CLOUD-HOSTED PROXY BASED COLLABORATION IN MULTI- CLOUD COMPUTING ENVIRONMENTS WITH ABAC METHODS
|
|
- Erik Grant
- 8 years ago
- Views:
Transcription
1 CLOUD-HOSTED PROXY BASED COLLABORATION IN MULTI- CLOUD COMPUTING ENVIRONMENTS WITH ABAC METHODS Shilpa G S 1, Maria Navin J R 2 1 PG Student, Dept. of Computer Science and Engineering, SVCE Bangalore, 2 Asst.Professor, Dept. of Computer Science and Engineering, SVCE Bangalore. ABSTRACT Many organizations are gradually shifting towards the use of Cloud computing. Cloud computing on deploying with proxies and service providers reduces cost and increases the accessibility of data. A set of possible solutions can be seen in the recent research related to single and multi-cloud security. Multi-cloud environment includes the distributed clouds integration in a large open system to handle all the issues regarding aggregation and integration of the Clouds entirely detached from vendors and providers. So, there is a need to address the privacy, policy and trust issues. Access Control Methods ensure that authorized user s access to the data and the system. It leads to the design of attribute based access control mechanism for cloud computing INTRODUCTION A proposed proxy based multi-cloud computing allows resource sharing among cloud providers with dynamic colla-boration. Client centric approaches encourages inter-operability without pre-established business agreements among cloud providers but initiated by cloud customers or trusted third party s to address the challenges such as privacy policy and trust[1]. Cloud-hosted proxy deploys the cloud service provider host proxies within its infrastructure administer and manage the proxies. It will handle the service request from the client who wants to access these proxies. Cloud service providers (CSPs) deploy proxies as an autonomou s cloud system and offer it as a service to clients. Proxy Service Providers (PSPs) are deployed as an autonomous cloud that offers collaborative services to clients and CSPs. Policy conflicts results in security breaches when proxies dynamically use different security policies to provide collaborative services among multiple CSPs. Proxies are selected to service the request simultaneously based on latency. Proxies must use certain mechanisms to monitor for and defend against the resulting security breaches. Data as a service (DaaS) is an emerging cloud service in which organizations can seamlessly store data in the cloud and retrieve it based on access control policies that cover legal requirements and organizational policies. An expressive access control model can specify access control policies on protected objects in terms of a subject s properties, called identity attributes[1]. They can incorporate a subject s id, age, organizational role, and access location. Such an attribute based access control (ABAC) model Provides fine-grained data access and expresses policies closer to organizational policies. 2. ARCHITECTURE 2.1 Cloud Hosted Proxy Cloud computing can be decided as a new paradigm for the dynamic provisioning of computing services. Cloud service provider[2] swarm proxies within its infrastructure administer and manage the proxies and will handle the service request from the client who wants to access these proxies. In Fig. 2.1, Initially client interacts with CSPs and initiates a service request to C1. If request is not satisfied then the proxies within C1 discovers the need for a service from C2 and C3.
2 Fig 2.1: cloud hosted proxy This infrastructure offers some solutions to the problems such as portability and interoperability for management of both SaaS and PaaS[8]. The disparate layers of a cloud environ-ment (Saas, IaaS, and PaaS) provide dedicated services. However their granularity and difficulty vary, so we converted that a principled description of these services is needed to promote the interoperability among multiple clouds dynamically. 3. RELATED WORK Access control is defined as policy or procedure in order to allow, deny or restrict access to a system. It helps in monitoring and recording of all actions involved to access a system. Access Control identify users attempting to access in an unauthorized way to enhance security. A Mandatory access Control (MAC) which is been used in the Secure Military application whereas the Discretionary Access Controls (DAC) is used in the Security processing of industrial and the Civilian of Government[2]. DAC is not found and it is inappropriate access for many commercial and civilian Government Organisation. The non -discretionary access control and the role-based access control (RBAC)[3] are more central to the secure processing of nonmilitary systems than DAC. Once proxies identify policy conflicts, certain conflict resolution strategies are introduced to resolve them. However, current conflict resolution mechanisms have certain limitations to overcome the problems with dynamic heterogenous environment. For example, current conflict resolution mechanisms such as Extensible Access Control Markup Language (XACML) policies exacerbates the issues because the identified policy conflicts are resolved with selection of one resolution algorithm. Role based Access Control (RBAC) defines job role to deter-mine authorized user access to the system. The role of a user is associated with privileges[4]. So legal agreement should be reached when privileges changes with the role. Access methods supports authorization based on user identity, group affiliations, and the nature of a specific activity. It offers general support for flexible delegation of rights including capability -based access control for slices and other global objects. It enables flexible declarative authorization policies and delegated policy evaluation combining policy rules from multiple entities in thefederated system. The trust structure is more addressed on deploying the proxies for collaboration. Key aspects of trust in federated systems reduce to choices about whose assertions to believe, whose commands to accept, or what sensitive information to reveal and to whom. Trust logic offers a powerful formalism for participating servers to represent these choices with the help of proxies. Our approach factors these choices out of the control framework software: the federation structure emerges from the combination of local policies, and may be changed without modifying the control software. 4. ATTRIBUTE BASED ACCESS CONTROL METHOD An expressive access control model, attributes can specify access control policies on protected objects on basis of subject s properties called identity attributes. Subject s address, organizational role, age, and location of access are used to define identity. Such an attribute-based access control (ABAC)[4] model provides finegrained data access and expresses policies closer to organizational policies. A secured resources and da ta is accessed in controlled manner within the system. However, controlling which users (subjects) can access which computing and network resources is through access control. It also manages users, files and other resources. It
3 controls user s privileges to files or resources (objects). Identification, authentication, autho-rization and accountability are the steps taken in access control systems before actually accessing the resources or the object in general. In early stages of computing and information technology, researchers and technologists realized the importance of preventing users from interfering each other on shared systems. Various access control models were developed. User s identity was the main index to allow users to use the system or its resources. This approach was called Identification Based Access Control (IBAC)[5]. However, with the growth of the networks and the number of users, defending capabity of IBAC for controlling policy conflicts is less. To enhance the dynamism, access control were introduced with advanced concepts which included owner/ group/ public IBAC model doesn t solve the challenges posed in distributed systems. Managing access to the system and resources became hard and vulnerable to errors. A new method known as Role Based Access Control (RBAC) determines user s access to the system based on the Job role. The job role is to be satisfied with the least amount of permissions or functionalities for privilege concept. As a role changes, with privileges, permissions can be added or deleted. However, problems became apparent when RBAC was extended across administrative domains. And it proved difficult to reach an agreement on what privileges to associate with a role. Accordingly, a policy based access control known as Attribute Based Access Control (ABAC) came into existence [ 6]. In ABAC, access is granted on attributes that the user could prove to have such as date of birth or national number. However, reaching to an agreement on a set of attributes is very hard, especially across multiple agencies or domains and organizations. All access control methods rely on authentication of the user at the site, as well as, time taken to request the service. Sometimes authenticated access control may be maintained. Tight cou pling among multiple heterogenous domains becomes a major issue. This is done to merge identities or define the attributes or roles. Furthermore, subsets decision of privileges of an administrator is a challenging approach. ABAC defines certain principles to solve certain policy conflicts that cannot be solved with expressive access control model such as XACML. they are as follows It includes licensing restrictions for dynamic integration into a proprietary system. It involves access control and can fully encompass access control policy of a modern architecture. ABAC policy can be combined with mechanism to provide fine grain control over large data sets. Method(1) is demonstrated for existing working architecture. Method(2) is demonstrated by a working policy defined and (3) is demonstrated by evaluating use case models. Attribute Based Access Control is composed four entities. A Requestor(Req): makes requests to the cloud and undergoes a series of actions on the service. A Service (Serv): software and hardware with a network based interface and pre-defined operations A Resource (Res): one or more cloud services involve in this action with a specific set of state data in XML document. An environment (Env): contains information regarding the decision on access of data with respect to date and time. It may not be related with any entity. ABAC Characterizes hierarchical policy structure based on the concept of abstraction and encapsulation. The attributes of identities is defined in [6] as follows: Attr(Req) { ReqAttr p[1, P ]} p = [ 1, P ]}
4 Attr(Serv) { ServAttr q[1, Q ]} q = [ 1, Q ]} Attr(Res) { ResAttr r[1,r]} r = [ 1, R ]} Attr(Env) {EnvAttr s[1, S]} s = [ 1, S ]} Where P, Q, R and S are the integers and represent the maximum number of attributes for each entity. The ABAC policy design is actually the abstraction of policy components as a super set. Policy = {P m [ I,M ],P m is a policy} Policy evaluation and Policy decision are the two mechanisms used to solve the policy conflicts and avoid security breaches. P n _df() is the policy evaluation function of policy Pn and is defined as: P n _df( Attr(req), Attr(Serv), Attr(Res), Attr(Env) ) = n permit or deny. ABAC[4] allows 4 entities to define attributes in cloud system. It is as follows: ReqAttr1 = Attribute (GID= admin = ####### ) ServAttr1 = Attribute (Special Type = PaaS, Service Name = plateform Creation ) ResAttr1 = Attribute (Computing = Node1 and Node2, networking = switch1 ) EnvAttr1 = Attribute (Service Time = time, domain = Cloud1 and Cloud2 ) Policy decision is made by passing the attributes of the entities to the decision function df () aft er evaluation of policies. Decision_ABAC = df(requestor, Service, Resource, Environment) = P 1 _df(requestor), P 2 _df(service), P 3 _df(source), P 4 _df(environ- ment). 5. RESULTS Initially, the client must register with database required for access is described in Fig In this paper, the proposed frame work must allocate the storage area for the clouds service Provider and must display the available clouds that are in the multi cloud computing environments.
5 Fig 4.1: Database registration The Fig. 4.2 illustrates that client interacts among multiple clouds with authentication. M any resources available in clouds can be accessed through client login. Now, the user can send the request to the CSP to access the resources present in registered clouds and uploaded files. Thus, availability and scalability be advantageous factors in this multi-cloud computing environment with secured access. The interaction among client and cloud or multiple clouds doesn t require prior pre-established agreements and addresses trust, privacy and policies. Fig 4.1: Authentication of client Actually, files are uploaded into the database in Fig. 4.3 before the CSP s receive the request. These files are associated with unique ID to preserve privacy. Fig 4.3: Upload the files. The Fig. 4.4 displays the files uploaded into the clouds.when the user request for the service, if the requested service is not available in that cloud then it route the request among multiple clouds. The files are secured with keys generated using secret sharing algorithm.
6 6. CONCLUSION Fig 4.4: Secured files in clouds Attribute Based Access Control (ABAC) can subsume all access control requirements of the architectures. In this paper, ABAC resolves the problem with one resolution algorithm. This model provides fine -grained data access and expresses policies closer to organizational policies. Proxies used in this framework addresses trust, privacy and policies without using pre-established agreements and collects intermediate results on routing among multiple clouds. Policy set is composed of various policies that need to be supported and have their own decisions and decision making algorithms using identity attributes. It effectively supports multiple policies and provides more flexibility and scalability[8]. REFERENCES [1]Mukesh Singhal and Santosh Chandrasekhar, University of California, Mercedv Tingjian Ge, University of Massachusetts Lowell Elisa Bertino, Purdue University Collaboration in Multi-cloud Computing Environments: Framework and Security Issues IEEE paper year [2]Sushmita Ruj, Milos Stojmenovic, And Amiya Nayak,, " Decentralized Access Control With Anonymousauthentication Of Data Stored In Clouds", Ieee Transactions On Parallel And Distributed Systems, Vol. 25, No. 2, February 2014sushmita Ruj, Milos Stojmenovic, And Amiya Nayak,, " Decentralized Access Control With Anonymous authentication Of Data Stored In Clouds", IEEE Transactions On Parallel And Distributed Systems, Vol. 25, No. 2, February [3]Ferraiolo DF and Kuhun DR Role Based Access Control. Proceeding of 15 th National Computer Security Conference, Baltimore MD. pp [4]D.R. Kuhn, E.J. Coyne, and T.R. Weil, Adding Attributes to Role- Based Access Control, IEEE Computer, vol. 43, no. 6, pp , June [5]T. Barton et al Identity Federation and Attribute Based Authorization through the Globus Toolkit, Shibboleth, Gridshib and My Proxy. [6] Access Control In Cloud Computing Environment by Abdul Raouf Khanon may 2012 ARPN Journal of Engineering and Applied Sciences. [7] Attribute-Based Access Control for Distributed Systems by David J. B. Cheperdak B.Sc., University of Victoria, [8]An Intelligent Technique for Framework and Security Issues Association in Multi Cloud Environment J Manjuvani 1, Bhaludra Raveendranadh Singh 2, K Laxmi 3, Moligi Sangeetha International Journal of Computer Trends and Technology (IJCTT) volume 16 number 5 Oct 2014
A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing
International Journal of Emerging Engineering Research and Technology Volume 3, Issue 5, May 2015, PP 1-7 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) A Survey on Security Issues and Security Schemes
More informationChapter 2 Taxonomy and Classification of Access Control Models for Cloud Environments
Chapter 2 Taxonomy and Classification of Access Control Models for Cloud Environments Abhishek Majumder, Suyel Namasudra and Samir Nath Abstract Cloud computing is an emerging and highly attractive technology
More informationDistributed Attribute Based Encryption for Patient Health Record Security under Clouds
Distributed Attribute Based Encryption for Patient Health Record Security under Clouds SHILPA ELSA ABRAHAM II ME (CSE) Nandha Engineering College Erode Abstract-Patient Health Records (PHR) is maintained
More informationApplication Based Access Control on Cloud Networks for Data Security
Application Based Access Control on Cloud Networks for Data Security Ms. Smitha P M.Tech in DCN, Department of ECE GSSSIETW, Mysuru Karnataka, India Smitha.21sn @gmail.com Mrs. Manjula G Associate. Proffesor,
More informationAnalysis of Different Access Control Mechanism in Cloud
Analysis of Different Access Control Mechanism in Cloud Punithasurya K Post Graduate Scholar Department of Information Technology Karunya University, India Jeba Priya S Lecturer Department of Information
More informationIdentity, Privacy, and Data Protection in the Cloud XACML. David Brossard Product Manager, Axiomatics
Identity, Privacy, and Data Protection in the Cloud XACML David Brossard Product Manager, Axiomatics 1 What you will learn The issue with authorization in the cloud Quick background on XACML 3 strategies
More informationIEEE TRANSACTIONS ON CLOUD COMPUTING VOL:46 NO:2 YEAR 2013
Research Research Feature Feature IEEE TRANSACTIONS ON CLOUD COMPUTING VOL:46 NO:2 YEAR 2013 Collaboration in Multicloud Computing Environments: Framework and Security Issues Mukesh Singhal and Santosh
More informationImplementation of an Efficient RBAC Technique of Cloud Computing in.net Environment
Implementation of an Efficient RBAC Technique of Cloud Computing in.net Environment Ruhi Gupta Department Of Computer Science, Punjabi University, Patiala, India Abstract: Cloud Computing is flourishing
More informationISSN: 2321-7782 (Online) Volume 3, Issue 3, March 2015 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 3, Issue 3, March 2015 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
More informationSharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment
Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment Deepa Noorandevarmath 1, Rameshkumar H.K 2, C M Parameshwarappa 3 1 PG Student, Dept of CS&E, STJIT, Ranebennur. Karnataka, India
More informationRole Based Encryption with Efficient Access Control in Cloud Storage
Role Based Encryption with Efficient Access Control in Cloud Storage G. V. Bandewar 1, R. H. Borhade 2 1 Department of Information Technology, Sinhgad Technical Education Society s SKNCOE, Pune, India
More informationProviding Access Permissions to Legitimate Users by Using Attribute Based Encryption Techniques In Cloud
Providing Access Permissions to Legitimate Users by Using Attribute Based Encryption Techniques In Cloud R.Udhayakumar 1, M. Jawahar 2, I.Ramasamy 3 PG Student, Dept. Of CSE,KSR Institute For Engineering
More information1. Introduction. 2. Background. 2.1. Cloud computing in a nutshell
Title: Towards new access control models for Cloud computing systems Category: 'In the Cloud' - Security Author name: Gouglidis Antonios City, Country: Thessaloniki, Greece Year of study, Course Title:
More informationEFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE
EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE Reshma Mary Abraham and P. Sriramya Computer Science Engineering, Saveetha University, Chennai, India E-Mail: reshmamaryabraham@gmail.com
More informationOPENIAM ACCESS MANAGER. Web Access Management made Easy
OPENIAM ACCESS MANAGER Web Access Management made Easy TABLE OF CONTENTS Introduction... 3 OpenIAM Access Manager Overview... 4 Access Gateway... 4 Authentication... 5 Authorization... 5 Role Based Access
More informationMulti Tenancy Access Control Using Cloud Service in MVC
Multi Tenancy Access Control Using Cloud Service in MVC 1 Sonia Gupta, 2 Rubal Choudary Indo Global College of Engg, Abhipur, Mohali Abstract - Cloud Computing is the next generation Internet service and
More informationImplementing XML-based Role and Schema Migration Scheme for Clouds
Implementing XML-based Role and Schema Migration Scheme for Clouds Gurleen Kaur 1, Sarbjeet Singh 2 Computer Science and Engineering, UIET Panjab University, Chandigarh, India 1 gurleenturka@gmail.com
More informationSecure Role-Based Access Control on Encrypted Data in Cloud Storage using Raspberry PI
Volume: 2, Issue: 7, 20-27 July 2015 www.allsubjectjournal.com e-issn: 2349-4182 p-issn: 2349-5979 Impact Factor: 3.762 Miss Rohini Vidhate Savitribai Phule Pune University. Mr. V. D. Shinde Savitribai
More informationDecentralized Access Control Secure Cloud Storage using Key Policy Attribute Based Encryption
Decentralized Access Control Secure Cloud Storage using Key Policy Attribute Based Encryption 1 Thota Naresh Kumar, 2 K.SRINIVAS, 3 Y.Raju 2 Associate Professor, 3 Associate Professor 1,2,3 Department
More informationIMPLEMENTATION OF NETWORK SECURITY MODEL IN CLOUD COMPUTING USING ENCRYPTION TECHNIQUE
IMPLEMENTATION OF NETWORK SECURITY MODEL IN CLOUD COMPUTING USING ENCRYPTION TECHNIQUE 1 Rajesh L Gaikwad, 2 Dhananjay M Dakhane, 3 Ravindra L Pardhi M.E Student, Associate Professor, Assistant Professor,
More informationData management using Virtualization in Cloud Computing
Data management using Virtualization in Cloud Computing A.S.R. Krishna Kanth M.Tech (CST), Department of Computer Science & Systems Engineering, Andhra University, India. M.Sitha Ram Research Scholar Department
More informationSecure Data Sharing in Cloud Computing using Hybrid cloud
International Journal of Electronics and Computer Science Engineering 144 Available Online at www.ijecse.org ISSN: 2277-1956 Secure Data Sharing in Cloud Computing using Hybrid cloud Er. Inderdeep Singh
More informationAssessing Collaboration Framework in Multi-Cloud Environment
Assessing Collaboration Framework in Multi-Cloud Environment Annapurna Saikia PG Scholar, Dept of CSE, Bharat Institute of Engineering and Technology. Abstract: Cloud computing has emerged as a popular
More informationDESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION
DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION Prof. M. Ben Swarup Professor, Department of CSE Vignan's Institute of Information Technology Visakhapatnam-49, India Chukkala
More informationGEC4. Miami, Florida
GENI Security Architecture GEC4 Stephen Schwab, Alefiya Hussain Miami, Florida 1 Outline Overview of Security Architecture Draft Work in progress Observations About Candidate Technologies Considerations
More informationHow To Understand Cloud Usability
Published in proceedings of HCI International 2015 Framework for Cloud Usability Brian Stanton 1, Mary Theofanos 1, Karuna P Joshi 2 1 National Institute of Standards and Technology, Gaithersburg, MD,
More informationA Survey on Security Threats and Security Technology Analysis for Secured Cloud Services
, pp.21-30 http://dx.doi.org/10.14257/ijsia.2013.7.6.03 A Survey on Security Threats and Security Technology Analysis for Secured Cloud Services Changsoo Lee 1, Daewon Jung 2 and Keunwang Lee 3 1 Dept.
More informationDelegation for On-boarding Federation Across Storage Clouds
Delegation for On-boarding Federation Across Storage Clouds Elliot K. Kolodner 1, Alexandra Shulman-Peleg 1, Gil Vernik 1, Ciro Formisano 2, and Massimo Villari 3 1 IBM Haifa Research Lab, Israel 2 Engineering
More informationWeb Service Authorization Framework
Web Service Authorization Framework Thomas Ziebermayr, Stefan Probst Software Competence Center Hagenberg, Hauptstrasse 99, 4232 Hagenberg, Austria thomas.ziebermayr@scch.at, stefan.probst@scch.at Abstract
More informationSecurity Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
More informationCRYPTOGRAPHIC SECURE CLOUD STORAGE MODEL WITH ANONYMOUS AUTHENTICATION AND AUTOMATIC FILE RECOVERY
SOWMIYA MURTHY: CRYPTOGRAPHIC SECURE CLOUD STORAGE MODEL WITH ANONYMOUS AUTHENTICATION AND AUTOMATIC FILE RECOVERY CRYPTOGRAPHIC SECURE CLOUD STORAGE MODEL WITH ANONYMOUS AUTHENTICATION AND AUTOMATIC FILE
More informationAccess Control of Cloud Service Based on UCON
Access Control of Cloud Service Based on UCON Chen Danwei, Huang Xiuli, and Ren Xunyi Nanjing University of posts & Telecommunications, New Model Street No.66, 210003, Nanjing, China chendw@njupt.edu.cn,
More informationPoetics of Cloud Computing - A Paper Summary
Association in Multi cloud Computing Environments Structure and Security Issues SADULA VIJAYALAXMI Department of Computer Science & Engineering, (M.Tech.) K.RAJENDAR Asst. Professor, Department of Computer
More informationEvaluating IaaS security risks
E-Guide This expert tip examines the risks organizations need to be aware of when evaluating IaaS solutions, and highlights the key architectural and process components of access management services that
More informationPublic Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage
Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage P. Selvigrija, Assistant Professor, Department of Computer Science & Engineering, Christ College
More informationUsing proxies to facilitate collaboration in Multi-Cloud Computing Environments
Using proxies to facilitate collaboration in Multi-Cloud Computing Environments 1 Solmaz Vaghri, 2 Mohan KG 1 M.Tech Student, 2 Professor Dept. CSE Acharya Institute of Technology (Affiliated to VTU) Bangalore,
More informationAn Object Oriented Role-based Access Control Model for Secure Domain Environments
International Journal of Network Security, Vol.4, No.1, PP.10 16, Jan. 2007 10 An Object Oriented -based Access Control Model for Secure Domain Environments Cungang Yang Department of Electrical and Computer
More informationA CROSS - DOMAIN ROLE MAPPING AND AUTHORIZATION FRAMEWORK FOR RBAC IN GRID SYSTEMS
International Journal of Computer Science and Applications c 2009 Technomathematics Research Foundation Vol.6 No.1, pp. 1-12 A CROSS - DOMAIN ROLE MAPPING AND AUTHORIZATION FRAMEWORK FOR RBAC IN GRID SYSTEMS
More informationRole Based Access Control (RBAC) Nicola Zannone
Role Based Access Control (RBAC) Nicola Zannone 1 DAC and MAC Discretionary Access Control (DAC) Access control determined by the owner of an object Oner can delegate access rights to other users Access
More informationASSURANCE OF PATIENT CONTROL TOWARDS PERSONAL HEALTH DATA
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE ASSURANCE OF PATIENT CONTROL TOWARDS PERSONAL HEALTH DATA Mahammad Zennyfor Sulthana 1, Shaik Habeeba 2 1 M.Tech Student, Dept of CS
More informationFundamental Concepts and Models
Fundamental Concepts and Models 1 1. Roles and Boundaries Could provider The organization that provides the cloud based IT resources Cloud consumer An organization (or a human) that has a formal contract
More informationAn Intelligent Approach for Data Fortification in Cloud Computing
An Intelligent Approach for Data Fortification in Cloud Computing Supriya Mandhare 1, Prof. A. K. Sen 2, Asso. Prof. Rajkumar Shende 3 1,3 Department of Computer Engineering, St. Francis Institute of Technology,
More informationThe Top 5 Federated Single Sign-On Scenarios
The Top 5 Federated Single Sign-On Scenarios Table of Contents Executive Summary... 1 The Solution: Standards-Based Federation... 2 Service Provider Initiated SSO...3 Identity Provider Initiated SSO...3
More informationPerformance Gathering and Implementing Portability on Cloud Storage Data
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 17 (2014), pp. 1815-1823 International Research Publications House http://www. irphouse.com Performance Gathering
More informationThe Essentials Series: Enterprise Identity and Access Management. Authorization. sponsored by. by Richard Siddaway
The Essentials Series: Enterprise Identity and Access Management Authorization sponsored by by Richard Siddaway Authorization...1 What Needs to Be Protected?...1 Groups...2 Role-Based Access...2 Heterogeneous
More informationChapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
More informationCluster, Grid, Cloud Concepts
Cluster, Grid, Cloud Concepts Kalaiselvan.K Contents Section 1: Cluster Section 2: Grid Section 3: Cloud Cluster An Overview Need for a Cluster Cluster categorizations A computer cluster is a group of
More information[Sudhagar*, 5(5): May, 2016] ISSN: 2277-9655 Impact Factor: 3.785
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY AVOID DATA MINING BASED ATTACKS IN RAIN-CLOUD D.Sudhagar * * Assistant Professor, Department of Information Technology, Jerusalem
More informationApplication Centric Infrastructure Object-Oriented Data Model: Gain Advanced Network Control and Programmability
White Paper Application Centric Infrastructure Object-Oriented Data Model: Gain Advanced Network Control and Programmability What You Will Learn This document discusses application centric infrastructure
More informationOn the Definition of Access Control Requirements for Grid and Cloud Computing Systems
On the Definition of Access Control Requirements for Grid and Cloud Computing Systems Antonios Gouglidis and Ioannis Mavridis Department of Applied Informatics, University of Macedonia, 156 Egnatia Street,
More informationIdentity and Access Management Integration with PowerBroker. Providing Complete Visibility and Auditing of Identities
Identity and Access Management Integration with PowerBroker Providing Complete Visibility and Auditing of Identities Table of Contents Executive Summary... 3 Identity and Access Management... 4 BeyondTrust
More informationDynamic Query Updation for User Authentication in cloud Environment
Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,
More informationLecture 02b Cloud Computing II
Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,
More informationAmit Sheth & Ajith Ranabahu, 2010. Presented by Mohammad Hossein Danesh
Amit Sheth & Ajith Ranabahu, 2010 Presented by Mohammad Hossein Danesh 1 Agenda Introduction to Cloud Computing Research Motivation Semantic Modeling Can Help Use of DSLs Solution Conclusion 2 3 Motivation
More informationResource Selection in Collaborative Cloud Computing Based on User Preference
Resource Selection in Collaborative Cloud Computing Based on User Preference W.Renuka Devi 1, K.Sudhakar 2 P.G Student. Department of Computer Engineering, GPREC Engineering College, Kurnool, Andhra Pradesh,
More informationSecurity Issues for the Semantic Web
Security Issues for the Semantic Web Dr. Bhavani Thuraisingham Program Director Data and Applications Security The National Science Foundation Arlington, VA On leave from The MITRE Corporation Bedford,
More informationProfile-Based Access Control in Cloud Computing Environments with applications in Health Care Systems
Profile-Based Access Control in Cloud Computing Environments with applications in Health Care Systems By Umair Mukhtar Ahmed Naushahi A thesis submitted to the Department of Computer Science In conformity
More informationSINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTING SECURITY ENVIRONMENT
SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTING SECURITY ENVIRONMENT K.karthika 1, M. Daya kanimozhi Rani 2 1 K.karthika, Assistant professor, Department of IT, Adhiyamaan College of Engineering, Hosur
More informationRole-Based Access Controls
Role-Based Access Controls Reprinted from 15th National Computer Security Conference (1992) Baltimore, Oct 13-16, 1992. pp. 554-563 David F. Ferraiolo and D. Richard Kuhn National Institute of Standards
More informationComponents- Based Access Control Architecture
Issue s in Informing Science and Information Technology Volume 6, 2009 Components- Based Access Control Architecture Adesina S. Sodiya and Adebukola S. Onashoga Department of Computer Science, University
More informationWhat Cloud computing means in real life
ITU TRCSL Symposium on Cloud Computing Session 2: Cloud Computing Foundation and Requirements What Cloud computing means in real life Saman Perera Senior General Manager Information Systems Mobitel (Pvt)
More informationTowards Securing APIs in Cloud Computing
Towards Securing APIs in Cloud Computing Kumar Gunjan #1, R. K. Tiwari *2, G. Sahoo #3 # Department of Information Technology, Birla Institute of Technology, Mesra Ranchi, India * RVS College of Engineering&
More informationFujitsu Dynamic Cloud Bridging today and tomorrow
Fujitsu Dynamic Cloud Bridging today and tomorrow Contents Cloud Computing with Fujitsu 3 Fujitsu Dynamic Cloud: Higher Dynamics for Enterprises 4 Fujitsu Dynamic Cloud: Our Offering 6 High Security Standards
More informationIMPLEMENTING DATA SECURITY IN MULTI CLOUD
IMPLEMENTING DATA SECURITY IN MULTI CLOUD Ms. Renu Nagendra Shinde Information Technology SKNCOE Pune 41,India renunikhilp@gmail.com Prof. Mrs. Varsha Khandekar Information Technology SKNCOE Pune 41, India
More informationINTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK REVIEW ON MOBILE APPLICATION IN A CLOUD COMPUTING SECURE AND SCALABLE USING CLOUD
More informationService Identifier Comparison module Service Rule Comparison module Favourite Application Server Reinvocation Management module
Service Broker for Managing Feature Interactions in IP Multimedia Subsystem Anahita Gouya, Noël Crespi {anahita.gouya, noel.crespi @int-evry.fr}, Institut National des télécommunications (GET-INT) Mobile
More informationWhite Paper The Identity & Access Management (R)evolution
White Paper The Identity & Access Management (R)evolution Federation and Attribute Based Access Control Page 2 A New Perspective on Identity & Access Management Executive Summary Identity & Access Management
More informationManisha R. Patil. Keywords Cloud service provider, Identity Provider, Enhanced Client Profile, Identity Management, Privacy, Trust Manager.
Volume 4, Issue 7, July 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Privacy and Dynamic
More informationCloud Security and Managing Use Risks
Carl F. Allen, CISM, CRISC, MBA Director, Information Systems Security Intermountain Healthcare Regulatory Compliance External Audit Legal and ediscovery Information Security Architecture Models Access
More informationOn the features and challenges of security and privacy in distributed internet of things. C. Anurag Varma achdc@mst.edu CpE 6510 3/24/2016
On the features and challenges of security and privacy in distributed internet of things C. Anurag Varma achdc@mst.edu CpE 6510 3/24/2016 Outline Introduction IoT (Internet of Things) A distributed IoT
More informationRSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES
RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES 1 MD ISMAIL Z, 2 ASHFAQUE AHAMED K. 1 PG Scholar,Department of Computer Science, C.Abdul Hakeem College Of Arts and Science,Melvisharam.
More informationSURVEY PAPER ON SECURITY IN CLOUD COMPUTING
SURVEY PAPER ON SECURITY IN CLOUD COMPUTING Jasleen Kaur Research Scholar, RIMT, Mandi Gobindgarh Dr. Sushil Garg Principal, RIMT, Mandi Gobindgarh ABSTRACT: Cloud Computing provides resources to the users
More informationAn Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud
An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud T.Vijayalakshmi 1, Balika J Chelliah 2,S.Alagumani 3 and Dr.J.Jagadeesan 4 1 PG
More informationA Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining
More informationUser Authentication Platform using Provisioning in Cloud Computing Environment
User Authentication Platform using Provisioning in Cloud Computing Environment Hyosik Ahn, Hyokyung Chang, Changbok Jang, Euiin Choi Dept. Of Computer Engineering, Hannam University, Daejeon, Korea {hsahn,
More informationSLA BASED SERVICE BROKERING IN INTERCLOUD ENVIRONMENTS
SLA BASED SERVICE BROKERING IN INTERCLOUD ENVIRONMENTS Foued Jrad, Jie Tao and Achim Streit Steinbuch Centre for Computing, Karlsruhe Institute of Technology, Karlsruhe, Germany {foued.jrad, jie.tao, achim.streit}@kit.edu
More informationA Survey on Cloud Security Issues and Techniques
A Survey on Cloud Security Issues and Techniques Garima Gupta 1, P.R.Laxmi 2 and Shubhanjali Sharma 3 1 Department of Computer Engineering, Government Engineering College, Ajmer Guptagarima09@gmail.com
More informationH Y T RUST: S OLUTION B RIEF. Solve the Nosy Neighbor Problem in Multi-Tenant Environments
H Y T RUST: S OLUTION B RIEF Solve the Nosy Neighbor Problem in Multi-Tenant Environments Summary A private cloud with multiple tenants such as business units of an enterprise or customers of a cloud service
More informationHIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.
More informationHow To Manage A Virtualization Server
Brain of the Virtualized Data Center Contents 1 Challenges of Server Virtualization... 3 1.1 The virtual network breaks traditional network boundaries... 3 1.2 The live migration function of VMs requires
More informationCloud-based Identity and Access Control for Diagnostic Imaging Systems
Cloud-based Identity and Access Control for Diagnostic Imaging Systems Weina Ma and Kamran Sartipi Department of Electrical, Computer and Software Engineering University of Ontario Institute of Technology
More informationSecrecy Maintaining Public Inspecting For Secure Cloud Storage
Secrecy Maintaining Public Inspecting For Secure Cloud Storage K.Sangamithra 1, S.Tamilselvan 2 M.E, M.P.Nachimuthu.M.Jaganathan Engineering College, Tamilnadu, India 1 Asst. Professor, M.P.Nachimuthu.M.Jaganathan
More informationFormal Modeling for Multi-Level Authentication in Sensor-Cloud Integration System
Formal Modeling for Multi-Level Authentication in Sensor-Cloud Integration System Dinesha H A Crucible of Research and Innovation PES Institute of Technology BSK 3 rd Stage Bangalore-85 R Monica M.Tech
More informationTOSCA Interoperability Demonstration
Topology and Orchestration Specification for Cloud Applications (TOSCA) Standard TOSCA Interoperability Demonstration Participating Companies: Join the TOSCA Technical Committee www.oasis-open.org, join@oasis-open.org
More informationBringing Cloud Security Down to Earth. Andreas M Antonopoulos Senior Vice President & Founding Partner www.nemertes.com
Bringing Cloud Security Down to Earth Andreas M Antonopoulos Senior Vice President & Founding Partner www.nemertes.com Agenda About Nemertes Cloud Dynamics and Adoption Assessing Risk of Cloud Services
More informationJOURNAL OF OBJECT TECHNOLOGY
JOURNAL OF OBJECT TECHNOLOGY Online at www.jot.fm. Published by ETH Zurich, Chair of Software Engineering JOT, 2008 Vol. 7, No. 8, November-December 2008 What s Your Information Agenda? Mahesh H. Dodani,
More informationA Survey on Scalable Data Security and Load Balancing in Multi Cloud Environment
IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 8 January 2015 ISSN (online): 2349-6010 A Survey on Scalable Data Security and Load Balancing in Multi Cloud
More informationFederation Proxy for Cross Domain Identity Federation
Proxy for Cross Domain Identity Makoto Hatakeyama NEC Corporation, Common Platform Software Res. Lab. 1753, Shimonumabe, Nakahara-Ku, Kawasaki, Kanagawa 211-8666, Japan +81-44-431-7663 m-hatake@ax.jp.nec.com
More informationA Security Integrated Data Storage Model for Cloud Environment
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 8, August 2014,
More informationAccess Control Framework of Personal Cloud based on XACML
Access Control Framework of Personal Cloud based on XACML 1 Jun-Young Park, 2 Young-Rok Shin, 3 Kyoung-Hun Kim, 4 Eui-Nam Huh 1First Author, 2 Kyung Hee University, {parkhans, shinyr}@khu.ac.kr 3 Gangdong
More informationCloud Security Introduction and Overview
Introduction and Overview Klaus Gribi Senior Security Consultant klaus.gribi@swisscom.com May 6, 2015 Agenda 2 1. Cloud Security Cloud Evolution, Service and Deployment models Overview and the Notorious
More informationWhite Paper: Security and Agility in the API Economy. Optimizing and securing your APIs with ViewDS Identity Solutions and Layer 7
White Paper: Security and Agility in the API Economy Optimizing and securing your APIs with ViewDS Identity Solutions and Layer 7 Security and Agility in the API Economy The API Economy is more than the
More informationKeywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption
Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer
More informationWhite Paper. Authentication and Access Control - The Cornerstone of Information Security. Vinay Purohit September 2007. Trianz 2008 White Paper Page 1
White Paper Authentication and Access Control - The Cornerstone of Information Security Vinay Purohit September 2007 Trianz 2008 White Paper Page 1 Table of Contents 1 Scope and Objective --------------------------------------------------------------------------------------------------------
More informationCLOUD COMPUTING. DAV University, Jalandhar, Punjab, India. DAV University, Jalandhar, Punjab, India
CLOUD COMPUTING 1 Er. Simar Preet Singh, 2 Er. Anshu Joshi 1 Assistant Professor, Computer Science & Engineering, DAV University, Jalandhar, Punjab, India 2 Research Scholar, Computer Science & Engineering,
More informationUnderstanding Enterprise Cloud Governance
Understanding Enterprise Cloud Governance Maintaining control while delivering the agility of cloud computing Most large enterprises have a hybrid or multi-cloud environment comprised of a combination
More informationParametric Analysis of Various Cloud Computing Security Models
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 15 (2014), pp. 1499-1506 International Research Publications House http://www. irphouse.com Parametric Analysis
More informationCloud Security Through Threat Modeling. Robert M. Zigweid Director of Services for IOActive
Cloud Security Through Threat Modeling Robert M. Zigweid Director of Services for IOActive 1 Key Points Introduction Threat Model Primer Assessing Threats Mitigating Threats Sample Threat Model Exercise
More informationHow To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System
REVIEW ARTICAL A Novel Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage Dumala Harisha 1, V.Gouthami 2 1 Student, Computer Science & Engineering-Department, JNTU Hyderabad India
More information