The allocation algorithm for data centers in cloud computing architecture from security perspective
|
|
|
- Julianna Jackson
- 9 years ago
- Views:
Transcription
1 The allocation algorithm for data centers in cloud computing architecture from security perspective *Chuan-Gang Liu 1,Hsin-Yi Lin, Kun-Ta Hsien Deparament of Information Technology, Chia Nan University of Pharmacy & Science 1 *60,Erh-Jen RD.,Sec.1,Jen-Te,Tainan, R.O.C. * [email protected] *Phone: Ext.5705 *Fax: Abstract The distributed cloud system provides the customers cloud services efficiently, which includes infrastructure (IaaS), software (SaaS) and Platform (PaaS) services. With such system, a lot of cost is saved and it becomes easy to deploy network services for Internet content providers, which just follows pay-by-use models. However, security is a main concern for cloud customers. However, in distributed cloud architecture, each data center should apply on-demand security mechanism and it is complex and costly. Hence, this paper proposes datacenters should be classified as two categories, high security datacenter and normal datacenter. However, the issue of allocation of high security datacenter arises and we propose allocation algorithms for high security datacenters considering security parameters in the distributed cloud architecture. We analyze the combination of those parameters and develop several algorithms. Among them, the proposed iterative algorithm preferring security parameters achieves our goal of this paper, high security. It facilitates the computation of the location of high security datacenters based on iterative searching in a solution pool of a basic algorithm. Hence, in this paper, we design several algorithms and provide an adequate algorithm to place high security datacenters, which is very helpful for cloud security and provides robust cloud architecture. Keywords distributed cloud, security, allocation of the datacenter 1. INTRODUCTION Recently, cloud computing attracts much attention in multiple fields. In fact, the similar concept behind this technique has been implemented in Distributed computing, Grid computing and Utility computing. However, the cloud computing employs business model (payby-use) to provide the cloud users service in different forms, including infrastructure (IaaS), software (SaaS) and Platform (PaaS). Fig. 1 shows the conceptual usage of distributed cloud architecture (Datacenters denotes ). Although cloud users can benefit from low-cost cloud resource, security is a main concern for cloud customers. Cloud business users doubt whether business data is protected well from hackers attack. People also concern about whether their privacy are accessed illegally. Security is a main key point to persuade people to use third-party cloud resource trustfully. IaaS Cloud users SaaS Distributed Cloud architecture Fig. 1: The conceptual usage of distributed cloud architecture. Security researches in cloud architecture propose many solutions. The authors in [1] survey many intrusion detection techniques in cloud. They introduce many possible intrusion situations and then survey various IDS and IPS techniques used in cloud computing. The details of this survey please refer to [1]. Beside, employing Secure Socket Layer/Transport Layer Security (SSL/TLS) protocols, IPSec, to protect network connection against the threats is traditional and popular network security mechanism. Other antivirus techniques are like Firewall, virus detection, authentication, authorization, access control[6] etc., which are used to address various possible attacks. Based on the observation of the source of PaaS
2 security threats, we can find the security scale is wide. Basically, a well-designed security policy in cloud architecture should cover three domains, including network, service and storage security. However, deploying such large-scale security protection is complex and costly. Further, all cloud service employing the same security policy is not necessary. Research [2] proposes ondemand security architecture that each demand for cloud service can apply different security algorithm in three security domain. Cloud users just specify security level through web management interface without full knowledge about security. Such on-demand security architecture really meets each cloud service s security requirement ideally. However, in distributed cloud architecture, to implement this architecture, each data center should apply ondemand security mechanism and it is still complex and costly. Usually, the amount of critical and secret services is only small portion of all services in cloud. To protect such few services needs many network, service and storage security schemes, and this is not economy security solution. This paper proposes data centers should be divided into different categories according to different security levels. Critical cloud services should be assigned to data centers of high security level. However, the issue of allocation of high security datacenter in widescale distributed cloud architecture arises. And we propose allocation algorithms for high security datacenters considering security parameters in the distributed cloud architecture. To save the deployment cost of cloud security, this paper proposes to allocate the fixed number of high security level datacenters (we call these data centers as HLs and other data centers as normal datacenters Ns thereafter) in distributed cloud architecture. However, there are some issues to locate HLs, including delay constraint, bandwidth requirement, security, etc. Furthermore, we also consider the impact of the number of HLs in cloud. Therefore our paper provides the following contribution: 1. To the best of our knowledge, this paper is the first to discuss the location of data centers with security consideration. 2. This paper proposes the allocation algorithms to locate fixed number of HLs with various security parameters and network constraints. 3. This paper discusses the various allocation algorithms in distributed cloud system and provides the analysis to design security cloud architecture. Based on our proposed cloud architecture, there are two types of cloud data center, HL and N. Usually, HL needs more conscientious security policy and complex security settings. This paper provides a guide to allocate HL in distributed cloud architecture. Our proposed cloud architecture can save much cost to deploy security function in distributed cloud architecture and achieve the similar security level with fully-deployed security cloud architecture. The rest of this paper is organized as follows. Section 2 describes related work about security researches in cloud architecture. Then, in section 3, we introduce the allocation schemes of HLs and discuss the difference among algorithms. Section 4 gives a series of analysis for our allocation algorithms. We conclude this paper in Section RELATED WORKS Previous work has paid much attention for the security in the cloud. Intrusion detection and prevention systems [1] are employed widely in cloud system. And honeypot technology is used to be a trap set to detect malicious actions[5]. Further, usually, we encourage cloud administrator to apply multiple security policies to authenticate cloud users, which can prevent normal users from various attacks. However, not all security methods are adequate to all cloud services. Previous research [1] divided cloud communication into three security domains. Each cloud service can require its security needs. Each datacenter should perform complex security functions to meet various security requirements of all cloud services, such as system resource management, admission control, various virus detection schemes, etc. Hence, in order to save the deployment cost of secure cloud architecture, allocating the fixed number of HLs is needed. However, the locations of those HLs should be planned well. The researches about location of data centers are also developed. [3] develops a framework and optimization problem to allocate datacenters based on the following parameters: cost, response time, consistency delay, availability and CO2 emissions. However, research in [3] mainly places all datacenters efficiently with lower cost. In [4], it introduces the problem of the Area Process Center location. The authors in [4] make a decision-making approach which contains four steps to solve that problem and they focus on the third step -
3 recommending APC combination, homing arrangement and APC sizes. The issue in our paper is different from those schemes. Those researches about allocating datacenter do not concern about the location of different kinds of datacenters. In our paper, we focus on the allocation scheme of HLs in distributed cloud architecture. These HDLCs are just less percentage of all data centers. Making use of previous solutions is not adequate. Hence, we describe our proposed scheme in the following content. 3. THE ALLOCATION SCHEME OF HLS IN DISTRIBUTED CLOUD ARCHITECTURE In this Section, we describe our allocation scheme with four sub-sections Our cloud architecture In our cloud architecture, we assume there are N cloud datacenters which be composed of n HLs and n Ns. Because there are just some HLs in the cloud, each cloud service user who have security requirement wants to access HLs closest to them. Hence, high availability and low response time are the main consideration for those cloud users. Furthermore, enough network bandwidth is also main concern. In this paper, we neglect the economic cost, including of land acquisition, datacenter construction, system administrator staff, etc. but only focus on the network factors and network security factors. However the location schemes of datacenters considering these parameters has been discussed in previous work. Reader can refer those works for the details The computation of the number of HLs First, we analyze the number of HLs needed by cloud service users. As we know, Virtualization technology is key technology, which facilitates the cloud service provision for Internet service provider. Hence, we use virtual machine (VM) as the available resource. Based on the following definition, we make some analysis to predict the number of HLs. Here, we assume that all VMs in a datacenter are the same for simplicity. TABLE I : THE PARAMETERS IN THE COMPUTATION OF THE NUMBER OF HL AND N VM Parameters N vm S u P n (t) Definition The number of VMs in a HL The number of users served by a HL, u The probability of n VMs requirement made by one user in a given time The expected number of VMs required by u in a given time We assume the distribution of P n (t) is Poisson distribution, which Poisson distribution is usually used to present the probability of network jobs. Hence, we can find Eq. 1 as follows. (1) The total number of expected number of VMs required by all users in a given time is divided by N vm as follows. ] (2) where N HL denotes the expected number of HLs in a given time. We define the function [a] in Eq. 2 as the integer part of a plus 1. As the result of Eq. 2, we discover each HL has some superfluous VMs to deal with sudden much lower load. These parameters should be figured based on historical data and this is beyond the scope of this paper. So far, we have recomputed the expected number of HLs. Now, we also consider a more real case which Var(N u (t)) exists. Under the premise that the number of VMs in a HL is fixed, N HL should increase as follows. N HL = (3) 3.3 The discussion of security parameters Based on the discussion of subsection 3.2, we know the expected number of HLs deployed in distributed cloud architecture. In this subsection, we discuss the consideration of deployment of HLs. Usually, in order to deploy datacenters should consider specified parameters. In this paper, we take the security parameters and network parameters into consideration. Security policy guides the security domains which cover three domains, network, storage and service security. Among them, network security mainly relates with the location of HLs.
4 Hence, we design the allocation algorithms of HLs with consideration of network factors affecting security. Due to observation of the communication from source to datacenter, each router along the routing path may encounter the attacks from the hackers. We assume one router, r, has a probability attacked by malicious users, which is denoted as P a (r). Usually, routers along a hot path possibly encounter much attack. Hence, we should avoid placing the location of HLs on this hot path. To choose an adequate the location, hop count and hot routes should be taken into consideration and we call them as security parameters. To concretize the abstraction of attack, we give each hop an attack coefficient, a. Usually, log records in each router can give the hint to define this coefficient. Besides, we should avoid the neglect of the network performance parameters, bandwidth and delay. Then, we design our subject equation L d and its goal is to discover the location of HLs with high security and high network performances. W h : the weight of the parameter of hop number; W d : the weight of the parameter of delay; W b : the weight of the parameter of bandwidth; W r : the weight of the parameter of the attack coefficient, a; H(s,d): the hop number between source(s) and the chosen datacenter(d); D(s,d): transmission time from source(s) to the chosen datacenter(d); B(s,d): the bottleneck bandwidth along a route from source(s) to the chosen datacenter(d); R(s,d): the sum of attack coefficients of all routers along route from source(s) to the chosen datacenter(d). Subject equation: maxi(l d )= W h / H(s,d) + W r / R(s,d) + W d / D(s,d) + B(s,d) W b (3) Constraint: W h,w d,w b,w r 0 D(s,d)<MaxDelay, which means the transmission time between(s,d) must be less than MaxDelay B(s,d)>MinBandwidth, which means the bottleneck bandwidth along a route from s to d should be larger than MinBandwidth. The latter two constraints are called as network constraint. Due to the applied parameters, our approach produces security-related cost for allocating the placement of HL, which is very different from other approaches. The relationship among the weights affects the allocating algorithms and we category these parameter weights into two groups, Security and Network- Related Parameter Weights(SRPW & NRPW). SRPW contains W h and W r ; NRPW contains W d and W b. The following cases analyses discuss various combinations of these two categories. Case I: NRPW>> SRPW In this extreme case, SRPW is not important and even can be neglected. The problem of allocating datacenters becomes the previous problem like [4]. We do not discuss it here. Case II: NRPW << SRPW In this case, NRPW can be neglected and security parameters dominate the equations of allocating datacenters (Eq.3). There are two circumstances in such case. W h >W r : The algorithm developed based on H(s,d) becomes the shortest path algorithm while W h is much larger than W r. Under this algorithm, the locations of most HLs will be located in the central area of distributed cloud system. They are easy to become obvious targets to be attacked by malicious users. Hence, HLs should be apart H hops from other ones. In this algorithm, we call it as SP+H. W h <W r : in this circumstances, the locations of HLs may be arbitrary, which just keeps them out of hot router. This algorithm is called as the Least Attack Coefficient algorithm (LA). As the cause of developing SP+H, we also modify LA as LA+H. We can see the algorithm developed based on single parameter should be not adequate. SP+H may still encounter much attack without considering W r. LA+H may locate HL close to specified end users and it causes unfair for other end users. Hence a robust algorithm should be developed with both parameters and we call it as LA+SP+H. However, the discovery of the datacenter location based on multiple metrics is like to discover an optimal path from source to destination with multiple metrics, which is NPhard problem. Hence, we discover our solution pool of LA+SP+H with iterative filtering. First, we find all possible solutions with LA+H, called as Loc LA+H. Then, we can filter the solutions in Loc LA+H with Eq. (3) adding hop count parameters. In this case, we do not consider network performance parameters and it cannot be accepted for high quality cloud services. Next, we discuss the case considering network performance and the following algorithm is developed by extending LA+SP+H.
5 process of the algorithm is also similar to SRPWfirst algorithm. 4. ANALYSIS Fig.2: the process of SRPW-first algorithm Case III: SRPW > NRPW In this case, security parameters still dominate the locations of HLs. However, NRPW is slight smaller than SRPW. Usually, HLs rather focuses on security than network performance. Hence, we recommend the location algorithm is developed based on this case. An exhaustive approach in this case is to find costs of all possible location of HL. It usually takes much long time to find the best location solution. Furthermore, it may still choose a location which network performance performs better than security performance. Hence, we develop SRPWfirst algorithm which it firstly finds all candidate location enhancing SRPW like LA+SP+H and then delete the locations violating network constraint. Among those candidate locations, we sieve best locations from them with the use of Eq. 3. This algorithm makes the location mission easy and saves much time. Based on this SRPWfirst algorithm, the location of HLs in this algorithm emphasizes the security in distributed cloud system much obviously. Case IV: SRPW < NRPW In this paper, we usually expect the location of HLs is rather secured than network performance. In this case, network weight is strengthened. Unless the network condition is too bad somewhere, we do not consider this weight setting. As the reason of case III, we develop an algorithm called as NRPW-first algorithm. The So far, we have discussed all cases and develop several algorithms for these cases. We use the Table II to summary these algorithms in terms of security level, network performance and complexity. In Table II, we define five score levels such as Highest :5, Higher: 4, High:3, Medium:2 and Low:1. For security level, LA+H is the most secure because it only focuses on security coefficient. LA+SP+H should consider the hop number of the route and hence it ranks behind LA+H. SRPW-first is based on LA+SP+H and takes network parameters into consideration. So, the rank of those algorithms is as Table II. Among them, it is difficult to identify the security level of SP+H because hop number is related to security uncertainly. Hence, we let its security level being uncertainty. For network performance, we can find algorithms with network coefficients perform better than those only with security parameters. TABLE II: THE SUMMARY OF ALL ALGORITHMS Algorithms Security Network Complexity level performance SP+H Uncertainty Uncertainty Low LA+H Highest Uncertainty Low LA+SP+H Higher Uncertainty Medium SRPW-first High High High NRPW-first Low Highest High SRPW-first and SRPW-first are better choices. Other algorithms are designed without network parameters and network performance cannot be clearly defined for those algorithms. However, this paper develops HL placement mainly from a security perspective. Hence, SRPW-first is the best choice. Although SRPW-first seems to be more complex than other algorithms, it searches the solution based on LA+H iteratively. At each iterative, it filters inadequate solutions in the solution pool of LA+H with additional parameters. Hence, it becomes easy and fast. 5. CONCLUSIONS Cloud computing is an emerging technology, which facilitates the provision of cloud service. However, security is key point for cloud users to use cloud function. Previous work suggests ondemand cloud security according to the security needs of each cloud user. But it is costly to
6 deploy full security mechanisms in every datacenters. We propose to classify datacenters into two types, HL and N. Hence, our goal is to allocate HLs in cloud architecture. Through the analyses of various combinations of parameters, we develop various allocation algorithms. Further, we suggest adequate allocation algorithms of HLs location. Hence, this paper is helpful to construct secure and robust cloud architecture. REFERENCES [2] Jianyong Chen, Yang Wang, and Xiaomin Wang Ondemand security architecture for cloud computing, IEEE computer, pp ,July,2012 [3] I nigo Goiriyz et al., Intelligent Placement of Datacenters for Internet Services, Distributed Computing Systems (ICS), st International Conference on, June 2011,pp [4] Mansoor Alicherry, T.V. Lakshma, network Aware Resource Allocation in Distributed Clouds, 2012 Proceedings IEEE INFOCOM [5] V.H. Pham and M. Dacier, Honeypot Trace Forensics: The Observation Viewpoint Matters, Future Generation Com- [6] puter System Int l J. Grid Computing and E-science, vol. 27, no. 5, 2011, pp [7] L.K. Hu, S. Yi, and X.Y. Jia, A Semantics-Based Approach for Cross Domain Access Control, J. Internet Technology, vol. 11, no. 2, 2010, pp [1] C. Modi et al., A survey of intrusion detection techniques in Cloud, Journal of Network and Computer Applications, 2012, in press.
A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining
Exploration on Security System Structure of Smart Campus Based on Cloud Computing. Wei Zhou
3rd International Conference on Science and Social Research (ICSSR 2014) Exploration on Security System Structure of Smart Campus Based on Cloud Computing Wei Zhou Information Center, Shanghai University
International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 Software as a Model for Security in Cloud over Virtual Environments S.Vengadesan, B.Muthulakshmi PG Student,
Cloud Database Storage Model by Using Key-as-a-Service (KaaS)
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 7 July 2015, Page No. 13284-13288 Cloud Database Storage Model by Using Key-as-a-Service (KaaS) J.Sivaiah
Chapter 11 Cloud Application Development
Chapter 11 Cloud Application Development Contents Motivation. Connecting clients to instances through firewalls. Chapter 10 2 Motivation Some of the questions of interest to application developers: How
A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS
A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS *Dr Umesh Sehgal, #Shalini Guleria *Associate Professor,ARNI School of Computer Science,Arni University,[email protected]
Achieve Better Ranking Accuracy Using CloudRank Framework for Cloud Services
Achieve Better Ranking Accuracy Using CloudRank Framework for Cloud Services Ms. M. Subha #1, Mr. K. Saravanan *2 # Student, * Assistant Professor Department of Computer Science and Engineering Regional
Banking Security using Honeypot
Banking Security using Honeypot Sandeep Chaware D.J.Sanghvi College of Engineering, Mumbai [email protected] Abstract New threats are constantly emerging to the security of organization s information
Managing Cloud Computing Risk
Managing Cloud Computing Risk Presented By: Dan Desko; Manager, Internal IT Audit & Risk Advisory Services Schneider Downs & Co. Inc. [email protected] Learning Objectives Understand how to identify
Dynamic Resource management with VM layer and Resource prediction algorithms in Cloud Architecture
Dynamic Resource management with VM layer and Resource prediction algorithms in Cloud Architecture 1 Shaik Fayaz, 2 Dr.V.N.Srinivasu, 3 Tata Venkateswarlu #1 M.Tech (CSE) from P.N.C & Vijai Institute of
Hyper Node Torus: A New Interconnection Network for High Speed Packet Processors
2011 International Symposium on Computer Networks and Distributed Systems (CNDS), February 23-24, 2011 Hyper Node Torus: A New Interconnection Network for High Speed Packet Processors Atefeh Khosravi,
2004 Networks UK Publishers. Reprinted with permission.
Riikka Susitaival and Samuli Aalto. Adaptive load balancing with OSPF. In Proceedings of the Second International Working Conference on Performance Modelling and Evaluation of Heterogeneous Networks (HET
Security Model for VM in Cloud
Security Model for VM in Cloud 1 Venkataramana.Kanaparti, 2 Naveen Kumar R, 3 Rajani.S, 4 Padmavathamma M, 5 Anitha.C 1,2,3,5 Research Scholars, 4Research Supervisor 1,2,3,4,5 Dept. of Computer Science,
Cloud Security - Characteristics, Advantages and Disadvantages
The Research and Design of Intelligent IPS Model Based on Dynamic Cloud Firewall Linkage 1 Tiejun Jia, 2 Xiaogang Wang *1 College of Electronics & Information, Shanghai Dianji University, Shanghai 200240,
A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services
A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services Ronnie D. Caytiles and Byungjoo Park * Department of Multimedia Engineering, Hannam University
Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption
Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer
Chapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 1, March, 2013 ISSN: 2320-8791 www.ijreat.
Intrusion Detection in Cloud for Smart Phones Namitha Jacob Department of Information Technology, SRM University, Chennai, India Abstract The popularity of smart phone is increasing day to day and the
Improving the Microsoft enterprise. network for public cloud connectivity
Improving the Microsoft enterprise cloud network for public cloud connectivity Page 1 Improving network performance between Microsoft and the public Situation As Microsoft IT located more of its line-ofbusiness
Method of Fault Detection in Cloud Computing Systems
, pp.205-212 http://dx.doi.org/10.14257/ijgdc.2014.7.3.21 Method of Fault Detection in Cloud Computing Systems Ying Jiang, Jie Huang, Jiaman Ding and Yingli Liu Yunnan Key Lab of Computer Technology Application,
A Study of Network Security Systems
A Study of Network Security Systems Ramy K. Khalil, Fayez W. Zaki, Mohamed M. Ashour, Mohamed A. Mohamed Department of Communication and Electronics Mansoura University El Gomhorya Street, Mansora,Dakahlya
Keyword: Cloud computing, service model, deployment model, network layer security.
Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging
Security Considerations for Public Mobile Cloud Computing
Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea [email protected] 2 Research Institute of
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering
IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation
IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing
Ensuring Security in Cloud with Multi-Level IDS and Log Management System
Ensuring Security in Cloud with Multi-Level IDS and Log Management System 1 Prema Jain, 2 Ashwin Kumar PG Scholar, Mangalore Institute of Technology & Engineering, Moodbidri, Karnataka1, Assistant Professor,
Profit-driven Cloud Service Request Scheduling Under SLA Constraints
Journal of Information & Computational Science 9: 14 (2012) 4065 4073 Available at http://www.joics.com Profit-driven Cloud Service Request Scheduling Under SLA Constraints Zhipiao Liu, Qibo Sun, Shangguang
IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach.
IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach. Gunnar Wahlgren 1, Stewart Kowalski 2 Stockholm University 1: ([email protected]), 2: ([email protected]) ABSTRACT
DETECTING AND PREVENTING THE PACKET FOR TRACE BACK DDOS ATTACK IN MOBILE AD-HOC NETWORK
DETECTING AND PREVENTING THE PACKET FOR TRACE BACK DDOS ATTACK IN MOBILE AD-HOC NETWORK M.Yasodha 1, S.Umarani 2, D.Sharmila 3 1 PG Scholar, Maharaja Engineering College, Avinashi, India. 2 Assistant Professor,
Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System
Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System Shams Fathima M.Tech,Department of Computer Science Kakatiya Institute of Technology & Science, Warangal,India
A Survey on Cloud Security Issues and Techniques
A Survey on Cloud Security Issues and Techniques Garima Gupta 1, P.R.Laxmi 2 and Shubhanjali Sharma 3 1 Department of Computer Engineering, Government Engineering College, Ajmer [email protected]
Security Issues In Cloud Computing and Countermeasures
Security Issues In Cloud Computing and Countermeasures Shipra Dubey 1, Suman Bhajia 2 and Deepika Trivedi 3 1 Department of Computer Science, Banasthali University, Jaipur, Rajasthan / India 2 Department
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks
Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Prashil S. Waghmare PG student, Sinhgad College of Engineering, Vadgaon, Pune University, Maharashtra, India. [email protected]
IS PRIVATE CLOUD A UNICORN?
IS PRIVATE CLOUD A UNICORN? With all of the discussion, adoption, and expansion of cloud offerings there is a constant debate that continues to rear its head: Public vs. Private or more bluntly Is there
Secure Attack Measure Selection and Intrusion Detection in Virtual Cloud Networks. Karnataka. www.ijreat.org
Secure Attack Measure Selection and Intrusion Detection in Virtual Cloud Networks Kruthika S G 1, VenkataRavana Nayak 2, Sunanda Allur 3 1, 2, 3 Department of Computer Science, Visvesvaraya Technological
A Secure Online Reputation Defense System from Unfair Ratings using Anomaly Detections
A Secure Online Reputation Defense System from Unfair Ratings using Anomaly Detections Asha baby PG Scholar,Department of CSE A. Kumaresan Professor, Department of CSE K. Vijayakumar Professor, Department
Secrecy Maintaining Public Inspecting For Secure Cloud Storage
Secrecy Maintaining Public Inspecting For Secure Cloud Storage K.Sangamithra 1, S.Tamilselvan 2 M.E, M.P.Nachimuthu.M.Jaganathan Engineering College, Tamilnadu, India 1 Asst. Professor, M.P.Nachimuthu.M.Jaganathan
N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD. R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 ABSTRACT
N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 1 M.Tech Student, Department of Computer Science and Engineering, S.R.M. University Chennai 2 Asst.Professor,
MAXIMIZING RESTORABLE THROUGHPUT IN MPLS NETWORKS
MAXIMIZING RESTORABLE THROUGHPUT IN MPLS NETWORKS 1 M.LAKSHMI, 2 N.LAKSHMI 1 Assitant Professor, Dept.of.Computer science, MCC college.pattukottai. 2 Research Scholar, Dept.of.Computer science, MCC college.pattukottai.
Optimizing Data Center Networks for Cloud Computing
PRAMAK 1 Optimizing Data Center Networks for Cloud Computing Data Center networks have evolved over time as the nature of computing changed. They evolved to handle the computing models based on main-frames,
SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS
Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 243-250 School of Engineering, Taylor s University College SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS SHEENU SHARMA
Multi Tenancy Access Control Using Cloud Service in MVC
Multi Tenancy Access Control Using Cloud Service in MVC 1 Sonia Gupta, 2 Rubal Choudary Indo Global College of Engg, Abhipur, Mohali Abstract - Cloud Computing is the next generation Internet service and
Third Party Auditor: An Integrity Checking Technique for Client Data Security in Cloud Computing
Third Party Auditor: An Integrity Checking Technique for Client Data Security in Cloud Computing Renuka Goyal, Navjot Sidhu Centre for Computer Science and Technology, Central University of Punjab Bathinda,
Cloud deployment model and cost analysis in Multicloud
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) ISSN: 2278-2834, ISBN: 2278-8735. Volume 4, Issue 3 (Nov-Dec. 2012), PP 25-31 Cloud deployment model and cost analysis in Multicloud
Securing Storage Data in Cloud Using RC5 Algorithm
Securing Storage Data in Cloud Using RC5 Algorithm Jay Singh 1, Brajesh Kumar 2, Asha Khatri 3 CDSE Indore 1,2, MITM, Indore 3 Abstract Cloud Computing is technology for next generation Information and
Performance Gathering and Implementing Portability on Cloud Storage Data
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 17 (2014), pp. 1815-1823 International Research Publications House http://www. irphouse.com Performance Gathering
Keywords Distributed Computing, On Demand Resources, Cloud Computing, Virtualization, Server Consolidation, Load Balancing
Volume 5, Issue 1, January 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Survey on Load
Mobile Cloud Computing Security Considerations
보안공학연구논문지 (Journal of Security Engineering), 제 9권 제 2호 2012년 4월 Mobile Cloud Computing Security Considerations Soeung-Kon(Victor) Ko 1), Jung-Hoon Lee 2), Sung Woo Kim 3) Abstract Building applications
Quality of Service Routing Network and Performance Evaluation*
Quality of Service Routing Network and Performance Evaluation* Shen Lin, Cui Yong, Xu Ming-wei, and Xu Ke Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084 {shenlin, cy, xmw,
INCREASING THE CLOUD PERFORMANCE WITH LOCAL AUTHENTICATION
INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 INCREASING THE CLOUD PERFORMANCE WITH LOCAL AUTHENTICATION Sanjay Razdan Department of Computer Science and Eng. Mewar
Restorable Logical Topology using Cross-Layer Optimization
פרויקטים בתקשורת מחשבים - 236340 - סמסטר אביב 2016 Restorable Logical Topology using Cross-Layer Optimization Abstract: Today s communication networks consist of routers and optical switches in a logical
HIDS and NIDS Hybrid Intrusion Detection System Model Design Zhenqi Wang 1, a, Dankai Zhang 1,b
Advanced Engineering Forum Online: 2012-09-26 ISSN: 2234-991X, Vols. 6-7, pp 991-994 doi:10.4028/www.scientific.net/aef.6-7.991 2012 Trans Tech Publications, Switzerland HIDS and NIDS Hybrid Intrusion
SURVEY ON VIRTUALIZATION VULNERABILITIES
SURVEY ON VIRTUALIZATION VULNERABILITIES Indumathy M Department of MCA, Acharya Institute of Technology, Bangalore, (India) ABSTRACT Virtualization plays a major role in serving the organizations to reduce
Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage
Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage P. Selvigrija, Assistant Professor, Department of Computer Science & Engineering, Christ College
A Proposed Service Broker Strategy in CloudAnalyst for Cost-Effective Data Center Selection
A Proposed Service Broker Strategy in CloudAnalyst for Cost-Effective Selection Dhaval Limbani*, Bhavesh Oza** *(Department of Information Technology, S. S. Engineering College, Bhavnagar) ** (Department
Dynamic Query Updation for User Authentication in cloud Environment
Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,
A Survey on Carbon Emission Management and Intelligent System using Cloud
A Survey on Carbon Emission Management and Intelligent System using Cloud Dr.P EZHILARASU 1 (Associate Professor, Department of Computer Science and Engineering [email protected]) S SARANYA 2
ECE 578 Term Paper Network Security through IP packet Filtering
ECE 578 Term Paper Network Security through IP packet Filtering Cheedu Venugopal Reddy Dept of Electrical Eng and Comp science Oregon State University Bin Cao Dept of electrical Eng and Comp science Oregon
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
Secure System Solution and Security Technology
Secure System Solution and Security Technology Hitachi Review Vol. 47 (1998), No. 6 245 Chisato Konno, D.Sc. Mitsuhiro Tsunoda Yasushi Kuba Satoru Tezuka OVERVIEW: The and intranet systems are rapidly
Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment
Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment Deepa Noorandevarmath 1, Rameshkumar H.K 2, C M Parameshwarappa 3 1 PG Student, Dept of CS&E, STJIT, Ranebennur. Karnataka, India
Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress
Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress Alan Davy and Lei Shi Telecommunication Software&Systems Group, Waterford Institute of Technology, Ireland adavy,[email protected]
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND
A Survey Paper: Cloud Computing and Virtual Machine Migration
577 A Survey Paper: Cloud Computing and Virtual Machine Migration 1 Yatendra Sahu, 2 Neha Agrawal 1 UIT, RGPV, Bhopal MP 462036, INDIA 2 MANIT, Bhopal MP 462051, INDIA Abstract - Cloud computing is one
A Study on Service Oriented Network Virtualization convergence of Cloud Computing
A Study on Service Oriented Network Virtualization convergence of Cloud Computing 1 Kajjam Vinay Kumar, 2 SANTHOSH BODDUPALLI 1 Scholar(M.Tech),Department of Computer Science Engineering, Brilliant Institute
Advanced Honeypot System for Analysing Network Security
ISSN: 2347-3215 Volume 2 Number 4 (April-2014) pp. 65-70 www.ijcrar.com Advanced Honeypot System for Analysing Network Security Suruchi Narote 1* and Sandeep Khanna 2 1 Department of Computer Engineering.
Module 8. Network Security. Version 2 CSE IIT, Kharagpur
Module 8 Network Security Lesson 3 Firewalls Specific Instructional Objectives On completion of this lesson, the students will be able to answer: What a firewall is? What are the design goals of Firewalls
OCRP Implementation to Optimize Resource Provisioning Cost in Cloud Computing
OCRP Implementation to Optimize Resource Provisioning Cost in Cloud Computing K. Satheeshkumar PG Scholar K. Senthilkumar PG Scholar A. Selvakumar Assistant Professor Abstract- Cloud computing is a large-scale
Intel Ethernet Switch Load Balancing System Design Using Advanced Features in Intel Ethernet Switch Family
Intel Ethernet Switch Load Balancing System Design Using Advanced Features in Intel Ethernet Switch Family White Paper June, 2008 Legal INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL
Figure 1. The cloud scales: Amazon EC2 growth [2].
- Chung-Cheng Li and Kuochen Wang Department of Computer Science National Chiao Tung University Hsinchu, Taiwan 300 [email protected], [email protected] Abstract One of the most important issues
Research on Operation Management under the Environment of Cloud Computing Data Center
, pp.185-192 http://dx.doi.org/10.14257/ijdta.2015.8.2.17 Research on Operation Management under the Environment of Cloud Computing Data Center Wei Bai and Wenli Geng Computer and information engineering
Securing Ad Hoc Wireless Networks Against Data Injection Attacks Using Firewalls
Securing Ad Hoc Wireless Networks Against Data Injection Attacks Using Firewalls Jun Cheol Park and Sneha Kumar Kasera School of Computing, University of Utah Email: {jcpark, kasera}@cs.utah.edu Abstract
HughesNet Broadband VPN End-to-End Security Using the Cisco 87x
HughesNet Broadband VPN End-to-End Security Using the Cisco 87x HughesNet Managed Broadband Services includes a high level of end-to-end security features based on a robust architecture designed to meet
DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR
Journal homepage: www.mjret.in DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR Maharudra V. Phalke, Atul D. Khude,Ganesh T. Bodkhe, Sudam A. Chole Information Technology, PVPIT Bhavdhan Pune,India [email protected],
INCREASING SERVER UTILIZATION AND ACHIEVING GREEN COMPUTING IN CLOUD
INCREASING SERVER UTILIZATION AND ACHIEVING GREEN COMPUTING IN CLOUD M.Rajeswari 1, M.Savuri Raja 2, M.Suganthy 3 1 Master of Technology, Department of Computer Science & Engineering, Dr. S.J.S Paul Memorial
Fujitsu s Approach to Cloud-related Information Security
Fujitsu s Approach to Cloud-related Information Security Masayuki Okuhara Takuya Suzuki Tetsuo Shiozaki Makoto Hattori Cloud computing opens up a variety of possibilities but at the same time it raises
A Review on Zero Day Attack Safety Using Different Scenarios
Available online www.ejaet.com European Journal of Advances in Engineering and Technology, 2015, 2(1): 30-34 Review Article ISSN: 2394-658X A Review on Zero Day Attack Safety Using Different Scenarios
WINDOWS AZURE NETWORKING
WINDOWS AZURE NETWORKING The easiest way to connect to Windows Azure applications and data is through an ordinary Internet connection. But this simple solution isn t always the best approach. Windows Azure
Disjoint Path Algorithm for Load Balancing in MPLS network
International Journal of Innovation and Scientific Research ISSN 2351-8014 Vol. 13 No. 1 Jan. 2015, pp. 193-199 2015 Innovative Space of Scientific Research Journals http://www.ijisr.issr-journals.org/
A Survey on Security Threats and Security Technology Analysis for Secured Cloud Services
, pp.21-30 http://dx.doi.org/10.14257/ijsia.2013.7.6.03 A Survey on Security Threats and Security Technology Analysis for Secured Cloud Services Changsoo Lee 1, Daewon Jung 2 and Keunwang Lee 3 1 Dept.
Cloud Computing Security Issues And Methods to Overcome
Cloud Computing Security Issues And Methods to Overcome Manas M N 1, Nagalakshmi C K 2, Shobha G 3 MTech, Computer Science & Engineering, RVCE, Bangalore, India 1,2 Professor & HOD, Computer Science &
Privacy-Aware Scheduling for Inter-Organizational Processes
Privacy-Aware Scheduling for Inter-Organizational Processes Christoph Hochreiner Distributed Systems Group, Vienna University of Technology, Austria [email protected] Abstract Due to the
packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.
Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System
Monitoring Performances of Quality of Service in Cloud with System of Systems
Monitoring Performances of Quality of Service in Cloud with System of Systems Helen Anderson Akpan 1, M. R. Sudha 2 1 MSc Student, Department of Information Technology, 2 Assistant Professor, Department
10/25/2012 BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH [email protected]. Agenda. Security Cases What is Cloud? Road Map Security Concerns
BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH [email protected] Agenda Security Cases What is Cloud? Road Map Security Concerns 1 Security Cases on Cloud Data Protection - Two arrested in ipad
Cloud Computing Architecture and Forensic Investigation Challenges
Cloud Computing Architecture and Forensic Investigation Challenges Ghania Al Sadi Sohar University, Computing Department Sohar, University Rd, 311 Sultanate of Oman ABSTRACT Contrasting to traditional
Cloud Computing. Course: Designing and Implementing Service Oriented Business Processes
Cloud Computing Supplementary slides Course: Designing and Implementing Service Oriented Business Processes 1 Introduction Cloud computing represents a new way, in some cases a more cost effective way,
Building Secure Network Infrastructure For LANs
Building Secure Network Infrastructure For LANs Yeung, K., Hau; and Leung, T., Chuen Abstract This paper discusses the building of secure network infrastructure for local area networks. It first gives
QoSIP: A QoS Aware IP Routing Protocol for Multimedia Data
QoSIP: A QoS Aware IP Routing Protocol for Multimedia Data Md. Golam Shagadul Amin Talukder and Al-Mukaddim Khan Pathan* Department of Computer Science and Engineering, Metropolitan University, Sylhet,
Business Intelligence (BI) Cloud. Prepared By: Pavan Inabathini
Business Intelligence (BI) Cloud Prepared By: Pavan Inabathini Summary Federal Agencies currently maintain Business Intelligence (BI) solutions across numerous departments around the enterprise with individual
Reaping the Full Benefits of a Hybrid Network
Singtel Business Product Factsheet Managed Hybrid Network Reaping the Full Benefits of a Hybrid Network Singtel Managed Hybrid Network is an innovative offering that extends the enterprise s network coverage
