Providing Security and Consistency as a service in Auditing Cloud
|
|
|
- Cecil Freeman
- 10 years ago
- Views:
Transcription
1 Providing Security and Consistency as a service in Auditing Cloud Goka.D.V.S.Seshu Kumar M.Tech Department of CSE Sankethika Vidya Parishad Engineering College G.Kalyan Chakravarthi, M.Tech Assistant Professor Department of CSE Sankethika Vidya Parishad Engineering College Reshma Sultana Assistant Professor Department of CSE Sankethika Vidya Parishad Engineering College ABSTRACT Cloud storage services have become very popular due to their infinite advantages. To provide always-on access, a cloud service provider (CSP) maintains multiple copies for each piece of data on geographically distributed servers. A major disadvantage of using this technique in clouds is that it is very expensive to achieve strong consistency on a worldwide scale. In this system, a novel consistency as a service (CaaS) model is presented, which involves a large data cloud and many small audit clouds. In the CaaS model we are presented in our system, a data cloud is maintained by a CSP. A group of users that participate an audit cloud can verify whether the data cloud provides the promised level of consistency or not. The system proposes a two level auditing architecture, which need a loosely synchronize clock in the audit cloud. Then design algorithms to measure the severity of violations with two metrics: the commonality of violations, and the oldness value of read. Finally, heuristic auditing strategy (HAS) is devised to find out as many violations as possible. Many experiments were performed using a combination of simulations and a real cloud deployment to validate HAS. Keywords- Cloud Service Provider (CSP), Consistency as a Service (CaaS), Heuristic Auditing strategy, Service Level Agreement, User Operation Table, Directed Acyclic Graph, Network Time Protocol INTRODUCTION Clouds computing has become more popular choice, because it has succeeded in giving guaranteed basic services like virtualized infrastructure system and providing data storage, etc. e.g. Amazon, SimpleDB are example of such systems. The customers or end users by making use of these services, become authorized users and able to access the data from anywhere and at any time using any device and getting confidence that the capital investment is going to less. The cloud service provider popularly known as CSP promising the users data is going to be available as 24/7, and they can access it efficiently. The CSP stores the different copies of data in a distributed fashion on different servers, which geographically present in different places. The main issue with distributing multiple copies of data called as replication technique is resultant into a very expensive process to provide strong consistency operation. In the coming days user is assured to see the latest updates about this service or operation. Many cloud service providers provide week consistency, we call such consistency as eventual consistency, where a user can read the data for particular time. Now-a-days stronger consistency assurance is getting importance. Consider the following figure. In the above figure data is stored in multiple copies on five cloud servers (CS1, CS2, CS5), users specified in the figure share data through a cloud storage service. Here the cloud should provide casual consistency service, where a user Alice uploads a data on the cloud server CS4. Here the user update should be reflected in all the servers. If cloud service provider provides only eventual consistency then receiver user is going to receive the old version of data. Such a integrated design based on traditional version may not satisfy customer requirements. Page 1774
2 Fig. 1. An application that requires causal consistency Hence we can conclude that different applications need different level of consistency operation. In this work, we propose CaaS model as a ideal consistency operation, which the applications of today s date are demanding. The standard CaaS model consists of large cloud data created by CSP and complete the operation scheme it contains many audit clouds which are formed by authorized group of users. These group of users working on a project and making a document, which constantly checking whether data cloud offers a guaranteed level of consistency or not. This standard model incorporating two-level auditing structure, which involves a synchronized clock assigning tasks to audit cloud and then performing global auditing with global trace of standard operations periodically by auditor chosen from an audit cloud. Local auditing is going to be performed and focuses on continuous read and read-your write process consistencies, which is going to be done online by a light-weight algorithm, while global auditing operation focuses on casual consistency, where it constructs a directed graph. Whatever graph has been constructed, if it directed acyclic graph, which is also called as precedence graph, we can say that casual consistency is maintained. We confirm the severity of violations by calculated two metrics for the standard CaaS model: One is called commonality of violations and other is staleness of value of read operation. Finally in this work, we propose a approach called Heuristic Auditing Strategy(HAS), which proves cloud consistency and required cost i.e. actual cost per transaction. The two level auditing structures basically contain 2 auditing types: 1. Local Auditing 2. Global Auditing 1. Local Auditing: structure each user can perform local auditing with local trace operation periodically.this auditing focuses on monotonic read and read your write consistency.which can be perform by lightweight online algorithm the local auditing algorithm is online algorithm. 2. Global Auditing: the auditor can be selected from audit cloud.the main works of the auditor is to perform global auditing with global trace operation.this auditing focuses on causal consistency because causal consistency perform by constructing directed graph.the directed acyclic graph is constructed then causal consistency is obtain.finally we propose analytical auditing strategy which appropriate reads to reveal many unsuccessful result. Although the infrastructures under the cloud are much more powerful and reliable than personal computing devices, they are still facing the broad range of both internal and external threats for data integrity. Second, there do exist various motivations for CSP to behave unfaithfully toward the cloud users regarding their outsourced data status. In particular, simply downloading all the data for its integrity verification is not a practical solution due to the expensiveness in I/O and transmission cost across the network. Besides, it is often insufficient to detect the data corruption only when accessing the data, as it does not give users correctness assurance for those un accessed data and might be too late to recover the data loss or damage. Encryption does not completely solve the problem of protecting data privacy against third-party auditing but just reduces it to the complex key management domain. Unauthorized data leakage still remains possible due to the potential exposure of decryption keys. LITERATURE SURVEY S. Esteves [15] has highlighted the work on the critical data information, which is stored in cloud data centers across the globe, and getting increased in great way. Page 1775
3 And they are using different replication methods or approaches to deliver high-availability of services, demand of high performance, and mainly to maintain the consistency among multiple copies of data i.e. replicas. The proposed technique targets or focuses on data stored in tabular format, provides rationalization of resources, here bandwidth means bandwidth and which also requires improvement in the QOS parameters like latency value, performance in the network and availability of resources. H. Wada [16] has introduced a new class of data storage systems, called NoSQL (Not Only SQL), has emerged to complement traditional database systems, with rejection of general ACID transactions as one common feature. Here the authors have brought a new area of for study, where a new class has been introduced in the data storage system, which is called as NoSQL (Not Only SQL), which have been introduced to support the traditional or general classic database systems, where it come across the removal of ACID transactions properties from these systems, considered as the one common general feature. M. Rahman [18] highlighting the study of storage systems, these systems with large-scale key-value standard storage systems, compromise with consistency for the interest of dependability, i.e. availability of resources and partition tolerance systems, as well as performance of network, considering latency parameter. The system under this study provides eventual consistency, which is difficult to implement in real time systems. The authors have attempted to measure such consistency empirically, but these systems suffer from some drawbacks. But their accuracy has been limited due to some state-of-the are systems considering consistency benchmarks. D. Kossmann [19] discussed about now-a-days the cloud computing systems have many advantages for deploying applications in real time systems, example for such applications are data-intensive applications. Under this system, the user follows pay-as-you-go service model, under which user pay to the services, which he has used. The system provides a promising service with reduced cost. Another promising feature service to add here is, the system provides unlimited throughput by adding servers. They have focused on the transaction processing work, such as read and update workloads, instead of on the other processing like analytics operation or OLAP workloads operation. E. Brewer [3] proposed the work on common current distributed systems, even the ones sytem that work, tend to be very generally fragile: they are very hard to keep up, very hard to manage, hard to grow, very hard to evolve, and very hard to program. Here in this talk, the author looks at several problems in an attempt to clear the way we think about these general systems. These problems include the general fault model, very high availability, considered graceful degradation, specific data consistency, specifying evolution, composition operation, and autonomy process. L. Lamport [20] has introduced the concept of formalism for generally specifying and particular reasoning about concurrent systems has been described. It is not going to be based upon specific atomic actions. A general definition of a higher-level system is given and also justified correspondingly. And considering in Part II, the generic formalism is going to be used to specify several specific classes of inter-process communication and algorithms have been proven to be correct for implementing them. SCOPE OF THE PROJECT The scope of this project is to upload and download a file from cloud. While providing cloud consistency, the following objectives are to be met: 1] Understanding the novel consistency as a service (CaaS) model provided by the cloud service provider. 2] The cloud computing solution should provide basic consistency as service. 3] Maintain synchronized clock at audit clouds that responsible for checking weather cloud provide promised consistency or not. 4] Service Availability Page 1776
4 EXISTING SYSTEM By using the cloud storage services, the customers can access data stored in a cloud anytime and anywhere using any device, without caring about a large amount of capital investment when deploying the underlying hardware infrastructures. The cloud service provider (CSP) stores data replicas on multiple geographically distributed servers. Where a user can read stale data for a period of time. The domain name system (DNS) is one of the most popular applications that implement eventual consistency. Updates to a name will not be visible immediately, but all clients are ensured to see them eventually. DISADVANTAGES: The replication technique in clouds is that it is very expensive to achieve strong consistency. Hard to verify replica in the data cloud is the latest one or not. PROPOSED SYSTEM In this paper, we presented a consistency as a service (CaaS) model and a two-level auditing structure to help users verify whether the cloud service provider (CSP) is providing the promised consistency, and to quantify the severity of the violations, if any. With the CaaS model, the users can assess the quality of cloud services and choose a right CSP among various candidates, e.g, the least expensive one that still provides adequate consistency for the users applications. Fig. 2. Consistency as a service model. ADVANTAGES: Do not require a global clock among all users for total ordering of operations. The users can assess the quality of cloud services. choose a right CSP Among various candidates, e.g, the least expensive one that still provides adequate consistency for the users applications. As a rising subject, cloud consistency is playing an increasingly important role in the decision support activity of every walk of life. Get Efficient Item set result based on the caas. IMPLEMENTATION 1. System Module:- In the first module, we develop the System Module with User Module, Admin Module, and Auditor Module. In user module, the authorized user should undergo registration operation andregister their detailed information and collect the secret key information for login operation and user can able to upload the file regarding the operation like auditing. Next in user module, system user already uploaded files can be stored in system cloud database in systematic manner. Next Auditor can view the file or locate the file present in the database and it can be very secured. In admin module admin will be able to view all the register user details; and also user uploads information details, and third party TPA activities regarding the auditing strategy. In auditor module, the generally selected auditor can do the auditing operation based on the strategy operation called as heuristic auditing strategy. This operation is related to the basic operation of document verification. Then special unit Auditor can collect and check the auditing file, the he decide whether to reject or accept the file. On this he is going to make a report and enter all the details and about the decision like Page 1777
5 whether it s good or bad. Also in this module an auditor can submit revision report. In this report information like accept or waiting. After the decision if status is present as a accept means then the user can view the file else if the status is waiting condition means then user cannot view the particular file. 2. User Operation Table: In this module each user is going to maintain a UOT for the operation of recording local operations in systematic manner. Then each present record in the UOT unit is shown or explored by three components: first is an operation parameter, next the present logical vector, and finally more important one is physical vector. When the user is working on any operation, he is going to record his complete activity and also the current logical vector and final value as a physical vector, in his own UOT. In this module each user of the system is going to maintain a special logical vector and a basic physical vector to track the complete logical and physical time when an operation is going to take place correspondingly. 3. Local Consistency Auditing: Local consistency auditing technique is an online algorithm. The operation in this module or unit, in which each user is going to record all his complete activities and store in his UOT. During the read operation, the authorized user is going to perform local consistency operation in an independent manner. 4. Global Consistency Auditing: Global consistency auditing technique is going be considered as an offline algorithm. Next to consider is that an auditor periodically will be selected from the audit cloud system to perform the special operation like global consistency auditing technique. Hence in this case the auditor is going to collect all users UOTs for obtaining a special global trace of all activities. Then later executing global auditing technique, selected auditor is going to send results of auditing operation as well as its vectors values to all other authorized users. Now given the auditor s vector values, then each user will come to know other users new clocks up to next global auditing. RELATED WORK As per our survey there are many previously worked done in the field of cloud data consistency. In paper [1] they reduce that confusion by clarifying terms, providing simple figures to quantify comparisons between of cloud and conventional Computing, and identifying the top technical and non-technical obstacles and opportunities of Cloud Computing. We believe the only plausible solution to very high availability is multiple Cloud Service Providers (CSP).We predict Cloud Computing will grow, so developers should take it into account. Regardless whether a cloud provider sells services at a low level of abstraction like EC2 or a higher level like AppEngine, we believe that computing, storage and networking must all focus on horizontal scalability of virtualized resources rather than on single node performance. In paper [2] they provide the better way to store any file on cloud storage. A key contribution of COPS is its scalability, which can enforce causal dependencies between keys stored across an entire cluster, rather than a single server like previous systems. But storing a file on a cluster is producing huge problem for providing consistency. Measuring consistency is a very important task in this system because monitoring and controlling consistency is major goal of proposed system. By the time various benchmarking techniques are offered. In [3] they are providing whole new perspective to see the need of consistency as a service (CaaS).In cloud computing storage services, every service request has an associated cost. In particular, it is possible to assign a very precise monetary cost to consistency protocols (i.e., the number of service calls needed to ensure the consistency level times the cost per call). Therefore, in cloud storage services, consistency not only influences the performance and availability of the systems but also the overall operational cost. In [4] to know the consistency models we have studied local and global consistency model of Dengyong Zhou, Olivier Page 1778
6 Bousquet, and Thomas Navin Lal. The key to semisupervised learning problems is the consistency assumption, which essentially requires a classifying function to be sufficiently smooth with respect to the intrinsic structure revealed by a huge amount of labeled and unlabeled points. We proposed a simple algorithm to obtain such a solution, which demonstrated effective use of unlabeled data in experiments including toy data, digit recognition and text categorization. CONCLUSION In this paper, The presented system is a consistency as a service (CaaS) model and a two-level auditing scheme to help users validate whether the cloud service provider (CSP) is providing the promised consistency, and to enumerate the occurrences of the violations. The CaaS model used in the system helps the users can assess the superiority of cloud services and decide a right CSP among various services. For example the less costly one that still provides satisfactory consistency for the users applications. REFERENCES [1] M. Armbrust, A. Fox, R. Griffith, A. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, et al., A view of cloud computing, Commun. ACM, vol. 53, no. 4, [2] P. Mell and T. Grance, The NIST definition of cloud computing (draft), NIST Special Publication (Draft), [3] E. Brewer, Towards robust distributed systems, in Proc ACM PODC. [4] Pushing the CAP: strategies for consistency and availability, Computer, vol. 45, no. 2, [5] M. Ahamad, G. Neiger, J. Burns, P. Kohli, and P. Hutto, Causal memory: definitions, implementation, and programming, Distributed Computing, vol. 9, no. 1, [6] W. Lloyd, M. Freedman, M. Kaminsky, and D. Andersen, Don t settle for eventual: scalable causal consistency for wide-area storage with COPS, in Proc ACM SOSP. [7] E. Anderson, X. Li, M. Shah, J. Tucek, and J. Wylie, What consistency does your key-value store actually provide, in Proc USENIX HotDep. [8] C. Fidge, Timestamps in message-passing systems that preserve the partial ordering, in Proc ACSC. [9] W. Golab, X. Li, and M. Shah, Analyzing consistency properties for fun and profit, in Proc ACM PODC. [10] A. Tanenbaum and M. Van Steen, Distributed Systems: Principles and Paradigms. Prentice Hall PTR, [11] W. Vogels, Data access patterns in the Amazon.com technology platform, in Proc VLDB. 12] Eventually consistent, Commun. ACM, vol. 52, no. 1, [13] T. Kraska, M. Hentschel, G. Alonso, and D. Kossmann, Consistency rationing in the cloud: pay only when it matters, in Proc VLDB. [14] S. Esteves, J. Silva, and L. Veiga, Quality-ofservice for consistency of data geo-replication in cloud computing, Euro-Par 2012 Parallel Processing, vol. 7484, ] H. Wada, A. Fekete, L. Zhao, K. Lee, and A. Liu, Data consistency properties and the trade-offs in commercial cloud storages: the consumers perspective, in Proc CIDR. Page 1779
7 [16] D. Bermbach and S. Tai, Eventual consistency: how soon is eventual? in Proc MW4SOC. 17] M. Rahman, W. Golab, A. AuYoung, K. Keeton, and J. Wylie, Toward a principled framework for benchmarking consistency, in Proc. 2012Workshop on HotDep. [18] D. Kossmann, T. Kraska, and S. Loesing, An evaluation of alternative architectures for transaction processing in the cloud, in Proc ACM SIGMOD. [19] J. Misra, Axioms for memory access in asynchronous hardware systems, ACM Trans. Programming Languages and Systems, vol. 8, no. 1, [20] P. Gibbons and E. Korach, Testing shared memories, SIAM J. Computing, vol. 26, no. 4, Page 1780
Two Level Auditing Framework in a large Cloud Environment for achieving consistency as a Service.
Two Level Auditing Framework in a large Cloud Environment for achieving consistency as a Service. Aruna V MTech Student Department of CSE St.Peter s Engineering College, Hyderabad, TS, INDIA N Mahipal
Towards secure and consistency dependable in large cloud systems
Volume :2, Issue :4, 145-150 April 2015 www.allsubjectjournal.com e-issn: 2349-4182 p-issn: 2349-5979 Impact Factor: 3.762 Sahana M S M.Tech scholar, Department of computer science, Alvas institute of
Security related to the information designing or even media editing. This enables users
A Potential Cloud Service by Auditing Cloud MalaimariSuganya.P 1, Padma Priya.R 2 1 Department of Computer Science and Information Technology Nadar Saraswathi College of Arts and Science, Theni dt-625531,
IMPLEMENTATION OF NOVEL MODEL FOR ASSURING OF CLOUD DATA STABILITY
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE IMPLEMENTATION OF NOVEL MODEL FOR ASSURING OF CLOUD DATA STABILITY K.Pushpa Latha 1, V.Somaiah 2 1 M.Tech Student, Dept of CSE, Arjun
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department
preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.
Privacy-Preserving Public Auditing For Secure Cloud Storage ABSTRACT: Using cloud storage, users can remotely store their data and enjoy the on-demand high-quality applications and services from a shared
Near Sheltered and Loyal storage Space Navigating in Cloud
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 8 (August. 2013), V2 PP 01-05 Near Sheltered and Loyal storage Space Navigating in Cloud N.Venkata Krishna, M.Venkata
Development of enhanced Third party Auditing Scheme for Secure Cloud Storage
Development of enhanced Third party Auditing Scheme for Secure Cloud Storage Bhanu Prakash Chamakuri*1, D. Srikar*2, Dr. M.Suresh Babu*3 M.Tech Scholar, Dept of CSE, Grandhi Varalakshmi Institute Of Technology,
Data Integrity for Secure Dynamic Cloud Storage System Using TPA
International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 7-12 International Research Publication House http://www.irphouse.com Data Integrity for Secure
Enable Public Audit ability for Secure Cloud Storage
Enable Public Audit ability for Secure Cloud Storage Leela Poornima 1, D.Hari Krishna 2 1 Student, Nova College of Engineering and Technology, Ibrahimpatnam,Krishna Dist., Andhra Pradesh, India 2 Assistant
Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.
Secure Privacy-Preserving Cloud Services. Abhaya Ghatkar, Reena Jadhav, Renju Georgekutty, Avriel William, Amita Jajoo DYPCOE, Akurdi, Pune [email protected], [email protected], [email protected],
THE CLOUD AND ITS EFFECTS ON WEB DEVELOPMENT
TREX WORKSHOP 2013 THE CLOUD AND ITS EFFECTS ON WEB DEVELOPMENT Jukka Tupamäki, Relevantum Oy Software Specialist, MSc in Software Engineering (TUT) [email protected] / @tukkajukka 30.10.2013 1 e arrival
How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System
REVIEW ARTICAL A Novel Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage Dumala Harisha 1, V.Gouthami 2 1 Student, Computer Science & Engineering-Department, JNTU Hyderabad India
A Brief Analysis on Architecture and Reliability of Cloud Based Data Storage
Volume 2, No.4, July August 2013 International Journal of Information Systems and Computer Sciences ISSN 2319 7595 Tejaswini S L Jayanthy et al., Available International Online Journal at http://warse.org/pdfs/ijiscs03242013.pdf
Data Integrity Check using Hash Functions in Cloud environment
Data Integrity Check using Hash Functions in Cloud environment Selman Haxhijaha 1, Gazmend Bajrami 1, Fisnik Prekazi 1 1 Faculty of Computer Science and Engineering, University for Business and Tecnology
SECURE RE-ENCRYPTION IN UNRELIABLE CLOUD USINGSYNCHRONOUS CLOCK
International Journal of Advance Research In Science And Engineering IJARSE, Vol. No.4, Issue No.01, January 2015 http:// SECURE RE-ENCRYPTION IN UNRELIABLE CLOUD USINGSYNCHRONOUS CLOCK Arudra Gopala Rao
PRIVACY PRESERVING PUBLIC AUDITING FOR SECURED DATA STORAGE IN CLOUD USING BLOCK AUTHENTICATION CODE
PRIVACY PRESERVING PUBLIC AUDITING FOR SECURED DATA STORAGE IN CLOUD USING BLOCK AUTHENTICATION CODE R.REVATHI # PG Scholar #, Bharathiyar Institute Of Engineering for Women, Deviyakurichi, Salem(DT) India
Secrecy Maintaining Public Inspecting For Secure Cloud Storage
Secrecy Maintaining Public Inspecting For Secure Cloud Storage K.Sangamithra 1, S.Tamilselvan 2 M.E, M.P.Nachimuthu.M.Jaganathan Engineering College, Tamilnadu, India 1 Asst. Professor, M.P.Nachimuthu.M.Jaganathan
Eventually Consistent
Historical Perspective In an ideal world there would be only one consistency model: when an update is made all observers would see that update. The first time this surfaced as difficult to achieve was
Secure Cloud Transactions by Performance, Accuracy, and Precision
Secure Cloud Transactions by Performance, Accuracy, and Precision Patil Vaibhav Nivrutti M.Tech Student, ABSTRACT: In distributed transactional database systems deployed over cloud servers, entities cooperate
SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD
SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD S.REVATHI B.HASEENA M.NOORUL IZZATH PG Student PG Student PG Student II- ME CSE II- ME CSE II- ME CSE Al-Ameen Engineering
Data Security Using Reliable Re-Encryption in Unreliable Cloud
ISSN (Online): 2277-5420 www.ijcsn.org Data Security Using Reliable Re-Encryption in Unreliable Cloud 328 1 Ajinkya Adhau, 2 Payal Bobade, 3 Priyanka Zilpe, 4 Yashodhara Fulmali 1, 2, 3, 4 Student, Department
Secure Data transfer in Cloud Storage Systems using Dynamic Tokens.
Secure Data transfer in Cloud Storage Systems using Dynamic Tokens. P.Srinivas *,K. Rajesh Kumar # M.Tech Student (CSE), Assoc. Professor *Department of Computer Science (CSE), Swarnandhra College of Engineering
ADVANCE SECURITY TO CLOUD DATA STORAGE
Journal homepage: www.mjret.in ADVANCE SECURITY TO CLOUD DATA STORAGE ISSN:2348-6953 Yogesh Bhapkar, Mitali Patil, Kishor Kale,Rakesh Gaikwad ISB&M, SOT, Pune, India Abstract: Cloud Computing is the next
SECURITY FOR ENCRYPTED CLOUD DATA BY USING TOP-KEY TREE TECHNOLOGIES
SECURITY FOR ENCRYPTED CLOUD DATA BY USING TOP-KEY TREE TECHNOLOGIES 1 MANJOORULLASHA SHAIK, 2 SYED.ABDULHAQ, 3 P.BABU 1 PG SCHOLAR, CSE (CN), QCET, NELLORE 2,3 ASSOCIATE PROFESSOR, CSE, QCET, NELLORE
Implementation of Role Based Access Control on Encrypted Data in Hybrid Cloud
Implementation of Role Based Access Control on Encrypted Data in Hybrid Cloud Gajanan Ganorkar, Prof. A.B. Deshmukh, Prof M.D.Tambhakhe Information Technology Email:[email protected] Contact: 8600200142
An Efficient Data Correctness Approach over Cloud Architectures
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 8, Issue 12 (October 2013), PP. 33-37 An Efficient Data Correctness Approach over
Data Consistency on Private Cloud Storage System
Volume, Issue, May-June 202 ISS 2278-6856 Data Consistency on Private Cloud Storage System Yin yein Aye University of Computer Studies,Yangon [email protected] Abstract: Cloud computing paradigm
Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing.
Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Privacy - Preserving
SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD
Volume 1, Issue 7, PP:, JAN JUL 2015. SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD B ANNAPURNA 1*, G RAVI 2*, 1. II-M.Tech Student, MRCET 2. Assoc. Prof, Dept.
Cloud Computing: Meet the Players. Performance Analysis of Cloud Providers
BASEL UNIVERSITY COMPUTER SCIENCE DEPARTMENT Cloud Computing: Meet the Players. Performance Analysis of Cloud Providers Distributed Information Systems (CS341/HS2010) Report based on D.Kassman, T.Kraska,
Secured Storage of Outsourced Data in Cloud Computing
Secured Storage of Outsourced Data in Cloud Computing Chiranjeevi Kasukurthy 1, Ch. Ramesh Kumar 2 1 M.Tech(CSE), Nalanda Institute of Engineering & Technology,Siddharth Nagar, Sattenapalli, Guntur Affiliated
Distributed Data Stores
Distributed Data Stores 1 Distributed Persistent State MapReduce addresses distributed processing of aggregation-based queries Persistent state across a large number of machines? Distributed DBMS High
Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving,
Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Third Party
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING T.Vidhya Sree M.Phil Research Scholar,CS, MGR College, Hosur (India) ABSTRACT Cloud Computing is the long dreamed vision
PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE
PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE Abstract: Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared
The Hidden Extras. The Pricing Scheme of Cloud Computing. Stephane Rufer
The Hidden Extras The Pricing Scheme of Cloud Computing Stephane Rufer Cloud Computing Hype Cycle Definition Types Architecture Deployment Pricing/Charging in IT Economics of Cloud Computing Pricing Schemes
How To Design A Cloud Data Storage Service For A Cloud Computer System
Ensuring Security Services for Data Storing and Data Sharing in Cloud Computing D. Raman 1, Bojja Vamshikrishna 2 1 Associate Professor Department of Computer Science and Engineering, Vardhaman College
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK IMPLEMENTATION OF AN APPROACH TO ENHANCE QOS AND QOE BY MIGRATING SERVICES IN CLOUD
DISTRIBUTION OF DATA SERVICES FOR CORPORATE APPLICATIONS IN CLOUD SYSTEM
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE DISTRIBUTION OF DATA SERVICES FOR CORPORATE APPLICATIONS IN CLOUD SYSTEM Itishree Boitai 1, S.Rajeshwar 2 1 M.Tech Student, Dept of
A Hybrid Load Balancing Policy underlying Cloud Computing Environment
A Hybrid Load Balancing Policy underlying Cloud Computing Environment S.C. WANG, S.C. TSENG, S.S. WANG*, K.Q. YAN* Chaoyang University of Technology 168, Jifeng E. Rd., Wufeng District, Taichung 41349
A Review of Load Balancing Algorithms for Cloud Computing
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Issue -9 September, 2014 Page No. 8297-8302 A Review of Load Balancing Algorithms for Cloud Computing Dr.G.N.K.Sureshbabu
Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage
Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage P. Selvigrija, Assistant Professor, Department of Computer Science & Engineering, Christ College
Enabling Public Accountability and Data Sharing for Storage Security in Cloud Computing
VOLUME 1, NUMBER 1, JUNE 2014 OPEN JOURNAL OF INFORMATION SECURITY AND APPLICATIONS Enabling Public Accountability and Data Sharing for Storage Security in Cloud Computing K. Mohammed Aaqib Ameen, A. Anny
Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao Guocui.gao@tufts.
Tufts University Department of Computer Science COMP 116 Introduction to Computer Security Fall 2014 Final Project Investigating Security Issues in Cloud Computing Guocui Gao [email protected] Mentor:
IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD
IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD 1 Ms.Nita R. Mhaske, 2 Prof. S.M.Rokade 1 student, Master of Engineering, Dept. of Computer Engineering Sir Visvesvaraya
MODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENT
MODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENT Soumya V L 1 and Anirban Basu 2 1 Dept of CSE, East Point College of Engineering & Technology, Bangalore, Karnataka, India
Identifying Data Integrity in the Cloud Storage
www.ijcsi.org 403 Identifying Data Integrity in the Cloud Storage Saranya Eswaran 1 and Dr.Sunitha Abburu 2 1 Adhiyamaan College of Engineering, Department of Computer Application, Hosur. 2 Professor and
Cluster Computing. ! Fault tolerance. ! Stateless. ! Throughput. ! Stateful. ! Response time. Architectures. Stateless vs. Stateful.
Architectures Cluster Computing Job Parallelism Request Parallelism 2 2010 VMware Inc. All rights reserved Replication Stateless vs. Stateful! Fault tolerance High availability despite failures If one
Distribution transparency. Degree of transparency. Openness of distributed systems
Distributed Systems Principles and Paradigms Maarten van Steen VU Amsterdam, Dept. Computer Science [email protected] Chapter 01: Version: August 27, 2012 1 / 28 Distributed System: Definition A distributed
AN EFFECTIVE PROPOSAL FOR SHARING OF DATA SERVICES FOR NETWORK APPLICATIONS
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFECTIVE PROPOSAL FOR SHARING OF DATA SERVICES FOR NETWORK APPLICATIONS Koyyala Vijaya Kumar 1, L.Sunitha 2, D.Koteswar Rao
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING &
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 4, Issue 6, November - December (2013), pp. 62-69 IAEME: www.iaeme.com/ijcet.asp Journal
An Open MPI-based Cloud Computing Service Architecture
An Open MPI-based Cloud Computing Service Architecture WEI-MIN JENG and HSIEH-CHE TSAI Department of Computer Science Information Management Soochow University Taipei, Taiwan {wjeng, 00356001}@csim.scu.edu.tw
Cloud Data Storage Services Considering Public Audit for Security
Global Journal of Computer Science and Technology Cloud and Distributed Volume 13 Issue 1 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
Conceptual Approach for Performance Isolation in Multi-Tenant Systems
Conceptual Approach for Performance Isolation in Multi-Tenant Systems Manuel Loesch 1 and Rouven Krebs 2 1 FZI Research Center for Information Technology, Karlsruhe, Germany 2 SAP AG, Global Research and
Improving data integrity on cloud storage services
International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services
CONSIDERATION OF DYNAMIC STORAGE ATTRIBUTES IN CLOUD
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE CONSIDERATION OF DYNAMIC STORAGE ATTRIBUTES IN CLOUD Ravi Sativada 1, M.Prabhakar Rao 2 1 M.Tech Student, Dept of CSE, Chilkur Balaji
BPM in Cloud Architectures: Business Process Management with SLAs and Events
BPM in Cloud Architectures: Business Process Management with SLAs and Events Vinod Muthusamy and Hans-Arno Jacobsen University of Toronto 1 Introduction Applications are becoming increasingly distributed
Preserving Data Integrity and Public Auditing for Data Storage in Cloud Computing
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Issue - 8 August, 2014 Page No. 7829-7833 Preserving Data Integrity and Public Auditing for Data Storage
A Comprehensive Data Forwarding Technique under Cloud with Dynamic Notification
Research Journal of Applied Sciences, Engineering and Technology 7(14): 2946-2953, 2014 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2014 Submitted: July 7, 2013 Accepted: August
Berkeley Ninja Architecture
Berkeley Ninja Architecture ACID vs BASE 1.Strong Consistency 2. Availability not considered 3. Conservative 1. Weak consistency 2. Availability is a primary design element 3. Aggressive --> Traditional
IMPACT OF DISTRIBUTED SYSTEMS IN MANAGING CLOUD APPLICATION
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE IMPACT OF DISTRIBUTED SYSTEMS IN MANAGING CLOUD APPLICATION N.Vijaya Sunder Sagar 1, M.Dileep Kumar 2, M.Nagesh 3, Lunavath Gandhi
MINIMIZING STORAGE COST IN CLOUD COMPUTING ENVIRONMENT
MINIMIZING STORAGE COST IN CLOUD COMPUTING ENVIRONMENT 1 SARIKA K B, 2 S SUBASREE 1 Department of Computer Science, Nehru College of Engineering and Research Centre, Thrissur, Kerala 2 Professor and Head,
BIG DATA IN THE CLOUD : CHALLENGES AND OPPORTUNITIES MARY- JANE SULE & PROF. MAOZHEN LI BRUNEL UNIVERSITY, LONDON
BIG DATA IN THE CLOUD : CHALLENGES AND OPPORTUNITIES MARY- JANE SULE & PROF. MAOZHEN LI BRUNEL UNIVERSITY, LONDON Overview * Introduction * Multiple faces of Big Data * Challenges of Big Data * Cloud Computing
Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System
Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System 1 K.Valli Madhavi A.P [email protected] Mobile: 9866034900 2 R.Tamilkodi A.P [email protected] Mobile:
SECURING CLOUD DATA COMMUNICATION USING AUTHENTICATION TECHNIQUE
SECURING CLOUD DATA COMMUNICATION USING AUTHENTICATION TECHNIQUE 1 PARISHA TYAGI, 2 VIRENDRA KUMAR 1Department of Information Technology, Suresh Gyan Vihar University, Rajasthan, India 2 Department of
Third Party Auditing For Secure Data Storage in Cloud through Trusted Third Party Auditor Using RC5
Third Party Auditing For Secure Data Storage in Cloud through Trusted Third Party Auditor Using RC5 Miss. Nupoor M. Yawale 1, Prof. V. B. Gadicha 2 1 Student, M.E. Second year CSE, P R Patil COET, Amravati.INDIA.
Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption
Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer
Survey Paper on Integrity Auditing of Storage
International Journal of Computational Engineering Research Vol, 04 Issue, 3 Survey Paper on Integrity Auditing of Storage Ugale Santosh A 1 1M.E. Computer AVCOE, Sangmner, India ABSTRACT: Cloud servers
Optimal Service Pricing for a Cloud Cache
Optimal Service Pricing for a Cloud Cache K.SRAVANTHI Department of Computer Science & Engineering (M.Tech.) Sindura College of Engineering and Technology Ramagundam,Telangana G.LAKSHMI Asst. Professor,
Cloud storage Security Mechanism with Authentication in Public Cloud
Cloud storage Security Mechanism with Authentication in Public Cloud Apurva Patidar 1, Mohsin Sheikh 2 Department of Computer Science & Engg. Medicaps Institute Of technology and Management, Indore,(M.P.),India
An Efficient Secure Multi Owner Data Sharing for Dynamic Groups in Cloud Computing
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 6, June 2014, pg.730
Geoprocessing in Hybrid Clouds
Geoprocessing in Hybrid Clouds Theodor Foerster, Bastian Baranski, Bastian Schäffer & Kristof Lange Institute for Geoinformatics, University of Münster, Germany {theodor.foerster; bastian.baranski;schaeffer;
Security Analysis of Cloud Computing: A Survey
Security Analysis of Cloud Computing: A Survey Kamaljeet Pakhre 1, Navdeep Singh 2, Sanket Mani Tiwari 3 1,2,3 Research Scholar, M. Tech. (CSE), Galgotias University, Greater Noida, India. Abstract Now
Data Integrity by Aes Algorithm ISSN 2319-9725
Data Integrity by Aes Algorithm ISSN 2319-9725 Alpha Vijayan Nidhiya Krishna Sreelakshmi T N Jyotsna Shukla Abstract: In the cloud computing, data is moved to a remotely located cloud server. Cloud will
Proof of Retrivability: A Third Party Auditor Using Cloud Computing
Proof of Retrivability: A Third Party Auditor Using Cloud Computing Vijayaraghavan U 1, Madonna Arieth R 2, Geethanjali K 3 1,2 Asst. Professor, Dept of CSE, RVS College of Engineering& Technology, Pondicherry
PERFORMANCE ANALYSIS OF PaaS CLOUD COMPUTING SYSTEM
PERFORMANCE ANALYSIS OF PaaS CLOUD COMPUTING SYSTEM Akmal Basha 1 Krishna Sagar 2 1 PG Student,Department of Computer Science and Engineering, Madanapalle Institute of Technology & Science, India. 2 Associate
Web Email DNS Peer-to-peer systems (file sharing, CDNs, cycle sharing)
1 1 Distributed Systems What are distributed systems? How would you characterize them? Components of the system are located at networked computers Cooperate to provide some service No shared memory Communication
Introduction to NOSQL
Introduction to NOSQL Université Paris-Est Marne la Vallée, LIGM UMR CNRS 8049, France January 31, 2014 Motivations NOSQL stands for Not Only SQL Motivations Exponential growth of data set size (161Eo
Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment
Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment Deepa Noorandevarmath 1, Rameshkumar H.K 2, C M Parameshwarappa 3 1 PG Student, Dept of CS&E, STJIT, Ranebennur. Karnataka, India
