Optimized Multi-tenancy Secure mechanism in SPI Cloud Architecture

Size: px
Start display at page:

Download "Optimized Multi-tenancy Secure mechanism in SPI Cloud Architecture"

Transcription

1 Volume 1, No. 12, February 2013 ISSN The International Journal of Computer Science & Applications (TIJCSA) RESEARCH PAPER Available Online at Optimized Multi-tenancy Secure mechanism in SPI Cloud Architecture S.Bharanisethupandian 1, 1 Assistant Professor, Department of MCA, SOURASHTRA COLLEGE, Madurai, Tamilnadu, India 1 bharanisethupandian@yahoo.com Dr.M.Sumathi 2 2 Assistant Professor, Department of Computer Science, Sri Meenakshi Government College for Women, Madurai, Tamilnadu, India Abstract The era of digital media has made one of its most valuable computer concepts called "Cloud". This concept of computing makes the term Digital services work efficiently for its various computational tasks which it addresses as a whole. The computational process of cloud makes different services work on different platforms and finally address on unique solutions. The services of cloud were done with SPI architecture. In this paper we have proposed a mechanism that provides a secure firewall for every thin client services. The thin client services provided along with cloud deployable services were done along with API. We believe that such approach will provide secure and effective cloud services in SPI architecture through the thin client services. Keywords: Cloud Security, SPI architecture, Cloud model and services, Cloud API 1. Introduction The understanding of cloud and its services refers to the technology expertise that performs its various tasks over a network platform. A Cloud service [2][3] addresses both hardware and software which combines and provide valid information or required services in distributed approach. The cloud network can be broadly framed as private and public cloud. Both these approaches provide cloud computations depending on the type of services. This service can be either accessed locally or remotely. Hence cloud has its variety for addressing the same. Since cloud services can be provided either via hardware or software services, security level deployment can be on either of these two services. Nevertheless both these services address secure standards for effective cloud services. Fig 1 shows the cloud model where various users access the cloud for various services. 2013, - TIJCSA All Rights Reserved 11

2 Fig 1: Cloud deployable model A user can access cloud service for variety of services like storage, application and process etc. The cloud does the function for the user using cloud network services. The only way where a user can be authenticated is the cloud services entry phase. Only here a user should notify him for accessing cloud services. What all users need from the cloud, is the services where he can access the cloud services via thin client services. Thin client service is an individual user personal system that helps to get access cloud services. The interface between thin client and cloud repository where done with the assistance of interface/link. The interface has to provide user authentication to the cloud service. Further to the link established with the cloud, the thin client interface services are identified using API services. The technology evidence of cloud works on its routine and does prescribed function based on its services and deploy ability. This will overcome the traditional approaches used in many business organizations. Basically cloud infrastructure has two layer i.e. one layer posses the functionality of hardware and other is the software services. This model is quite different from traditional computing setup. The architecture services of cloud were deployed with SOA for its unique application services. The technology portion of cloud is addressed along with its information and was identified differently based on layer classification in cloud service model. Fig 2: Cloud Model Layer approach The functionality of cloud [1][2] were stimulated from various services. Every service is different in cloud. This addresses the concept of Multi-tenancy. One services can be used by more than a person in cloud architecture [3][5]. Then the services of cloud were shared consistently for all users. This concept adds efficiency to cloud since the services were shared, instead of deploying it to individual user. 2013, - TIJCSA All Rights Reserved 12

3 Multi-tenancy makes the services virtually available to the entire user and hence adds value to the cloud services. The Figure 3 shows the cloud shares three different services address different services for different users. Fig 3: Cloud shares three different services 2. Existing System The work of Miranda and Mowbary focuses on "A client based privacy manager for cloud computing" addresses the purpose of secure thin client architecture in effective cloud service. Further the work of Mather, T., Kumaraswamy, S., & Latif, S. (2009) influences the Cloud Security and Privacy dealing with third party security in cloud computing. Jinpeng Wei, Xiaolan Zhang, Glenn Ammons, VasanthBala and PengNing discusses on Managing security of virtual machine images in a cloud environment, November 2009 addressed on Virtualization in cloud computing. Transparent Cloud Protection System (TCPS) [10] identifies the protection system for early monitoring and reliability in cloud computing. All these work referred identify the security issues in cloud and also the other issues arise with the same. Our assumption is that security issues and its measures have to be deployed in the third party metrics not on the cloud architecture. This is due to the fact that cloud services were not transparent to client and clients were not given education for cloud services. 3. Proposed System Apart from the existing cloud model the proposed system address a deployed third party model enhanced with security measure for multi-tenancy problem. This model invokes self management strategy for addressing the current cloud security issues. Since the services of cloud were unnoticed and kept as secret for client, makes them hesitate to use cloud service. 3.1 Mapping cloud data 2013, - TIJCSA All Rights Reserved 13

4 The concept of mapping cloud was used now a day to address the secure flaws in cloud. This principle mechanism was deployed in the fourth model of cloud, apart from the existing SPI cloud architecture. The fourth model belongs to third party services. Via these services the secure mechanisms were deployed in to SPI architecture. SPI architecture provides the stack of secure service in cloud were traditional security mechanism are used to address the said problem. Fig 4: SPI and Secure cloud model Fig 4 address the third party cloud service for securing API. This type of model is available in all user location to ensure secure standards. The secure API is available in all user personalized location and was integrated via virtualization for sharing and deploying cloud services. Every user initiated services to cloud will be transferred via third party secured API using traditionally proven secure mechanism. This secure mechanism will invoke secure standard for every sent and received information services from Secure API to SPI cloud architecture to worth. The Secure services in cloud were invoked using secure API. This secure API was initiated via XML services. The code mentioned below invokes secure API for SaaS [3] <version xmlns=" xmlns:atom="h ttp:// id="v2.0" status="current" updated=" T11:33:21-06:00"> <media-types> <mediatype base="application/xml" type="application/vnd.openstack.identity+xml ;version=2.0"/> <mediatype base="application/json" type="application/vnd.openstack.identity+js on;version=2.0"/> </media-types> <atom:link rel="self" href=" > <atom:link rel="describedby" type="application/pdf" href=" cloudservice.com/auth/api/v2.0/auth-client-devguide-latest.pdf"/> <atom:link rel="describedby" type="application/vnd.sun.wadl+xml" href="h ttp://docs. cloudservice.com/auth/api/v2.0/auth.wadl"/> </version> 2013, - TIJCSA All Rights Reserved 14

5 This secure API works for SaaS services. Likewise different API was invoked on other services of PaaS and IaaS. Fig 5 shows data flow sequence carrying client data to SPI architecture via secure API Fig 5: Data flow from Client to SPI with encryption standards Here the encryption standards were provided by third party vendor like VeriSign to ensure secure transmission between clients to SPI [3]. Fig 6: Data flow from SPI to Client with decryption standards This mechanism will work for various users based on their services initiated to cloud services. Implementing security in API [6] [7] is done using traditional security algorithm like elliptical curve for providing effective and efficient services in cloud. 5. Conclusion and Future work In this work we have identified few API for all the three models of cloud. This API addresses the security issues in cloud and also for the effective cloud performance. The purpose of secure API is to invoke mapping services to the deployed Secure API and then to the client. This functionality will be reversed in due course. The future work will address a unique Secure API which will identify the potential instinct of all three models and its features. We believe that such approach will invoke efficient secure mechanism for sure. Reference [1] Mather, T., Kumaraswamy, S., & Latif, S. (2009). Cloud Security and Privacy. New York: O Reilly [2] Dinoor S (2010) Got Privilege? Ten Steps to Securing a Cloud-Based Enterprise. [3] Security and Economic Benefits of standardization for security as a service. September 2011 proceedings. [4] Cloud security Alliance, Defined Categories of service [5] A guide to security metrics. SANS Institute, June [6] Amazon Elastic Compute Cloud Developer Guide, [7] Amazon web services blog: Introducing amazon virtual private cloud (vpc), Amazon, August [8] CVSS A Complete Guide to the Common Vulnerability Scoring System, Version 2.0, 2007 [9] WeichaoWang,Zhiwei Li, Rodney Owens and Bharat Bhargava, Secure and Efficient Access to Outsourced Data, November 2009, Proceedings of the ACM workshop on Cloud computing security, pages [10] Flavio Lombardi and Roberto Di Pietro, Transparent Security for Cloud, March 2010, Proceedings of the 2010 ACM Symposium on Applied Computing, pages , - TIJCSA All Rights Reserved 15

http://www.cisjournal.org Security Framework for Cloud Computing Environment: A Review Ayesha Malik, Muhammad Mohsin Nazir

http://www.cisjournal.org Security Framework for Cloud Computing Environment: A Review Ayesha Malik, Muhammad Mohsin Nazir Security Framework for Cloud Computing Environment: A Review Ayesha Malik, Muhammad Mohsin Nazir Department of Computer Science Lahore College for Women University, Lahore, Pakistan. ayesha_sadaqat@yahoo.com,

More information

Study of Security Issues in Cloud Computing

Study of Security Issues in Cloud Computing Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.230

More information

Filling the consistency and reliability gap in elastic cloud an IaaS approach

Filling the consistency and reliability gap in elastic cloud an IaaS approach International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 10, Issue 2 (February 2014), PP. 16-21 Filling the consistency and reliability gap

More information

Security Issues in Cloud Computing

Security Issues in Cloud Computing Security Issues in Cloud Computing Dr. A. Askarunisa Professor and Head Vickram College of Engineering, Madurai, Tamilnadu, India N.Ganesh Sr.Lecturer Vickram College of Engineering, Madurai, Tamilnadu,

More information

Cloud Computing Security Issues And Methods to Overcome

Cloud Computing Security Issues And Methods to Overcome Cloud Computing Security Issues And Methods to Overcome Manas M N 1, Nagalakshmi C K 2, Shobha G 3 MTech, Computer Science & Engineering, RVCE, Bangalore, India 1,2 Professor & HOD, Computer Science &

More information

International Journal of Engineering Research & Management Technology

International Journal of Engineering Research & Management Technology International Journal of Engineering Research & Management Technology Cloud Security Issues, Challenges And Their Optimal Solutions Vinay Kumar Pant M.Tech. (CSE) Subharti Institute of Technology and Engineering

More information

Security Issues in Cloud Computing

Security Issues in Cloud Computing Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources

More information

INCREASING THE CLOUD PERFORMANCE WITH LOCAL AUTHENTICATION

INCREASING THE CLOUD PERFORMANCE WITH LOCAL AUTHENTICATION INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 INCREASING THE CLOUD PERFORMANCE WITH LOCAL AUTHENTICATION Sanjay Razdan Department of Computer Science and Eng. Mewar

More information

A Study of Infrastructure Clouds

A Study of Infrastructure Clouds A Study of Infrastructure Clouds Pothamsetty Nagaraju 1, K.R.R.M.Rao 2 1 Pursuing M.Tech(CSE), Nalanda Institute of Engineering & Technology,Siddharth Nagar, Sattenapalli, Guntur., Affiliated to JNTUK,

More information

SECURE CLOUD COMPUTING

SECURE CLOUD COMPUTING Outline SECURE CLOUD COMPUTING Introduction (of many buzz words) References What is Cloud Computing Cloud Computing Infrastructure Security Cloud Storage and Data Security Identity Management in the Cloud

More information

Cloud Infrastructure Security

Cloud Infrastructure Security Cloud Infrastructure Security Dimiter Velev 1 and Plamena Zlateva 2 1 University of National and World Economy, UNSS - Studentski grad, 1700 Sofia, Bulgaria dvelev@unwe.acad.bg 2 Institute of Control and

More information

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer

More information

Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao Guocui.gao@tufts.

Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao Guocui.gao@tufts. Tufts University Department of Computer Science COMP 116 Introduction to Computer Security Fall 2014 Final Project Investigating Security Issues in Cloud Computing Guocui Gao Guocui.gao@tufts.edu Mentor:

More information

Cloud Database Storage Model by Using Key-as-a-Service (KaaS)

Cloud Database Storage Model by Using Key-as-a-Service (KaaS) www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 7 July 2015, Page No. 13284-13288 Cloud Database Storage Model by Using Key-as-a-Service (KaaS) J.Sivaiah

More information

Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication

Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication Volume 4, Issue 6, June 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Three Layered

More information

Implementing XML-based Role and Schema Migration Scheme for Clouds

Implementing XML-based Role and Schema Migration Scheme for Clouds Implementing XML-based Role and Schema Migration Scheme for Clouds Gurleen Kaur 1, Sarbjeet Singh 2 Computer Science and Engineering, UIET Panjab University, Chandigarh, India 1 gurleenturka@gmail.com

More information

ISSN: 2321-7782 (Online) Volume 2, Issue 5, May 2014 International Journal of Advance Research in Computer Science and Management Studies

ISSN: 2321-7782 (Online) Volume 2, Issue 5, May 2014 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) Volume 2, Issue 5, May 2014 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com Analogous

More information

A Quality Model for E-Learning as a Service in Cloud Computing Framework

A Quality Model for E-Learning as a Service in Cloud Computing Framework A Quality Model for E-Learning as a Service in Cloud Computing Framework Dr Rajni Jindal Professor, Department of IT Indira Gandhi Institute of Technology, New Delhi, INDIA rajnijindal@dce.ac.in Alka Singhal

More information

A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments

A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining

More information

Keyword: Cloud computing, service model, deployment model, network layer security.

Keyword: Cloud computing, service model, deployment model, network layer security. Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging

More information

An Intelligent Approach for Data Fortification in Cloud Computing

An Intelligent Approach for Data Fortification in Cloud Computing An Intelligent Approach for Data Fortification in Cloud Computing Supriya Mandhare 1, Prof. A. K. Sen 2, Asso. Prof. Rajkumar Shende 3 1,3 Department of Computer Engineering, St. Francis Institute of Technology,

More information

Security Issues In Cloud Computing and Countermeasures

Security Issues In Cloud Computing and Countermeasures Security Issues In Cloud Computing and Countermeasures Shipra Dubey 1, Suman Bhajia 2 and Deepika Trivedi 3 1 Department of Computer Science, Banasthali University, Jaipur, Rajasthan / India 2 Department

More information

[Sudhagar*, 5(5): May, 2016] ISSN: 2277-9655 Impact Factor: 3.785

[Sudhagar*, 5(5): May, 2016] ISSN: 2277-9655 Impact Factor: 3.785 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY AVOID DATA MINING BASED ATTACKS IN RAIN-CLOUD D.Sudhagar * * Assistant Professor, Department of Information Technology, Jerusalem

More information

A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing

A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing International Journal of Emerging Engineering Research and Technology Volume 3, Issue 5, May 2015, PP 1-7 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) A Survey on Security Issues and Security Schemes

More information

Cloud Computing. Karan Saxena * & Kritika Agarwal**

Cloud Computing. Karan Saxena * & Kritika Agarwal** Page29 Cloud Computing Karan Saxena * & Kritika Agarwal** *Student, Sir M. Visvesvaraya Institute of Technology **Student, Dayananda Sagar College of Engineering ABSTRACT: This document contains basic

More information

Cloud Computing, and REST-based Architectures Reid Holmes

Cloud Computing, and REST-based Architectures Reid Holmes Material and some slide content from: - Software Architecture: Foundations, Theory, and Practice - Krzysztof Czarnecki Cloud Computing, and REST-based Architectures Reid Holmes Cloud precursors Grid Computing:

More information

A Review of Cloud Environment and Recognition of Highly Secure Public Data Verification Architecture using Secure Public Verifier Auditor

A Review of Cloud Environment and Recognition of Highly Secure Public Data Verification Architecture using Secure Public Verifier Auditor I J C International Journal of lectrical, lectronics ISSN No. (Online): 2277-2626 and Computer ngineering 3(2): 144-148(2014) A Review of Cloud nvironment and Recognition of Highly Secure Public Data Verification

More information

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master Securing The Cloud Foundational Best Practices For Securing Cloud Computing Scott Clark Agenda Introduction to Cloud Computing What is Different in the Cloud? CSA Guidance Additional Resources 2 What is

More information

in the figure below. Index Terms Cloud Computing, SaaS, Load Balancing.

in the figure below. Index Terms Cloud Computing, SaaS, Load Balancing. Concept of VPN on Cloud Computing for Elasticity by Simple Load Balancing Technique Priyanka Gupta, Ashok Verma Abstract Cloud computing has been under the glare as an emerging IT trend in the federal

More information

Cloud Computing Services and its Application

Cloud Computing Services and its Application Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 1 (2014), pp. 107-112 Research India Publications http://www.ripublication.com/aeee.htm Cloud Computing Services and its

More information

EXIN Cloud Computing Foundation

EXIN Cloud Computing Foundation Sample Questions EXIN Cloud Computing Foundation Edition April 2013 Copyright 2013 EXIN All rights reserved. No part of this publication may be published, reproduced, copied or stored in a data processing

More information

Verifying Correctness of Trusted data in Clouds

Verifying Correctness of Trusted data in Clouds Volume-3, Issue-6, December-2013, ISSN No.: 2250-0758 International Journal of Engineering and Management Research Available at: www.ijemr.net Page Number: 21-25 Verifying Correctness of Trusted data in

More information

A Proposed Secure Framework for Safe Data Transmission in Private Cloud

A Proposed Secure Framework for Safe Data Transmission in Private Cloud A Proposed Secure Framework for Safe Data Transmission in Private Cloud Rohit Maheshwari, Sunil Pathak Abstract Cloud security is the current discussion in the IT world. In the cloud, the data is transferred

More information

Cloud Computing. Course: Designing and Implementing Service Oriented Business Processes

Cloud Computing. Course: Designing and Implementing Service Oriented Business Processes Cloud Computing Supplementary slides Course: Designing and Implementing Service Oriented Business Processes 1 Introduction Cloud computing represents a new way, in some cases a more cost effective way,

More information

THE BLUENOSE SECURITY FRAMEWORK

THE BLUENOSE SECURITY FRAMEWORK THE BLUENOSE SECURITY FRAMEWORK Bluenose Analytics, Inc. All rights reserved TABLE OF CONTENTS Bluenose Analytics, Inc. Security Whitepaper ISO 27001/27002 / 1 The Four Pillars of Our Security Program

More information

Third Party Cloud Services Its Adoption in the New Age

Third Party Cloud Services Its Adoption in the New Age Solutions for higher performance! Third Party Cloud Services Its Adoption in the New Age 1 Introduction Cloud computing is the delivery of computing services over the Internet. Cloud services allow individuals

More information

Cloud Security Through Threat Modeling. Robert M. Zigweid Director of Services for IOActive

Cloud Security Through Threat Modeling. Robert M. Zigweid Director of Services for IOActive Cloud Security Through Threat Modeling Robert M. Zigweid Director of Services for IOActive 1 Key Points Introduction Threat Model Primer Assessing Threats Mitigating Threats Sample Threat Model Exercise

More information

Cloud Courses Description

Cloud Courses Description Courses Description 101: Fundamental Computing and Architecture Computing Concepts and Models. Data center architecture. Fundamental Architecture. Virtualization Basics. platforms: IaaS, PaaS, SaaS. deployment

More information

FACING SECURITY CHALLENGES

FACING SECURITY CHALLENGES 24 July 2013 TimeTec Cloud Security FACING SECURITY CHALLENGES HEAD-ON - by Mr. Daryl Choo, Chief Information Officer, FingerTec HQ Cloud usage and trend Cloud Computing is getting more common nowadays

More information

What is Cloud Computing? Tackling the Challenges of Big Data. Tackling The Challenges of Big Data. Matei Zaharia. Matei Zaharia. Big Data Collection

What is Cloud Computing? Tackling the Challenges of Big Data. Tackling The Challenges of Big Data. Matei Zaharia. Matei Zaharia. Big Data Collection Introduction What is Cloud Computing? Cloud computing means computing resources available on demand Resources can include storage, compute cycles, or software built on top (e.g. database as a service)

More information

REVIEW OF CLOUD TESTING, TYPES, CHALLENGES AND FUTURE SCOPE

REVIEW OF CLOUD TESTING, TYPES, CHALLENGES AND FUTURE SCOPE http:// REVIEW OF CLOUD TESTING, TYPES, CHALLENGES AND FUTURE SCOPE 1 Bhumika Maurya, 2 Chandraprabha and 3 Rashmi Patil 1,2 Research Scholar, SRMS CET, Bareilly. (India) 3 Assistant Professor, SRMS CET,

More information

Public Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.

Public Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc. Public Clouds Krishnan Subramanian Analyst & Researcher Krishworld.com A whitepaper sponsored by Trend Micro Inc. Introduction Public clouds are the latest evolution of computing, offering tremendous value

More information

Fig. 1 A model of cloud computing

Fig. 1 A model of cloud computing A Study of Cloud Computing Rafiqul Zaman Khan Department of Computer Science, AMU Md Firoj ALi Department of Computer Science, AMU Abstract Cloud computing has become the most attracting field of computing

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 1, Jan-Feb 2015

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 1, Jan-Feb 2015 RESEARCH ARTICLE OPEN ACCESS A Survey on Cloud Computing Security and Solutions N. Sugavaneswaran, D.Saravanan Assistant Professor Department of Computer Science Srimad Andavan Arts and Science College

More information

The Private Cloud Your Controlled Access Infrastructure

The Private Cloud Your Controlled Access Infrastructure White Paper: Private Clouds The ongoing debate on the differences between a Public and Private Cloud are broad and often loud. The bottom line is that it s really about how the resource, or computing power,

More information

Cloud Computing. Cloud computing:

Cloud Computing. Cloud computing: Cloud computing: Cloud Computing A model of data processing in which high scalability IT solutions are delivered to multiple users: as a service, on a mass scale, on the Internet. Network services offering:

More information

Data Storage Security in Cloud Computing

Data Storage Security in Cloud Computing Data Storage Security in Cloud Computing Prashant M. Patil Asst. Professor. ASM s, Institute of Management & Computer Studies (IMCOST), Thane (w), India E_mail: prashantpatil11@rediffmail.com ABSTRACT

More information

CLOUD COMPUTING IN HIGHER EDUCATION

CLOUD COMPUTING IN HIGHER EDUCATION Mr Dinesh G Umale Saraswati College,Shegaon (Department of MCA) CLOUD COMPUTING IN HIGHER EDUCATION Abstract Technology has grown rapidly with scientific advancement over the world in recent decades. Therefore,

More information

Application Based Access Control on Cloud Networks for Data Security

Application Based Access Control on Cloud Networks for Data Security Application Based Access Control on Cloud Networks for Data Security Ms. Smitha P M.Tech in DCN, Department of ECE GSSSIETW, Mysuru Karnataka, India Smitha.21sn @gmail.com Mrs. Manjula G Associate. Proffesor,

More information

Cloud Storage: Where Does It Fit Into Tomorrow s IT?

Cloud Storage: Where Does It Fit Into Tomorrow s IT? Cloud Storage: Where Does It Fit Into Tomorrow s IT? Vincent Franceschini CTO Distributed Data Storage Solutions Hitachi Data Systems Corporation Vincent.Franceschini@hds.com Constant, increasing reliance

More information

Dynamic Query Updation for User Authentication in cloud Environment

Dynamic Query Updation for User Authentication in cloud Environment Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,

More information

CLOUD COMPUTING SOLUTION - BENEFITS AND TESTING CHALLENGES

CLOUD COMPUTING SOLUTION - BENEFITS AND TESTING CHALLENGES CLOUD COMPUTING SOLUTION - BENEFITS AND TESTING CHALLENGES PRAKASH.V, GOPALAKRISHANAN.S Assistant Professor Department of Computer Applications, SASTRA University Associate Dean Department of Computer

More information

Cloud Computing Security

Cloud Computing Security 14 International Journal of Ambient Computing and Intelligence, 3(1), 14-19, January-March 2011 Cloud Computing Security Sean Carlin, University of Ulster, UK Kevin Curran, University of Ulster, UK ABSTRACT

More information

Secure Cloud Based Document Management System

Secure Cloud Based Document Management System Secure Cloud Based Document Management System Varsha Jawale Vedashri Jundre Reshma Bathe Pimpri Chinchwad College Of Engineering, Nigdi-44 Abstract 1. Introduction The transition towards paperless offices

More information

Requirements and Challenges for Securing Cloud Applications and Services

Requirements and Challenges for Securing Cloud Applications and Services IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661 Volume 4, Issue 2 (Sep.-Oct. 2012), PP 46-52 Requirements and Challenges for Securing Cloud Applications and Services Mrs. Y. Lakshmi Prasanna

More information

Commercial Software Licensing

Commercial Software Licensing Commercial Software Licensing CHAPTER 12: Prepared by DoD ESI January 2013 Chapter Overview Most software licenses today are either perpetual or subscription. Perpetual licenses involve software possession

More information

Services of Cloud Computing Kanusu Srinivasa Rao 2 Assistant Professor Department of MCA Yogi Vemana University Kadapa, AP India

Services of Cloud Computing Kanusu Srinivasa Rao 2 Assistant Professor Department of MCA Yogi Vemana University Kadapa, AP India Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com Ratna Kumari

More information

Implications for Cloud Computing & Data Privacy

Implications for Cloud Computing & Data Privacy Implications for Cloud Computing & Data Privacy Diane Mueller Cloud Evangelist, ActiveState dianem@activestate.com http://www.activestate.com/stackato Founded 1997 2 million developers, 97% of Fortune

More information

(C) Global Journal of Engineering Science and Research Management

(C) Global Journal of Engineering Science and Research Management DEPENDABLE STORAGE FOR VEHICLE INSURANCE MANAGEMENT THROUGH SECURED ENCRYPTION IN CLOUD COMPUTING Prof.Abhijeet A.Chincholkar *1, Ms.Najuka Todekar 2 *1 M.E. Digital Electronics, JCOET Yavatmal, India.

More information

Fundamental Concepts and Models

Fundamental Concepts and Models Chapter 4: Fundamental Concepts and Models Nora Almezeini MIS Department, CBA, KSU From Cloud Computing by Thomas Erl, Zaigham Mahmood, and Ricardo Puttini(ISBN: 0133387526) Copyright 2013 Arcitura Education,

More information

Building Blocks of the Private Cloud

Building Blocks of the Private Cloud www.cloudtp.com Building Blocks of the Private Cloud Private clouds are exactly what they sound like. Your own instance of SaaS, PaaS, or IaaS that exists in your own data center, all tucked away, protected

More information

Secure Cloud Service Management and its Resource Utilization of Server Using Volunteer Computing

Secure Cloud Service Management and its Resource Utilization of Server Using Volunteer Computing Secure Cloud Service Management and its Resource Utilization of Server Using Volunteer Computing Nirupadi Tidigol, Thrilochana Kumara Y.P, T.P.Lokesh, nirupadi.tidigol@gmail.com thrilochankumaryp@gmail.com

More information

A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services

A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services Ronnie D. Caytiles and Byungjoo Park * Department of Multimedia Engineering, Hannam University

More information

Performance Gathering and Implementing Portability on Cloud Storage Data

Performance Gathering and Implementing Portability on Cloud Storage Data International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 17 (2014), pp. 1815-1823 International Research Publications House http://www. irphouse.com Performance Gathering

More information

Software as a Service (SaaS) Testing Challenges- An Indepth

Software as a Service (SaaS) Testing Challenges- An Indepth www.ijcsi.org 506 Software as a Service (SaaS) Testing Challenges- An Indepth Analysis Prakash.V Ravikumar Ramadoss Gopalakrishnan.S Assistant Professor Department of Computer Applications, SASTRA University,

More information

International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 Software as a Model for Security in Cloud over Virtual Environments S.Vengadesan, B.Muthulakshmi PG Student,

More information

See Appendix A for the complete definition which includes the five essential characteristics, three service models, and four deployment models.

See Appendix A for the complete definition which includes the five essential characteristics, three service models, and four deployment models. Cloud Strategy Information Systems and Technology Bruce Campbell What is the Cloud? From http://csrc.nist.gov/publications/nistpubs/800-145/sp800-145.pdf Cloud computing is a model for enabling ubiquitous,

More information

A Secure Authenticate Framework for Cloud Computing Environment

A Secure Authenticate Framework for Cloud Computing Environment A Secure Authenticate Framework for Cloud Computing Environment Nitin Nagar 1, Pradeep k. Jatav 2 Abstract Cloud computing has an important aspect for the companies to build and deploy their infrastructure

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK REVIEW ON MOBILE APPLICATION IN A CLOUD COMPUTING SECURE AND SCALABLE USING CLOUD

More information

A Survey on Cloud Security Issues and Techniques

A Survey on Cloud Security Issues and Techniques A Survey on Cloud Security Issues and Techniques Garima Gupta 1, P.R.Laxmi 2 and Shubhanjali Sharma 3 1 Department of Computer Engineering, Government Engineering College, Ajmer Guptagarima09@gmail.com

More information

Cloud Computing in a Regulated Environment

Cloud Computing in a Regulated Environment Computing in a Regulated Environment White Paper by David Stephenson CTG Regulatory Compliance Subject Matter Expert February 2014 CTG (UK) Limited, 11 Beacontree Plaza, Gillette Way, READING, Berks RG2

More information

Cloud Infrastructure Pattern

Cloud Infrastructure Pattern 1 st LACCEI International Symposium on Software Architecture and Patterns (LACCEI-ISAP-MiniPLoP 2012), July 23-27, 2012, Panama City, Panama. Cloud Infrastructure Pattern Keiko Hashizume Florida Atlantic

More information

Security Issues in Cloud Computing

Security Issues in Cloud Computing 200 Chapter 14 Security Issues in Cloud Computing Kevin Curran University of Ulster, Northern Ireland Sean Carlin University of Ulster, Northern Ireland Mervyn Adams University of Ulster, Northern Ireland

More information

Certified Cloud Computing Professional Sample Material

Certified Cloud Computing Professional Sample Material Certified Cloud Computing Professional Sample Material 1. INTRODUCTION Let us get flashback of few years back. Suppose you have some important files in a system at home but, you are away from your home.

More information

Intrusion Detection from Simple to Cloud

Intrusion Detection from Simple to Cloud Intrusion Detection from Simple to Cloud ICTN 6865 601 December 7, 2015 Abstract Intrusion detection was used to detect security vulnerabilities for a long time. The methods used in intrusion detection

More information

Securing Your Data In The Cloud: an insiders perspective

Securing Your Data In The Cloud: an insiders perspective Securing Your Data In The Cloud: an insiders perspective INTRODUCTION As the increasing use of cloud computing and other technologies is changing the world of data management, keeping your data private

More information

Subash Krishnaswamy Applications Software Technology Corporation

Subash Krishnaswamy Applications Software Technology Corporation Oracle Applications and Cloud Computing - Future Direction Subash Krishnaswamy Applications Software Technology Corporation Agenda Introduction ti to CLOUD Oracle Corporation and CLOUD Oracle Applications

More information

A Cloud Service Measure Index Framework to Evaluate Efficient Candidate with Ranked Technology

A Cloud Service Measure Index Framework to Evaluate Efficient Candidate with Ranked Technology A Cloud Service Measure Index Framework to Evaluate Efficient Candidate with Ranked Technology Shruthi Shirur 1, Annappa Swamy D. R. 2 1 M. Tech, CSE Department, Mangalore Institute of Technology & Engineering

More information

Cloud Computing in Medical Diagnosis for improving Health Care Environment

Cloud Computing in Medical Diagnosis for improving Health Care Environment Cloud Computing in Medical Diagnosis for improving Health Care Environment Dr.V.Jeyabalaraja 1,Dr.M.S.Josephine 2 1 Professor, Velammal Engineering College, 2 Professor, Dr.MGR University, jeyabalaraja@gmail.com,

More information

Topics. Images courtesy of Majd F. Sakr or from Wikipedia unless otherwise noted.

Topics. Images courtesy of Majd F. Sakr or from Wikipedia unless otherwise noted. Cloud Computing Topics 1. What is the Cloud? 2. What is Cloud Computing? 3. Cloud Service Architectures 4. History of Cloud Computing 5. Advantages of Cloud Computing 6. Disadvantages of Cloud Computing

More information

How To Understand Cloud Computing

How To Understand Cloud Computing Virtualizing the Private Cloud for Maximum Resource Utilization C.Shreeharsha, Prof.ManasiKulkarni Computer Engineering Department, VJTI, Matunga, Mumbai, India, E-mail:harshagzb89@gmail.com. Abstract

More information

Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS

Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS Char Sample Security Engineer, Carnegie Mellon University CERT Information Security Decisions TechTarget Disclaimer Standard Disclaimer - This talk

More information

Keywords Cloud Environment, Cloud Testing, Software Testing

Keywords Cloud Environment, Cloud Testing, Software Testing Volume 4, Issue 6, June 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Software Testing

More information

Cloud Service Rollout. Chapter 9

Cloud Service Rollout. Chapter 9 Cloud Service Rollout Chapter 9 Cloud Service Topics Cloud service rollout plans vary depending on the type of cloud service SaaS, PaaS, or IaaS and the vendor. Unit Topics Identifying vendor roles and

More information

SPACK FIREWALL RESTRICTION WITH SECURITY IN CLOUD OVER THE VIRTUAL ENVIRONMENT

SPACK FIREWALL RESTRICTION WITH SECURITY IN CLOUD OVER THE VIRTUAL ENVIRONMENT SPACK FIREWALL RESTRICTION WITH SECURITY IN CLOUD OVER THE VIRTUAL ENVIRONMENT V. Devi PG Scholar, Department of CSE, Indira Institute of Engineering & Technology, India. J. Chenni Kumaran Associate Professor,

More information

Ranked Keyword Search Using RSE over Outsourced Cloud Data

Ranked Keyword Search Using RSE over Outsourced Cloud Data Ranked Keyword Search Using RSE over Outsourced Cloud Data Payal Akriti 1, Ms. Preetha Mary Ann 2, D.Sarvanan 3 1 Final Year MCA, Sathyabama University, Tamilnadu, India 2&3 Assistant Professor, Sathyabama

More information

Cloud Security and Algorithms: A Review Divya saraswat 1, Dr. Pooja Tripathi 2 1

Cloud Security and Algorithms: A Review Divya saraswat 1, Dr. Pooja Tripathi 2 1 Cloud Security and Algorithms: A Review Divya saraswat 1, Dr. Pooja Tripathi 2 1 M.Tech Dept. of Computer Science, IPEC, Ghaziabad, U.P. 2 Professor, Dept. of Computer science, IPEC, Ghaziabad, U.P. Abstract:

More information

SECURING HEALTH INFORMATION IN THE CLOUD. Feisal Nanji, Executive Director, Techumen feisal@techumen.com

SECURING HEALTH INFORMATION IN THE CLOUD. Feisal Nanji, Executive Director, Techumen feisal@techumen.com SECURING HEALTH INFORMATION IN THE CLOUD Feisal Nanji, Executive Director, Techumen feisal@techumen.com Conflict of Interest Disclosure Feisal Nanji, MPP, CISSP Has no real or apparent conflicts of interest

More information

Privacy Preserving Public Auditing for Data in Cloud Storage

Privacy Preserving Public Auditing for Data in Cloud Storage Privacy Preserving Public Auditing for Data in Cloud Storage M.Priya 1, E. Anitha 2, V.Murugalakshmi 3 M.E, Department of CSE, Karpagam University, Coimbatore, Tamilnadu, India 1, 3 M.E, Department of

More information

Networks and Services

Networks and Services Networks and Services Dr. Mohamed Abdelwahab Saleh IET-Networks, GUC Fall 2015 TOC 1 Infrastructure as a Service 2 Platform as a Service 3 Software as a Service Infrastructure as a Service Definition Infrastructure

More information

Improving data integrity on cloud storage services

Improving data integrity on cloud storage services International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services

More information

White Paper on CLOUD COMPUTING

White Paper on CLOUD COMPUTING White Paper on CLOUD COMPUTING INDEX 1. Introduction 2. Features of Cloud Computing 3. Benefits of Cloud computing 4. Service models of Cloud Computing 5. Deployment models of Cloud Computing 6. Examples

More information

Cloud Security. Nantawan Wongkachonkitti Electronic Government Agency, Thailand Cloud Security Alliance, Thailand Chapter October 2014

Cloud Security. Nantawan Wongkachonkitti Electronic Government Agency, Thailand Cloud Security Alliance, Thailand Chapter October 2014 Cloud Security Nantawan Wongkachonkitti Electronic Government Agency, Thailand Cloud Security Alliance, Thailand Chapter October 2014 Agenda Introduction Security Assessment for Cloud Secure Cloud Infrastructure

More information

ADVANCEMENT TOWARDS PRIVACY PROCEEDINGS IN CLOUD PLATFORM

ADVANCEMENT TOWARDS PRIVACY PROCEEDINGS IN CLOUD PLATFORM INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE ADVANCEMENT TOWARDS PRIVACY PROCEEDINGS IN CLOUD PLATFORM Neela Bhuvan 1, K.Ajay Kumar 2 1 M.Tech Student, Dept of CSE, Vathsalya Institute

More information

Testing as a Service on Cloud: A Review

Testing as a Service on Cloud: A Review Testing as a Service on Cloud: A Review Shruti N. Pardeshi 1, Vaishali Choure 1 Research Scholar, 2 Associate Professor, Medicaps Group of Institutions,Indore Abstract Software testing is an important

More information

STORAGE SECURITY TUTORIAL With a focus on Cloud Storage. Gordon Arnold, IBM

STORAGE SECURITY TUTORIAL With a focus on Cloud Storage. Gordon Arnold, IBM STORAGE SECURITY TUTORIAL With a focus on Cloud Storage Gordon Arnold, IBM SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members

More information

Cloud Security Introduction and Overview

Cloud Security Introduction and Overview Introduction and Overview Klaus Gribi Senior Security Consultant klaus.gribi@swisscom.com May 6, 2015 Agenda 2 1. Cloud Security Cloud Evolution, Service and Deployment models Overview and the Notorious

More information

APPLICABILITY OF CLOUD COMPUTING IN ACADEMIA

APPLICABILITY OF CLOUD COMPUTING IN ACADEMIA Abstract APPLICABILITY OF CLOUD COMPUTING IN ACADEMIA Prof. Atul B Naik naik_ab@yahoo.com Prof. Amarendra Kumar Ajay akajay2001@gmail.com Prof. Swapna S Kolhatkar swapna.kolhatkar@gmail.com The Indian

More information

Cloud deployment model and cost analysis in Multicloud

Cloud deployment model and cost analysis in Multicloud IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) ISSN: 2278-2834, ISBN: 2278-8735. Volume 4, Issue 3 (Nov-Dec. 2012), PP 25-31 Cloud deployment model and cost analysis in Multicloud

More information