD Volume 1, Issue 7, PP:, JAN JUL 2015. SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD B ANNAPURNA 1*, G RAVI 2*, 1. II-M.Tech Student, MRCET 2. Assoc. Prof, Dept.

More information

Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.

Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption. Secure Privacy-Preserving Cloud Services. Abhaya Ghatkar, Reena Jadhav, Renju Georgekutty, Avriel William, Amita Jajoo DYPCOE, Akurdi, Pune ghatkar.abhaya@gmail.com, jadhavreena70@yahoo.com, renjug03@gmail.com,

More information

A Conceptual Technique for Modelling Security as a Service in Service Oriented Distributed Systems

A Conceptual Technique for Modelling Security as a Service in Service Oriented Distributed Systems Volume 1, Number 2, December 2014 JOURNAL OF COMPUTER SCIENCE AND SOFTWARE APPLICATION A Conceptual Technique for Modelling Security as a Service in Service Oriented Distributed Systems Satish Kumar*,

More information

Near Sheltered and Loyal storage Space Navigating in Cloud

Near Sheltered and Loyal storage Space Navigating in Cloud IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 8 (August. 2013), V2 PP 01-05 Near Sheltered and Loyal storage Space Navigating in Cloud N.Venkata Krishna, M.Venkata

More information

Glossary of Key Terms

Glossary of Key Terms and s Branch Glossary of Key Terms The terms and definitions listed in this glossary are used throughout the s Package to define key terms in the context of. Access Control Access The processes by which

More information

Dynamic Query Updation for User Authentication in cloud Environment

Dynamic Query Updation for User Authentication in cloud Environment Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,

More information

Offline Data Synchronization in Order Management System

Offline Data Synchronization in Order Management System Offline Data Synchronization in Order Management System Abstract: We live in an increasingly connected world. However, in many cases we cannot rely on connectivity 100 percent of the time. Your users may

More information

Research and Practice of DataRBAC-based Big Data Privacy Protection

Research and Practice of DataRBAC-based Big Data Privacy Protection Send Orders for Reprints to reprints@benthamscience.ae The Open Cybernetics & Systemics Journal, 2015, 9, 669-673 669 Open Access Research and Practice of DataRBAC-based Big Data Privacy Protection Huang

More information

Using Multi-Level Role Based Access Control for Wireless Classified Environments

Using Multi-Level Role Based Access Control for Wireless Classified Environments , October 19-21, 2011, San Francisco, USA Using Multi-Level Role Based Access Control for Wireless Classified Environments Daniel E. Burgner, Luay A. Wahsheh, Aftab Ahmad, Jonathan M. Graham, Cheryl V.

More information

ARM7 Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology

ARM7 Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology ARM7 Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology Khatmode Ranjit P 1, Kulkarni Ramchandra V 2, Ghodke Bharat S 3, Prof. P. P. Chitte 4, Prof. Anap S. D 5 1 Student

More information

IMPLEMENTATION OF NETWORK SECURITY MODEL IN CLOUD COMPUTING USING ENCRYPTION TECHNIQUE

IMPLEMENTATION OF NETWORK SECURITY MODEL IN CLOUD COMPUTING USING ENCRYPTION TECHNIQUE IMPLEMENTATION OF NETWORK SECURITY MODEL IN CLOUD COMPUTING USING ENCRYPTION TECHNIQUE 1 Rajesh L Gaikwad, 2 Dhananjay M Dakhane, 3 Ravindra L Pardhi M.E Student, Associate Professor, Assistant Professor,

More information

Secure Cloud Architecture for Preserving Privacy in Cloud Computing using OTPWTP

Secure Cloud Architecture for Preserving Privacy in Cloud Computing using OTPWTP Global Journal of Computer Science and Technology Cloud and Distributed Volume 13 Issue 3 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

Cross-Cloud Testing Strategies Over Cloud Computing

Cross-Cloud Testing Strategies Over Cloud Computing RESEARCH ARTICLE OPEN ACCESS Cross-Cloud Testing Strategies Over Cloud Computing Mr. Nageswararao, Dr. M B Khetmalas. Department of Bioinformatics and Computer Science, Dr. D.Y. Patil Biotechnology & Bioinformatics

More information

Cloud Information Accountability Framework for Auditing the Data Usage in Cloud Environment

Cloud Information Accountability Framework for Auditing the Data Usage in Cloud Environment International Journal of Computational Engineering Research Vol, 03 Issue, 11 Cloud Information Accountability Framework for Auditing the Data Usage in Cloud Environment D.Dhivya 1, S.CHINNADURAI 2 1,M.E.(Cse),

More information

A Flexible and Dynamic Failure Recovery Mechanism for Composite Web Services Using Subset Replacement

A Flexible and Dynamic Failure Recovery Mechanism for Composite Web Services Using Subset Replacement A Flexible and Dynamic Failure Recovery Mechanism for Composite Web Services Using Subset Replacement Shuchi Gupta 1, Prof. Praveen Bhanodia 2 1 Department of Computer Science & Engineering, Patel College

More information

A Control Method of Traffic Flow Based on Region Coordination

A Control Method of Traffic Flow Based on Region Coordination 3rd International Conference on Management, Education, Information and Control (MEICI 2015) A Control Method of Traffic Flow Based on Region Coordination Wuxiong Xu 1, a,*, Dong Zhong 1, b, Siqing Wu 1,

More information

Privacy-preserving Digital Identity Management for Cloud Computing

Privacy-preserving Digital Identity Management for Cloud Computing Privacy-preserving Digital Identity Management for Cloud Computing Elisa Bertino bertino@cs.purdue.edu Federica Paci paci@cs.purdue.edu Ning Shang nshang@cs.purdue.edu Rodolfo Ferrini rferrini@purdue.edu

More information

Institute for Cyber Security. A Multi-Tenant RBAC Model for Collaborative Cloud Services

Institute for Cyber Security. A Multi-Tenant RBAC Model for Collaborative Cloud Services Institute for Cyber Security A Multi-Tenant RBAC Model for Collaborative Cloud Services Bo Tang, Qi Li and Ravi Sandhu Presented by Bo Tang at The 11 th International Conference on Privacy, Security and

More information

An Efficient and Light weight Secure Framework for Applications of Cloud Environment using Identity Encryption Method

An Efficient and Light weight Secure Framework for Applications of Cloud Environment using Identity Encryption Method An Efficient and Light weight Secure Framework for Applications of Cloud Environment using Identity Encryption Method E.Sathiyamoorthy 1, S.S.Manivannan 2 1&2 School of Information Technology and Engineering

More information

A QoS-Aware Web Service Selection Based on Clustering

A QoS-Aware Web Service Selection Based on Clustering International Journal of Scientific and Research Publications, Volume 4, Issue 2, February 2014 1 A QoS-Aware Web Service Selection Based on Clustering R.Karthiban PG scholar, Computer Science and Engineering,

More information

Improving data integrity on cloud storage services

Improving data integrity on cloud storage services International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services

More information

AEIJST - June 2015 - Vol 3 - Issue 6 ISSN - 2348-6732. Cloud Broker. * Prasanna Kumar ** Shalini N M *** Sowmya R **** V Ashalatha

AEIJST - June 2015 - Vol 3 - Issue 6 ISSN - 2348-6732. Cloud Broker. * Prasanna Kumar ** Shalini N M *** Sowmya R **** V Ashalatha Abstract Cloud Broker * Prasanna Kumar ** Shalini N M *** Sowmya R **** V Ashalatha Dept of ISE, The National Institute of Engineering, Mysore, India Cloud computing is kinetically evolving areas which

More information

Access Control. ITS335: IT Security. Sirindhorn International Institute of Technology Thammasat University ITS335. Access Control.

Access Control. ITS335: IT Security. Sirindhorn International Institute of Technology Thammasat University ITS335. Access Control. ITS335: IT Security Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 10 October 2013 its335y13s2l04, Steve/Courses/2013/s2/its335/lectures/access.tex,

More information

A Delegation Framework for Federated Identity Management

A Delegation Framework for Federated Identity Management A Framework for Federated Identity Management Hidehito Gomi, Makoto Hatakeyama, Shigeru Hosono and Satoru Fujita NEC Internet Systems Research Laboratories 1753, Shimonumabe, Nakahara-Ku, Kawasaki, Kanagawa

More information

A Review of Cloud Environment and Recognition of Highly Secure Public Data Verification Architecture using Secure Public Verifier Auditor

A Review of Cloud Environment and Recognition of Highly Secure Public Data Verification Architecture using Secure Public Verifier Auditor I J C International Journal of lectrical, lectronics ISSN No. (Online): 2277-2626 and Computer ngineering 3(2): 144-148(2014) A Review of Cloud nvironment and Recognition of Highly Secure Public Data Verification

More information

Federation Proxy for Cross Domain Identity Federation

Federation Proxy for Cross Domain Identity Federation Proxy for Cross Domain Identity Makoto Hatakeyama NEC Corporation, Common Platform Software Res. Lab. 1753, Shimonumabe, Nakahara-Ku, Kawasaki, Kanagawa 211-8666, Japan +81-44-431-7663 m-hatake@ax.jp.nec.com

More information

A Security Integrated Data Storage Model for Cloud Environment

A Security Integrated Data Storage Model for Cloud Environment Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 8, August 2014,

More information

A Broker Based Trust Model for Cloud Computing Environment

A Broker Based Trust Model for Cloud Computing Environment A Broker Based Trust Model for Cloud Computing Environment Chaitali Uikey 1, Dr. D. S. Bhilare 2 1 School of Computer Science & IT, DAVV, Indore, MP. India 2 Computer Center, DAVV, Indore, MP. India Abstract

More information

CHAPTER - 3 WEB APPLICATION AND SECURITY

CHAPTER - 3 WEB APPLICATION AND SECURITY CHAPTER - 3 WEB APPLICATION AND SECURITY 3.1 Introduction Web application or Wepapp is the general term that is normally used to refer to all distributed web-based applications. According to the more technical

More information

Context-Aware Access Control for Pervasive Access to Process-Based Healthcare Systems

Context-Aware Access Control for Pervasive Access to Process-Based Healthcare Systems ehealth Beyond the Horizon Get IT There S.K. Andersen et al. (Eds.) IOS Press, 2008 2008 Organizing Committee of MIE 2008. All rights reserved. 679 Context-Aware Access Control for Pervasive Access to

More information

Setting deadlines and priorities to the tasks to improve energy efficiency in cloud computing

Setting deadlines and priorities to the tasks to improve energy efficiency in cloud computing Setting deadlines and priorities to the tasks to improve energy efficiency in cloud computing Problem description Cloud computing is a technology used more and more every day, requiring an important amount

More information

A STUDY OF THE BEHAVIOUR OF THE MOBILE AGENT IN THE NETWORK MANAGEMENT SYSTEMS

A STUDY OF THE BEHAVIOUR OF THE MOBILE AGENT IN THE NETWORK MANAGEMENT SYSTEMS A STUDY OF THE BEHAVIOUR OF THE MOBILE AGENT IN THE NETWORK MANAGEMENT SYSTEMS Tarag Fahad, Sufian Yousef & Caroline Strange School of Design and Communication Systems, Anglia Polytechnic University Victoria

More information

Decentralized Information Accountability Framework for Information Sharing In Cloud Environment

Decentralized Information Accountability Framework for Information Sharing In Cloud Environment Decentralized Information Accountability Framework for Information Sharing In Cloud Environment Deepthi Srinivas, Shylaja BR, Rajeev RK, Muruli R 1 BNM Institute of technology 2,3,4 Rai Technology University

More information

Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving,

Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving, Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Third Party

More information

IBM WebSphere Application Server

IBM WebSphere Application Server IBM WebSphere Application Server OAuth 2.0 service provider and TAI 2012 IBM Corporation This presentation describes support for OAuth 2.0 included in IBM WebSphere Application Server V7.0.0.25. WASV70025_OAuth20.ppt

More information

Privacy and Identity Management for Europe

Privacy and Identity Management for Europe Privacy and Identity Management for Europe Pierangela Samarati Università degli Studi di Milano Milan, Italy samarati@dti.unimi.it Page 1 Vision and Objectives Users disclose vast amounts of personal information

More information

Implementation of Role Based Access Control on Encrypted Data in Hybrid Cloud

Implementation of Role Based Access Control on Encrypted Data in Hybrid Cloud Implementation of Role Based Access Control on Encrypted Data in Hybrid Cloud Gajanan Ganorkar, Prof. A.B. Deshmukh, Prof M.D.Tambhakhe Information Technology Email:g.ganorkar7691@gmail.com Contact: 8600200142

More information

Secure Semantic Web Service Using SAML

Secure Semantic Web Service Using SAML Secure Semantic Web Service Using SAML JOO-YOUNG LEE and KI-YOUNG MOON Information Security Department Electronics and Telecommunications Research Institute 161 Gajeong-dong, Yuseong-gu, Daejeon KOREA

More information

OpenHRE Security Architecture. (DRAFT v0.5)

OpenHRE Security Architecture. (DRAFT v0.5) OpenHRE Security Architecture (DRAFT v0.5) Table of Contents Introduction -----------------------------------------------------------------------------------------------------------------------2 Assumptions----------------------------------------------------------------------------------------------------------------------2

More information

Enforcing Secure and Privacy-Preserving Information Brokering with Dynamic Load Balancing in Distributed Information Sharing.

Enforcing Secure and Privacy-Preserving Information Brokering with Dynamic Load Balancing in Distributed Information Sharing. Enforcing Secure and Privacy-Preserving Information Brokering with Dynamic Load Balancing in Distributed Information Sharing. 1 M.E. Computer Engineering Department GHRCEM, Wagholi, Pune. Jyotimore2283@gmail.com

More information

Data Mining Governance for Service Oriented Architecture

Data Mining Governance for Service Oriented Architecture Data Mining Governance for Service Oriented Architecture Ali Beklen Software Group IBM Turkey Istanbul, TURKEY alibek@tr.ibm.com Turgay Tugay Bilgin Dept. of Computer Engineering Maltepe University Istanbul,

More information

QoS Based Scheduling of Workflows in Cloud Computing UPnP Architecture

QoS Based Scheduling of Workflows in Cloud Computing UPnP Architecture QoS Based Scheduling of Workflows in Cloud Computing UPnP Architecture 1 K. Ramkumar Research Scholar Computer Science and Engineering Manonmaniam Sundaranar University Tirunelveli - 627012, Tamilnadu,

More information

FIPA agent based network distributed control system

FIPA agent based network distributed control system FIPA agent based network distributed control system V.Gyurjyan, D. Abbott, G. Heyes, E. Jastrzembski, C. Timmer, E. Wolin TJNAF, Newport News, VA 23606, USA A control system with the capabilities to combine

More information

Data Integrity and Dynamic Storage Way in Cloud Computing

Data Integrity and Dynamic Storage Way in Cloud Computing 1 Data Integrity and Dynamic Storage Way in Cloud Computing Dinesh.C, P.G Scholar, Computer Science and Engineering, Mailam Engineering College, Mailam, Tamilnadu. Abstract It is not an easy task to securely

More information

Attribute-Based Access Control. Stephen Schwab and Jay Jacobs. SPARTA ISSO Security Research Division (d.b.a. Cobham Analytic Solutions)

Attribute-Based Access Control. Stephen Schwab and Jay Jacobs. SPARTA ISSO Security Research Division (d.b.a. Cobham Analytic Solutions) March 18, 2010 Attribute-Based Access Control Stephen Schwab and Jay Jacobs SPARTA ISSO Security Research Division (d.b.a. Cobham Analytic Solutions) Topics ABAC Usage and Features RT 0 Credentials Delegation

More information

A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA

A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA Mr.Mahesh S.Giri Department of Computer Science & Engineering Technocrats Institute of Technology Bhopal, India

More information

ACaaS: Access Control as a Service for IaaS Cloud

ACaaS: Access Control as a Service for IaaS Cloud ACaaS: Access Control as a Service for IaaS Cloud Ruoyu Wu, Xinwen Zhang, Gail-Joon Ahn, Hadi Sharifi and Haiyong Xie Arizona State University, Tempe, AZ 85287, USA Email: {ruoyu.wu, gahn, hsharif1}@asu.edu

More information

Agent Based Negotiation using Cloud - an Approach in E-Commerce

Agent Based Negotiation using Cloud - an Approach in E-Commerce Agent Based Negotiation using Cloud - an Approach in E-Commerce Amruta More 1, Sheetal Vij 1, Debajyoti Mukhopadhyay 2, 1 Department of Computer Engineering, 2 Department of Information Technology, Maharashtra

More information

GENERIC SECURITY FRAMEWORK FOR CLOUD COMPUTING USING CRYPTONET

GENERIC SECURITY FRAMEWORK FOR CLOUD COMPUTING USING CRYPTONET http:// GENERIC SECURITY FRAMEWORK FOR CLOUD COMPUTING USING CRYPTONET Manisha Dawra 1, Ramdev Singh 2 1 Al-Falah School of Engg. & Tech., Vill-Dhauj, Ballabgarh-Sohna Road, Faridabad, Haryana (INDIA)-121004

More information

Cloud Database Storage Model by Using Key-as-a-Service (KaaS)

Cloud Database Storage Model by Using Key-as-a-Service (KaaS) www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 7 July 2015, Page No. 13284-13288 Cloud Database Storage Model by Using Key-as-a-Service (KaaS) J.Sivaiah

More information

Ensuring Security in Cloud with Multi-Level IDS and Log Management System

Ensuring Security in Cloud with Multi-Level IDS and Log Management System Ensuring Security in Cloud with Multi-Level IDS and Log Management System 1 Prema Jain, 2 Ashwin Kumar PG Scholar, Mangalore Institute of Technology & Engineering, Moodbidri, Karnataka1, Assistant Professor,

More information

Secure Role-Based Access Control on Encrypted Data in Cloud Storage using Raspberry PI

Secure Role-Based Access Control on Encrypted Data in Cloud Storage using Raspberry PI Volume: 2, Issue: 7, 20-27 July 2015 www.allsubjectjournal.com e-issn: 2349-4182 p-issn: 2349-5979 Impact Factor: 3.762 Miss Rohini Vidhate Savitribai Phule Pune University. Mr. V. D. Shinde Savitribai

More information

IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures

IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Introduction

More information

CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW

CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW 1 XINQIN GAO, 2 MINGSHUN YANG, 3 YONG LIU, 4 XIAOLI HOU School of Mechanical and Precision Instrument Engineering, Xi'an University

More information

An Agent-Based Concept for Problem Management Systems to Enhance Reliability

An Agent-Based Concept for Problem Management Systems to Enhance Reliability An Agent-Based Concept for Problem Management Systems to Enhance Reliability H. Wang, N. Jazdi, P. Goehner A defective component in an industrial automation system affects only a limited number of sub

More information

Development of Software As a Service Based GIS Cloud for Academic Institutes. Singh, Pushpraj 1 and Gupta, R. D. 2

Development of Software As a Service Based GIS Cloud for Academic Institutes. Singh, Pushpraj 1 and Gupta, R. D. 2 Development of Software As a Service Based GIS Cloud for Academic Institutes Singh, Pushpraj 1 and Gupta, R. D. 2 1 Student, M. Tech. (GIS & Remote Sensing); GIS Cell; Motilal Nehru National Institute

More information

Cloud Based E-Learning Platform Using Dynamic Chunk Size

Cloud Based E-Learning Platform Using Dynamic Chunk Size Cloud Based E-Learning Platform Using Dynamic Chunk Size Dinoop M.S #1, Durga.S*2 PG Scholar, Karunya University Assistant Professor, Karunya University Abstract: E-learning is a tool which has the potential

More information

Towards Distributed Service Platform for Extending Enterprise Applications to Mobile Computing Domain

Towards Distributed Service Platform for Extending Enterprise Applications to Mobile Computing Domain Towards Distributed Service Platform for Extending Enterprise Applications to Mobile Computing Domain Pakkala D., Sihvonen M., and Latvakoski J. VTT Technical Research Centre of Finland, Kaitoväylä 1,

More information

Selective dependable storage services for providing security in cloud computing

Selective dependable storage services for providing security in cloud computing Selective dependable storage services for providing security in cloud computing Gade Lakshmi Thirupatamma*1, M.Jayaram*2, R.Pitchaiah*3 M.Tech Scholar, Dept of CSE, UCET, Medikondur, Dist: Guntur, AP,

More information

Common Capabilities for Service Oriented Infrastructures In A Grid & Cloud Computing

Common Capabilities for Service Oriented Infrastructures In A Grid & Cloud Computing Common Capabilities for Service Oriented Infrastructures In A Grid & Cloud Computing Prof. R.T Nakhate Nagpur University DMIETR, Salod Wardha Prof. M. Sayankar Nagpur University BDCOE Sevagram, Wardha

More information