Secure Database as a Service-a Review
|
|
|
- Garey Richardson
- 10 years ago
- Views:
Transcription
1 Secure Database as a Service-a Review Prof Swarnalata Bollavarapu 1, Kamal Mistry 2 Assistant Professor, Department of Computer Engineering, MPSTME, Mumbai, India 1 M-Tech Student, Department of Computer Engineering, MPSTME, Mumbai, India 2 Abstract: Cloud computing is one of the emerging field in the IT industry and is widely adopted across the globe due to the easy accessibility and availability of the data from any location in the world over the internet. The era of cloud computing has reduced the overhead of hardware resources and maintenance due to this many industries have started using the different services provided by the cloud example Software as a service or platform as a service. In the recent years Database as a service has become boon in cloud computing era, it will reduce the overhead of installing and maintaining database on the client side, like any other services database as a service is also being provided on the pay per usage policy. In recent years many cloud service providers had started providing database as a service, among them few are: Amazon, Microsoft, Google etc. are good service provider.this paper discusses about the Database as a service and the security challenges faced by the database service provider. CRYPTDB and Monomi system is discussed to overcome the security challenges in database as a service. Keywords: Cloud computing, CryptDB, Database as a service, database security, Challenges I. INTRODUCTION Cloud computing is defined as accessing the data from remote location via the internet without having any overhead on client machine. According to NIST definition of Cloud Computing Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, s, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.[1]cloud computing is now a days working as a backup for any data, now a day s people have lots of important data and they need back up for the same so due to the hike in cloud computing services they make the use of cloud services for storing their data, example Google drive gives up to 5GB storage space. The different types of service model provided by cloud computing is shown in figure-1 1) Software as a service: example , virtual desktop and google apps, 2) Platform as a service: example Web, Google App Engine.3) Infrastructure as a service: Virtual machine, storage, and.these service models are also known as SPI (Service, Platform and Infrastructure). Apart from these the other emerging cloud services that fall into the SPI model is Database as a service that can be a part of software as a service or platform as a service depending on the way it is delivered by the service provider. The major challenge in the database as a service is providing data security, while performing any CRUD operations on cloud. The two systems which are used for providing security in cloud database are CRYPTDB and MONOMI. A. Essential characteristics [1] On-Demand Self Service:Consumer makes the usage of cloud services as per their demandwithout even interacting with the cloud service provider example google drive. Figure 1 Cloud Computing Service models [13] Broad network access: Heterogeneous thin or thick client platforms like mobile phones, tablets, laptops and workstation access the capabilities available on the network through standard mechanism. Resource pooling: In order to serve multiple consumers using a multi tenant model, with different physical and virtual resources given to them dynamically or taken back when work is done according to the consumer demand, the service providers pool their computing resources. Here consumer is not having any idea from where the resources are provided but able to specify location at higher level of abstraction (ex. country, state etc.). Some examples of resources that are pooled are storage, bandwidth, memory and processing. Rapid Elasticity: Sometimes what happens that the consumers demand is very high at point of time, so in order to avoid delay at the consumer end the cloud has a most important feature called as scalability, the resources are provided to the consumer can be elastically provisioned and released. Measured Service:Service provider charges user on the basis of their usage of cloud servicei.e. pay per usage Copyright to IJARCCE DOI /IJARCCE
2 policy. Types of services like storage, processing, bandwidth etc. are leveraged at some level of abstraction as cloud system automatically control and optimize resources. And the monitoring, controlling and reporting of resources usage are done in order to provide transparency for provider as well as for consumer using the service. The rest of the paper is organized as follows. Section 2 gives an overview of Database as a service. Section 3 describes the specific issues with respect to the database as a service. Section 4 discusses about the secured database system/architecture by different authors for the security issue of database as a service. Section 5 focuses on inferences. We conclude the paper in section 6. II. DATABASE AS A SERVICE Database as a service is a new emerging cloud service model which is a subtype of SAAS or PAAS like any other services in cloud this is also provided on the pay per usage policy. Database as a service means outsourcing your database in which the database is deployed on the cloud environment which is to be maintained by the service provider; due to this it reduces the overhead of installation, storage and maintenance of the database on client machine. Outsourcing of database is widely accepted by the consumer because now a day s database contains much information and its size exceeds to Gigabyte, so it s better to use database as a service. In database as a service environment client machine must be lightweight, possibly just accessing the cloud database through browser. Database as a service is provided in 2 way 1) we buy the infrastructure as service from the cloud service provider, we deploy our choice of database, maintain it and use as per our need 2) We can subscribe for Database as a service in this we just need to connect our application with the database and rest will be done by the database service provider. III. ISSUES IN DATABASE AS A SERVICE Cloud computing has become the boon in last few decades but still there are several issues which are of major concern and need to mitigate those issues. The most important issue is the data privacy, as our data is on the cloud so we are always in the insecurity of confidentiality, integrity and availability of our data. Some of the issues/threats that were focused in cloud security alliance were: Data Loss, Data breaches, Insecure API, Denial of service, Abuse of cloud service etc [10]. Migrating database on cloud reduces the overhead of hardware cost and maintenance but brings the various security concerns with respect to the database security. To ensure the confidentiality of the data which is stored at the cloud database must be properly encrypted. To ensure integrity, the access to the data stored at cloud database provider s platform needs to be controlled and monitored properly for all users including the database administrators. A. Database Security Challenges on Cloud[13] Availability:Availability in simple terms means the extent to which system resources are accessible and usable to individual users or organizations.. It is one of the critical security aspects that organizations need to take into account when considering cloud database services. Database does not require 100% availability but some of the application suffers a lot if database is down for certain period of time. Moreover, the level of availability of a cloud database service, data backup options and disaster recovery mechanisms should be addressed properly within an organization before considering a move to cloud environment. Access Control Issues in Public Cloud: As we are outsourcing the database on cloud we loss the logical, physical and personnel access control and due to this it brings the inbuilt security risk. Therefore proper access control procedures must be used by the service provider for ensuring security of the data. Data Breach: As our data is on the cloud environment so it is always vulnerable to attacks. By these attacks one client s application could allow an attacker access not only to that client s data, but every client s data over the same cloud. Malicious Insider:In this the data which is there on the cloud is not only vulnerable to attacks by attacker but also by malicious insider like DBA or cloud service provider. Apart from the above security challenges the other security challenges are data sanitization,data loss, Insecure API, Denial of service, Abuse of cloud serviceetc. IV. SECURED DATABASE SYSTEM/ARCHITECTURE In this section we have covered 2 methods proposed by different researchers for providing security to the database on cloud. A. CryptDB [3] It is a system proposed by the researcher Of MIT for processing queries over encrypted data. The goal of crypt db system is to provide confidentiality of the data. CryptDB protects against two types of threats to confidentiality: 1)the curious in-house or 3 rd party DBA with full access to the DBMS, who reads but doesn t alter data or queries 2) an attacker who has taken control of the DBMS and application s and can access the encryption keys.the design challenge of the crypt DB system is to minimize the amount of confidential information to the DBMS sever and minimizing the amount of decrypted data. To address these challenges crypt Db uses 1) Introduce a db proxy which executes queries over encrypted data 2) SQL aware encryption strategy i.e. onions of encryption. Copyright to IJARCCE DOI /IJARCCE
3 Figure 2 CryptDB Architecture [3] The above figue-2 shows the architecture of crypt DB consisting of application, CryptDB proxy and DBMS. Application Server: runs the application code and issues DBMS queries on behalf of one or more users is modified so that it provides the db proxy with encryption key DBMS : All its data is encrypted including tables& columns still it executes the queries over encrypted data assuming as it is executing the plain query. It has user defined functions (UDFs) installed to allow it to compute on ciphertexts for certain operations. It also has some auxiliary tables (ex. Encrypted keys) used by the db proxy Proxy Server: It is the important block of the entire architecture as all the encryption, decryption and key management is handled by the proxy. It also stores the key for keeping the track of current level of onion encryption 1) Processing Queries in CryptDB: Db proxy intercepts application s query and rewrites it by identifying table and column names & encrypting constants with the key of the encryption scheme best suited for the operation and the user. Db proxy checks if the DBMS needs to adjust encryption level before executing the query if yes issue an UPDATE query that invokes a UDF to adjust the encryption level layer of the appropriate columns Db proxy sends the encrypted query to the DBMS DBMS executes query using standard SQL (invoking UDFs for aggregation or keyword searches) and returns the encrypted results Db proxy intercepts and decrypts results, and sends them to the application 2) User Defined Function[7]: A function contains instructions in order to perform a specific task, and provides to repeat this task easily. Userdefined function is also a function, and it is created by a user. This user needs to have permissions to perform the processes in the database, or database owner abbreviated as dbo can be used. Dbo is a user which can perform all activities in the database. If there exist a table called square which has two columns as edge length and order number of the square, then a UDF is written to calculate the area of the squares inside the database.the following table-1 is a sample square table. Table I Sample square table [7] Square Number Edge Length Here is an example of creating a UDF. Create function dbo.area (edge float) returns float return (edge*edge). An example query to use this UDF can be like as follows: Select number, area (edge length) as Area from Square; Table II SQL result [7] Number Area ) Onion Layer of Encryption: The figure 3 describes about the onion layer of encryption. There are 7 different layer of encryption considering outermost to be the most secured layer of encryption. Inner onion layers are progressively weaker and are accessed as required by the query Figure 3 Onion Layer of Encryption [3] Table III Onion Layer of Encryption Onion Encryption Operation Randomized Encryption Most secured, used with select but no predicates. Deterministic Encryption Allows equality check, used with selects with equality predicate Homomorphic Encryption Enables addition and multiplication operations. Equi-Join It is used For equality check Range Join Occurs rarely, involves order check Word(Search) allows LIKE on full word searches, but not regular expressions, and requires a call to a UDF Copyright to IJARCCE DOI /IJARCCE
4 B. Monomi[6] ISSN (Online) Monomiarchitecture consists of 3 major components as shown in the figure 4 below. Figure 4 Monomi Architecture [6] First Monomi designer run on trusted client machine for design of untrusted. Second, during normal operation, applications issue unmodified SQL queries using the MONOMI ODBC library, which is the only component that has access to the decryption keys. The ODBC library uses the planner to determine the best split client/ execution Plan for the application s query. Third, Library issues more than one query to the encrypted database, which does not have access to the decryption keys and can execute operations over encrypted data. After the processing is done the result is sent to the client library which has access to the decryption key there the result is decrypted and output is given back to application. 1) Split client/ execution:in this technique there are some queries which cannot be only executed on itself. So monomi suggested the split client/ execution where part of query is executed on and then the intermediate result is fetched by client and further processing is computed on the client machine. For selecting the best split client/ execution we need proper designer and planner. 2) Designer and Planner:The goal of MONOMI s designer is to decide how to encrypt the data (physical design). MONOMI s planner, on the other hand, determines how to best execute queries given a particular physical design. MONOMI s designer is invoked during the setup phase, when the user is preparing to load his database into MONOMI. The user provides the designer with a query workload (n queries). The query workload does not need to exhaustively enumerate every possible query the user will run, but it should be representative of the operations that the user is expecting to perform over the data. The user also provides a sample of the data that will be loaded into the database, which is used for estimating statistics about the data, and need not be the exact data that will be eventually loaded on the. V. INFERENCES The following table gives the detailed information about the onion layer of encryptions. These encryptions are applied on the basis of the input query, for example if any query related to equality operation comes as an input query then deterministic layer of encryption is applied on that query. Table IV Detailed SQL aware encryption in CryptDB Sr. CryptDB NO 1 It executes query over encrypted data Table V CryptDB VS Monomi 2 Architecture is divided into 3 major components: 1 application 2 proxy 3 DBMS 3 It uses onion layer of encryption 4 It executes queries on 5 CryptDB executes 4 out of 22 TPCH queries [5] Crypt Db Advantages: 1) Designed for OLTP queries Monomi It is first system for executing analytical workload over encrypted data. Architecture is divided into 3 major components: 1 Monomi s designer 2 Monomi s ODBC library 3 execution plan(designer and planner) It is based on CryptDB encryption scheme Execution of query is splitted between client and Monomi executes 19 out of 22 TPCH queries[5] 2) Capability of executing queries over encrypted data. 3) Dynamically adjusting encryption level 4) Minimum information leakage on untrusted Disadvantages: 1) No efficient additive + multiplicative Homomorphic cryptosystem. 2) No efficient additive + order preserving Homomorphic cryptosystem. Monomi System Advantages Scheme Operation Details RND None AES HOM +,* Paillier DET Equality AES in CTR Search Like Song s Search OPE Order Boldyreva et al. 09 1) First system for executing analytical queries over encrypted data. 2) Execution of query is splitted between client and Copyright to IJARCCE DOI /IJARCCE
5 3) It improves the query performance Disadvantages: 1) Increased hardware cost. 2) Complex system setup. VI. CONCLUSION Cloud computing is the emerging field in IT industry and many of the things are now migrated to cloud due to the reducing hardware cost and pay per usage service. It provides various services like infrastructure, Platform, Software to the users and recently started with database as a service for the cloud. This paper discuss about the database as a service for cloud and its security challenges like data loss, availability, access control in public cloud, data ingerity etc. To overcome these security challenges we had discussed about cryptdb system which works with the onion layer of encryption and is efficient for executing queries over the encrypted data it applies the layer of encryption on the basis of input query but cryptdb does not support additive+multiplicative homomorphic cryptosystem. After that we had discussed Monomi which is the first sytem for executing analytical workload over encrypted data it excutes 19/22 tpch queries which is more as compared to cryptdb s 4/22[7], execution of query is splitted on client and. REFERENCES [1] "NIST Cloud Computing Definition", NIST SP [2] Carlo Curino, Evan Jones, RalucaPopa, Nirmesh Malviya, Eugene Wu, Sam Madden, Hari Balakrishnan, Nickolas Zeldovich, Relational Cloud: a Database Service for the cloud, Conference On Innovative Data Centre and Research,2011. [3] Raluca Ada Popa, Catherine M. S. Redfield, Nickolas Zeldovich, and Hari Balakrishnan, Crypt DB: Protecting Confidentiality with Encrypted Query Processing, Symposium on Operating Systems Principles, [4] Carlo Curino, Yang Zhang, E van Jones, Sam Madden, Schism: a Workload-Driven Approach to Database Replication and Partitioning, Very Large Databases, [5] Database as a service: [6] Stephen Tu, M. Frans Kaashoek, Samuel Madden, Nickolas Zeldovich. Processing analytical queries over encrypted data, Very Large Databases, [7] Mehmet Sabir Kiraz, Fatih Birinci and Ziynet Nesibe Dayıo Secure Database in Cloud Computing: Crypt DB Revisited, International Journal Of Information Security Science, [8] CloudComputing: [9] Atul Kahate Cryptography and Network Security Tata McGraw- Hill,3 rd edition, 2013 [10] Aaron Alva, Olivier Caleff, Greg Elkins, Allen Lum, Keith Pasley, Satheesh Sudarsan, Vinoth Sivasubramanian, and Rajeev Venkitaraman, The Nortorious Nine Cloud Computing Threats, [11] Weis Joel, Jim Alve-foss, Securing database as a service issues and compromises,ieee, , vloume 9, issue 6, 2011 [12] HakanHacıg um us,balaiyer,sharad Mehrotra, Providing database as a service, IEEE, , 2002 [13] Imal sakhi, Database Security in The Cloud 2012 ACKNOWLEDGMENT This literature review was supported by my mentor Prof. Swarnalata Bollavarapu. I am grateful to her for sharing her pearls of wisdom with me during this literature work. BIOGRAPHIES Ms. Swarnalata Bollavarapu has received M.E. (Computer Engg.) from Thadomal Shahani Engineering College, Mumbai. She has around 10 years of teaching experience. She iscurrently working as Assistant professor in Department of Computer Engg.at MPSTME, NMIMS University,Mumbai. Mr. Kamal Mistry has received B.E. (Computer Engg) from Vidyalankar Institute of Technology, Mumbai. He is currently pursuing M-Tech in Computer Science at MPSTME, NMIMS University, Mumbai. Copyright to IJARCCE DOI /IJARCCE
Cloud Security Introduction and Overview
Introduction and Overview Klaus Gribi Senior Security Consultant [email protected] May 6, 2015 Agenda 2 1. Cloud Security Cloud Evolution, Service and Deployment models Overview and the Notorious
The Magical Cloud. Lennart Franked. Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall.
The Magical Cloud Lennart Franked Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall. 2014-10-20 Lennart Franked (MIUN IKS) The Magical Cloud 2014-10-20 1 / 35
Security Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
Cloud Computing Security Issues And Methods to Overcome
Cloud Computing Security Issues And Methods to Overcome Manas M N 1, Nagalakshmi C K 2, Shobha G 3 MTech, Computer Science & Engineering, RVCE, Bangalore, India 1,2 Professor & HOD, Computer Science &
A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining
10/25/2012 BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH [email protected]. Agenda. Security Cases What is Cloud? Road Map Security Concerns
BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH [email protected] Agenda Security Cases What is Cloud? Road Map Security Concerns 1 Security Cases on Cloud Data Protection - Two arrested in ipad
Cloud Courses Description
Courses Description 101: Fundamental Computing and Architecture Computing Concepts and Models. Data center architecture. Fundamental Architecture. Virtualization Basics. platforms: IaaS, PaaS, SaaS. deployment
Managing Cloud Computing Risk
Managing Cloud Computing Risk Presented By: Dan Desko; Manager, Internal IT Audit & Risk Advisory Services Schneider Downs & Co. Inc. [email protected] Learning Objectives Understand how to identify
Cloud Courses Description
Cloud Courses Description Cloud 101: Fundamental Cloud Computing and Architecture Cloud Computing Concepts and Models. Fundamental Cloud Architecture. Virtualization Basics. Cloud platforms: IaaS, PaaS,
See Appendix A for the complete definition which includes the five essential characteristics, three service models, and four deployment models.
Cloud Strategy Information Systems and Technology Bruce Campbell What is the Cloud? From http://csrc.nist.gov/publications/nistpubs/800-145/sp800-145.pdf Cloud computing is a model for enabling ubiquitous,
A Review on Cloud Computing Vulnerabilities
A Review on Cloud Computing Vulnerabilities Ms. Sugandha Nandedkar, Ms.Sangeeta Kakarwal Asst.Prof., Department of Computer Science and Engineering, DIEMS /Dr. BAMU, Aurangabad, MH, India. Prof. and HOD,
Cloud Computing. What is Cloud Computing?
Cloud Computing What is Cloud Computing? Cloud computing is where the organization outsources data processing to computers owned by the vendor. Primarily the vendor hosts the equipment while the audited
A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing
International Journal of Emerging Engineering Research and Technology Volume 3, Issue 5, May 2015, PP 1-7 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) A Survey on Security Issues and Security Schemes
CHAPTER 8 CLOUD COMPUTING
CHAPTER 8 CLOUD COMPUTING SE 458 SERVICE ORIENTED ARCHITECTURE Assist. Prof. Dr. Volkan TUNALI Faculty of Engineering and Natural Sciences / Maltepe University Topics 2 Cloud Computing Essential Characteristics
Tackling The Challenges of Big Data. Tackling The Challenges of Big Data Big Data Systems. Security is a Negative Goal. Nickolai Zeldovich
Introduction is a Negative Goal No way for adversary to violate security policy Difficult to achieve: many avenues of attack 1 Example: Confidential Database Application server Database server Approach:
Keyword: Cloud computing, service model, deployment model, network layer security.
Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging
[email protected] [email protected]
1 The following is merely a collection of notes taken during works, study and just-for-fun activities No copyright infringements intended: all sources are duly listed at the end of the document This work
International Research Journal of Engineering and Technology (IRJET) e-issn: 2395-0056. Volume: 02 Issue: 05 Aug-2015 www.irjet.net p-issn: 2395-0072
Fear of Cloud Vinnakota Saran Chaitanya 1, G. Harshavardhan Reddy 2 1 UG Final year student, Department of Computer Science and Engineering, G. Pulla Reddy Engineering College, Andhra Pradesh, India 2
A Survey on Cloud Security Issues and Techniques
A Survey on Cloud Security Issues and Techniques Garima Gupta 1, P.R.Laxmi 2 and Shubhanjali Sharma 3 1 Department of Computer Engineering, Government Engineering College, Ajmer [email protected]
East African Information Conference 13-14 th August, 2013, Kampala, Uganda. Security and Privacy: Can we trust the cloud?
East African Information Conference 13-14 th August, 2013, Kampala, Uganda Security and Privacy: Can we trust the cloud? By Dr. David Turahi Director, Information Technology and Information Management
A STUDY ON CLOUD STORAGE
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 5, May 2014, pg.966
White Paper on CLOUD COMPUTING
White Paper on CLOUD COMPUTING INDEX 1. Introduction 2. Features of Cloud Computing 3. Benefits of Cloud computing 4. Service models of Cloud Computing 5. Deployment models of Cloud Computing 6. Examples
What Cloud computing means in real life
ITU TRCSL Symposium on Cloud Computing Session 2: Cloud Computing Foundation and Requirements What Cloud computing means in real life Saman Perera Senior General Manager Information Systems Mobitel (Pvt)
Cloud Computing 159.735. Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009
Cloud Computing 159.735 Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009 Table of Contents Introduction... 3 What is Cloud Computing?... 3 Key Characteristics...
Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao Guocui.gao@tufts.
Tufts University Department of Computer Science COMP 116 Introduction to Computer Security Fall 2014 Final Project Investigating Security Issues in Cloud Computing Guocui Gao [email protected] Mentor:
CLOUD DATABASE DATABASE AS A SERVICE
CLOUD DATABASE DATABASE AS A SERVICE Waleed Al Shehri Department of Computing, Macquarie University Sydney, NSW 2109, Australia [email protected] ABSTRACT Cloud computing has been the
Security Issues In Cloud Computing and Countermeasures
Security Issues In Cloud Computing and Countermeasures Shipra Dubey 1, Suman Bhajia 2 and Deepika Trivedi 3 1 Department of Computer Science, Banasthali University, Jaipur, Rajasthan / India 2 Department
5-Layered Architecture of Cloud Database Management System
Available online at www.sciencedirect.com ScienceDirect AASRI Procedia 5 (2013 ) 194 199 2013 AASRI Conference on Parallel and Distributed Computing and Systems 5-Layered Architecture of Cloud Database
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS CLOUD COMPUTING Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing
NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015
NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X
Cloud Computing; What is it, How long has it been here, and Where is it going?
Cloud Computing; What is it, How long has it been here, and Where is it going? David Losacco, CPA, CIA, CISA Principal January 10, 2013 Agenda The Cloud WHAT IS THE CLOUD? How long has it been here? Where
Optimized Multi-tenancy Secure mechanism in SPI Cloud Architecture
Volume 1, No. 12, February 2013 ISSN 2278-1080 The International Journal of Computer Science & Applications (TIJCSA) RESEARCH PAPER Available Online at http://www.journalofcomputerscience.com/ Optimized
Cloud Computing Services and its Application
Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 1 (2014), pp. 107-112 Research India Publications http://www.ripublication.com/aeee.htm Cloud Computing Services and its
Secure and Efficient Data Storage in Multi-clouds
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 9 (2013), pp. 977-984 International Research Publications House http://www. irphouse.com /ijict.htm Secure
International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 Software as a Model for Security in Cloud over Virtual Environments S.Vengadesan, B.Muthulakshmi PG Student,
What Is The Cloud And How Can Your Agency Use It. Tom Konop Mark Piontek Cathleen Christensen
What Is The Cloud And How Can Your Agency Use It Tom Konop Mark Piontek Cathleen Christensen Video Computer Basics: What is the Cloud What is Cloud Computing Cloud Computing Basics The use of the word
Chapter 19 Cloud Computing for Multimedia Services
Chapter 19 Cloud Computing for Multimedia Services 19.1 Cloud Computing Overview 19.2 Multimedia Cloud Computing 19.3 Cloud-Assisted Media Sharing 19.4 Computation Offloading for Multimedia Services 19.5
ADVANCE SECURITY TO CLOUD DATA STORAGE
Journal homepage: www.mjret.in ADVANCE SECURITY TO CLOUD DATA STORAGE ISSN:2348-6953 Yogesh Bhapkar, Mitali Patil, Kishor Kale,Rakesh Gaikwad ISB&M, SOT, Pune, India Abstract: Cloud Computing is the next
IS PRIVATE CLOUD A UNICORN?
IS PRIVATE CLOUD A UNICORN? With all of the discussion, adoption, and expansion of cloud offerings there is a constant debate that continues to rear its head: Public vs. Private or more bluntly Is there
Cloud Computing. Karan Saxena * & Kritika Agarwal**
Page29 Cloud Computing Karan Saxena * & Kritika Agarwal** *Student, Sir M. Visvesvaraya Institute of Technology **Student, Dayananda Sagar College of Engineering ABSTRACT: This document contains basic
Harnessing the Power of the Microsoft Cloud for Deep Data Analytics
1 Harnessing the Power of the Microsoft Cloud for Deep Data Analytics Today's Focus How you can operate your business more efficiently and effectively by tapping into Cloud based data analytics solutions
What is Cloud Computing? First, a little history. Demystifying Cloud Computing. Mainframe Era (1944-1978) Workstation Era (1968-1985) Xerox Star 1981!
Demystifying Cloud Computing What is Cloud Computing? First, a little history. Tim Horgan Head of Cloud Computing Centre of Excellence http://cloud.cit.ie 1" 2" Mainframe Era (1944-1978) Workstation Era
Cloud Computing. Course: Designing and Implementing Service Oriented Business Processes
Cloud Computing Supplementary slides Course: Designing and Implementing Service Oriented Business Processes 1 Introduction Cloud computing represents a new way, in some cases a more cost effective way,
A Survey on Scalable Data Security and Load Balancing in Multi Cloud Environment
IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 8 January 2015 ISSN (online): 2349-6010 A Survey on Scalable Data Security and Load Balancing in Multi Cloud
The NIST Definition of Cloud Computing
Special Publication 800-145 The NIST Definition of Cloud Computing Recommendations of the National Institute of Standards and Technology Peter Mell Timothy Grance NIST Special Publication 800-145 The NIST
Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India [email protected]
IJCSIT, Volume 1, Issue 5 (October, 2014) e-issn: 1694-2329 p-issn: 1694-2345 A STUDY OF CLOUD COMPUTING MODELS AND ITS FUTURE Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India
Processing Analytical Queries over Encrypted Data
Processing Analytical Queries over Encrypted Data Stephen Tu M. Frans Kaashoek Samuel Madden Nickolai Zeldovich MIT CSAIL ABSTRACT MONOMI is a system for securely executing analytical workloads over sensitive
Cloud Security and Algorithms: A Review Divya saraswat 1, Dr. Pooja Tripathi 2 1
Cloud Security and Algorithms: A Review Divya saraswat 1, Dr. Pooja Tripathi 2 1 M.Tech Dept. of Computer Science, IPEC, Ghaziabad, U.P. 2 Professor, Dept. of Computer science, IPEC, Ghaziabad, U.P. Abstract:
Cloud Database Storage Model by Using Key-as-a-Service (KaaS)
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 7 July 2015, Page No. 13284-13288 Cloud Database Storage Model by Using Key-as-a-Service (KaaS) J.Sivaiah
William Saichek Professor, Computer Science & Information Systems Orange Coast College
William Saichek Professor, Computer Science & Information Systems Orange Coast College What is Cloud Computing What is Cloud Computing The Internet is NOT the cloud Virtualization is NOT the cloud Storage
Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication
Volume 4, Issue 6, June 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Three Layered
AskAvanade: Answering the Burning Questions around Cloud Computing
AskAvanade: Answering the Burning Questions around Cloud Computing There is a great deal of interest in better leveraging the benefits of cloud computing. While there is a lot of excitement about the cloud,
Running head: TAKING A DEEPER LOOK AT THE CLOUD: SOLUTION OR 1
Running head: TAKING A DEEPER LOOK AT THE CLOUD: SOLUTION OR 1 Taking a Deeper Look at the Cloud: Solution or Security Risk? LoyCurtis Smith East Carolina University TAKING A DEEPER LOOK AT THE CLOUD:
Fully homomorphic encryption equating to cloud security: An approach
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 9, Issue 2 (Jan. - Feb. 2013), PP 46-50 Fully homomorphic encryption equating to cloud security: An approach
Cloud Computing Services In Libraries: An Overview
9 th Convention PLANNER 2014 Cloud Computing Services In Libraries... Cloud Computing Services In Libraries: An Overview Shekar HP Muttayya Konganurmath Abstract The purpose of this paper is to provide
Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption
Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer
Security Issues in Cloud Computing
Security Issues in Cloud Computing Dr. A. Askarunisa Professor and Head Vickram College of Engineering, Madurai, Tamilnadu, India N.Ganesh Sr.Lecturer Vickram College of Engineering, Madurai, Tamilnadu,
Cloud Computing: Opportunities, Challenges, and Solutions. Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University
Cloud Computing: Opportunities, Challenges, and Solutions Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University What is cloud computing? What are some of the keywords? How many of you cannot
Cloud Computing - Architecture, Applications and Advantages
Cloud Computing - Architecture, Applications and Advantages 1 Arun Mani Tripathi 2 Rizwan Beg NIELIT Ministry of C&I.T., Govt. of India 2 Prof. and Head, Department 1 of Computer science and Engineering,Integral
How To Understand Cloud Usability
Published in proceedings of HCI International 2015 Framework for Cloud Usability Brian Stanton 1, Mary Theofanos 1, Karuna P Joshi 2 1 National Institute of Standards and Technology, Gaithersburg, MD,
Security Considerations for Public Mobile Cloud Computing
Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea [email protected] 2 Research Institute of
Research Paper Available online at: www.ijarcsse.com A COMPARATIVE STUDY OF CLOUD COMPUTING SERVICE PROVIDERS
Volume 2, Issue 2, February 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: A COMPARATIVE STUDY OF CLOUD
Cloud Computing Guide & Handbook. SAI USA Madhav Panwar
Cloud Computing Guide & Handbook SAI USA Madhav Panwar Background 2010 WGITA approved the cloud computing project with SAI USA as lead and Canada & India as members 2011 A status report was presented and
Cloud & Security. Dr Debabrata Nayak [email protected]
Cloud & Security Dr Debabrata Nayak [email protected] AGENDA General description of cloud Cloud Framework Top issues in cloud Cloud Security trend Cloud Security Infrastructure Cloud Security Advantages
REQUEST FOR INFORMATION FLORIDA AGENCY FOR STATE TECHNOLOGY CLOUD SERVICES AND SOLUTIONS RFI NO.: 150925
I. PURPOSE REQUEST FOR INFORMATION FLORIDA AGENCY FOR STATE TECHNOLOGY CLOUD SERVICES AND SOLUTIONS RFI NO.: 150925 The State of Florida, Agency for State Technology (AST), hereby issues this Request for
Cloud computing: benefits, risks and recommendations for information security
Cloud computing: benefits, risks and recommendations for information security Dr Giles Hogben Secure Services Programme Manager European Network and Information Security Agency (ENISA) Goals of my presentation
A Study of Infrastructure Clouds
A Study of Infrastructure Clouds Pothamsetty Nagaraju 1, K.R.R.M.Rao 2 1 Pursuing M.Tech(CSE), Nalanda Institute of Engineering & Technology,Siddharth Nagar, Sattenapalli, Guntur., Affiliated to JNTUK,
Cloud Computing for Libraries: A SWOT Analysis
Cloud Computing for Libraries: A SWOT Analysis 8 th Convention PLANNER 2012 Abstract Cloud Computing for Libraries: A SWOT Analysis Miteshkumar Pandya This paper provides brief information on cloud computing
How To Run A Cloud Computer System
Cloud Technologies and GIS Nathalie Smith [email protected] Agenda What is Cloud Computing? How does it work? Cloud and GIS applications Esri Offerings Lots of hype Cloud computing remains the latest, most
Clinical Trials in the Cloud: A New Paradigm?
Marc Desgrousilliers CTO at Clinovo Clinical Trials in the Cloud: A New Paradigm? Marc Desgrousilliers CTO at Clinovo What is a Cloud? (1 of 3) "Cloud computing is a model for enabling convenient, on-demand
Database Management System as a Cloud Service
Database Management System as a Cloud Service Yvette E. Gelogo 1 and Sunguk Lee 2 * 1 Society of Science and Engineering Research Support, Korea [email protected] 2 Research Institute of Industrial Science
preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.
Privacy-Preserving Public Auditing For Secure Cloud Storage ABSTRACT: Using cloud storage, users can remotely store their data and enjoy the on-demand high-quality applications and services from a shared
A Proxy-Based Data Security Solution in Mobile Cloud
, pp. 77-84 http://dx.doi.org/10.14257/ijsia.2015.9.5.08 A Proxy-Based Data Security Solution in Mobile Cloud Xiaojun Yu 1,2 and Qiaoyan Wen 1 1 State Key Laboratory of Networking and Switching Technology,
Verifying Correctness of Trusted data in Clouds
Volume-3, Issue-6, December-2013, ISSN No.: 2250-0758 International Journal of Engineering and Management Research Available at: www.ijemr.net Page Number: 21-25 Verifying Correctness of Trusted data in
Cloud computing is a marketing term for technologies that provide servers, outside of the firewall, for:
Peter Hirsch Cloud computing is a marketing term for technologies that provide servers, outside of the firewall, for: Computation Software Applications Data access Storage services.that do not require
Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst
Clouds on the Horizon Cloud Security in Today s DoD Environment Bill Musson Security Analyst Agenda O Overview of Cloud architectures O Essential characteristics O Cloud service models O Cloud deployment
DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing WHAT IS CLOUD COMPUTING? 2
DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing Slide 1 Slide 3 A style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet.
Essential Characteristics of Cloud Computing: On-Demand Self-Service Rapid Elasticity Location Independence Resource Pooling Measured Service
Cloud Computing Although cloud computing is quite a recent term, elements of the concept have been around for years. It is the maturation of Internet. Cloud Computing is the fine end result of a long chain;
http://www.cisjournal.org Security Framework for Cloud Computing Environment: A Review Ayesha Malik, Muhammad Mohsin Nazir
Security Framework for Cloud Computing Environment: A Review Ayesha Malik, Muhammad Mohsin Nazir Department of Computer Science Lahore College for Women University, Lahore, Pakistan. [email protected],
ABSTRACT: [Type text] Page 2109
International Journal Of Scientific Research And Education Volume 2 Issue 10 Pages-2109-2115 October-2014 ISSN (e): 2321-7545 Website: http://ijsae.in ABSTRACT: Database Management System as a Cloud Computing
Choosing Encryption for Microsoft SQL Server
Choosing Encryption for Microsoft SQL Server www.securityfirstcorp.com 29811 Santa Margarita Pkwy Rancho Santa Margarita, CA 92688 888-884-7152 CONTENTS Database Security Issues 3 Balancing Database Security
Improving data integrity on cloud storage services
International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services
International Journal of Advanced Research in Computer Science and Software Engineering
Volume 3, Issue 2, February 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Review on
An Efficient data storage security algorithm using RSA Algorithm
An Efficient data storage security algorithm using RSA Algorithm Amandeep Kaur 1, Sarpreet Singh 2 1 Research fellow, Department of Computer Science and Engineering, Sri Guru Granth Sahib World University,
Secure Cloud Computing through IT Auditing
Secure Cloud Computing through IT Auditing 75 Navita Agarwal Department of CSIT Moradabad Institute of Technology, Moradabad, U.P., INDIA Email: [email protected] ABSTRACT In this paper we discuss the
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department
Cloud Computing Architecture: A Survey
Cloud Computing Architecture: A Survey Abstract Now a day s Cloud computing is a complex and very rapidly evolving and emerging area that affects IT infrastructure, network services, data management and
Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.
Secure Privacy-Preserving Cloud Services. Abhaya Ghatkar, Reena Jadhav, Renju Georgekutty, Avriel William, Amita Jajoo DYPCOE, Akurdi, Pune [email protected], [email protected], [email protected],
How To Get A Cloud Based System In Your Country
Cloud Computing: BY Mesay Hailemariarm Moreda, Team Leader, government Applications and electronic Services, MCIT, Ethiopia June, 2012 Infrastructure Services Number of Users (Oct. 2011) Capacity in 5
