Agent-Based Cloud Broker Architecture for Distributed Access Control
|
|
|
- Brandon Horton
- 10 years ago
- Views:
Transcription
1 Agent-Based Cloud Broker Architecture for Distributed Access Control Manoj V. Thomas 1, and Chandra Sekaran K. Department of Computer Science and Engineering. NITK, Surathkal, Mangalore , India. 1 [email protected] Abstract. Cloud computing is an emerging paradigm in the distributed computing environments where, users access various services and shared resources hosted by the service providers, to achieve their tasks done efficiently. Authentication and authorization are the two important functions to be performed in the context of cloud computing, to make sure that unauthorized users do not access the distributed system components. In this paper, we analyse the issue of distributed access control discussing the various approaches already adopted in this area considering the advantages and disadvantages. We propose an agentbased cloud broker architecture with computational intelligence for mediating the access requests of cloud customers, considering the present day requirements of the cloud computing paradigm. We also give the workflow model for the proposed agent-based cloud broker architecture. A few open issues in the area of distributed access control are also discussed. Keywords: access control, agents, authentication, authorization, cloud computing. 1. Introduction 1.1 Distributed Access Control In Cloud Computing or Services Computing, users access various resources or services after verification of their identity by the service provider. In open service-oriented systems, in many cases, the service providers and the service consumers are strangers. Since they do not have a pre-established trust value between them, the service provider must be able to authenticate the unfamiliar users and then determine whether the requestors have enough privileges to access the requested services. Trust establishment between consumers, Service Providers and Identity Providers also assumes very high importance in the current scenario. As the development of the internet is very fast, there are increasing demands to support cooperation among distributed, heterogeneous, and autonomous organizations, highlighting the need Corresponding author. K. R. Venugopal and L. M. Patnaik (Eds.) ICCN 2013, pp Elsevier Publications 2013.
2 Manoj V. Thomas and Chandra Sekaran K. to develop an efficient access control model to facilitate cooperation or collaboration in such a distributed environment. In open distributed systems, secure authentication and authorization processes are required before access privileges are granted to the users. The issue of access control in the domain of distributed applications, in collaborative, distributed, cooperative environments like cloud computing, where various users access the resources and services, with different access rights, is called the distributed access control. Various users have different access rights towards the available resources in the system, which need to be concisely specified and correctly enforced. Access control deals with the specification and enforcement of users access permissions and access restrictions relative to the resources of a system. 1.2 Agent-based computing Agents are normally autonomous programs, which can interact with the environment and act upon it to achieve their tasks [1]. An intelligent agent can perform flexible autonomous actions to meet its design objectives. A multi-agent system involves multiple interacting software components known as agents, which can cooperatively solve the problems that are beyond the capabilities of any individual entity. The agents are characterized by certain unique properties to be different from the standard programs. The mandatory properties [1] of the agents are: 1. Autonomy 2. Decision Making 3. Temporal Continuity and 4. Goal Oriented. The agents are characterised by the following orthogonal properties [1]: 1. Mobility 2. Communicative 3. Collaborative and 4. Learning. The main advantages of the agent based systems are [2]: 1. Reduce the network load 2. Minimize the network latency 3. Execute in asynchronous and autonomous mode 4. Adapt dynamically and 5. Robust and fault tolerant. Because of the inherent properties of cloud computing and agent-based systems, and also because of the advantages of an agent-based approach, it would be an efficient and secure approach to combine the two paradigms so that the access requests of the cloud customers could be mediated through the agents. The rest of the paper is organized as follows: Section 2 describes the work done in the area of distributed access control highlighting the advantages and disadvantages of various approaches. Section 3 presents an agent-based cloud broker architecture for mediating the access control requests of users, taking into account the current issues and present day requirements. Section 4 discusses the workflow model for the proposed access control architecture. Section 5 presents the analysis and results mentioning a few open issues in this area and Section 6 concludes the paper. 2. Work Done in the Area Many researchers have been working in this area of access control and, some of the works carried out by them follows. The work carried out in [3] presents an attribute and role based access control (ARBAC) model. Before invoking services, requestors of various services provide their attribute information to the service providers. In this work, access negotiation mechanism is not added into the ARBAC model. In [4], it presents an objected-oriented RBAC model (ORBAC) based on which, multiple domain access control is obtained. A method is presented to prevent the problem of separation of duty. In the work carried out in [5], a unified hierarchy is derived starting from an access relation between users and resources, which is used to specify the access relation that allows user 190
3 Agent-Based Cloud Broker Architecture for Distributed Access Control queries. But, this scheme does not consider the dynamics of access control (when users and resources are added and removed and when access rights change) and the specification of negative access relations in distributed systems. In [6], a method for managing the security policies using XML and role based access control are presented. A role-based access control model for web-based applications (ORBAC) is introduced. In [7], the design and development of a domain-based access control infrastructure for distributed collaborative environments is introduced. The concept of virtual laboratory (VL) is given. How to enforce access control, on the numerous users who are not defined in the system in the distributed computing environment is discussed in the work carried out in [8]. A trust representation and reasoning model, using fuzzy set theory is proposed in this work. In [9], the proposed scheme cryptographically provides role-based access control and delegation, based on Hierarchical Identity- Based Signature (IBS). Algorithms for role based access control and delegation scheme are proposed in this work. In the work carried out in [10], dynamic access control models have been proposed for distributed dynamic environments where the users (or agents) may not have a static role. In the Dynamic Event- Based Access Control (DEBAC), as well as in the Action-Status Access Control (ASAC) model, the users rights of access vary depending on the history of events involving the user. In [11], a Trust and Context based Access Control (TCAC) model, extending the RBAC model is proposed for open and distributed systems. When the trust value of the requester is not less than the trust threshold defined by the system policies, the user will be assigned to some roles. In [12], an access control model based on credibility is proposed. In open distributed systems, the access-control policy in the server changes quickly. The service providers adjust the threshold value of credibility and weight factor, instead of changing policies in the server. The service providers register their threshold value of trust on the servers. If a requestor s trustworthiness achieves this value in the server, access to the service provider is made possible. The authors in [13] put forward an access control model, based on roles and trust values of subjects and objects. In this work, the RBAC model is extended by adding trust factor. In the work carried out in [14], the authors present a framework for the verification of run-time constraints and security properties for RBAC systems, considering the dynamic behavior of users during an active session. Temporal and location based decision parameters are considered. In [15], it describes a Role-Based Access Control (RBAC) mechanism for distributed High Performance Computing (HPC) systems where both users and resources can be dynamic and can belong to multiple organizations, each with their own diverse security policies and mechanisms. In [16], the authors discuss the issue of identity management in the cloud computing scenario. In this work, loss of control, lack of trust and multitenancy issues are identified as major problems in the present cloud computing model. The work mentioned in [17] proposes solution for access control using trust management and agent concept, that could be applied to distributed information systems. The present day cloud computing paradigm is highly dynamic and the trust values between various cooperating domains change from time to time. This dynamic aspects related to the security and access control in the cloud computing is not taken care of. In [18], the authors present a security agent-based approach for the authorization aspects in the distributed environment. In this work, the security agents are used to manage the privileges for the distributed authorization. This work also does not consider the dynamic nature of the access control. Distributed access control architecture based on the concept of distributed, active authorization 191
4 Manoj V. Thomas and Chandra Sekaran K. Figure 1. Agent-Based cloud broker architecture. entities is proposed in [19]. This also lacks the dynamic trust management and the security policy conflict management when various users in the organization access the cloud resources at the same time. 3. Agent-Based Cloud Broker Architecture for the Distributed Access Control In the light of the literature review carried out by us, we propose an architecture for the Agent-Based Cloud Broker (ABCB) for the distributed access control as shown in the Figure 1. The main components in the proposed model are: 1) Cloud Service Consumer (CSC) 2) Agent Based Cloud Broker (ABCB) 3) Cloud Service Provider (CSP) and 4) Identity Provider (IdP). 3.1 Cloud service consumer (CSC) Cloud Service Consumers are the entities requesting the resources or services from the Cloud Service Providers (CSPs). The CSCs need to be properly authenticated in order to ensure that unauthorized users do not access the services hosted by the CSPs. 3.2 Agent-based cloud broker (ABCB) The ABCB mediates the access requests initiated by the cloud consumers. The main modules of the Agent-Based Cloud Broker (ABCB) are: Trust provider (TP) In a multi-domain environment like cloud computing, the trust needs to be established between the cloud service provider and service consumers and also between the providers of various services and the identity providers. Trust Provider module calculates the dynamic trust value of the entity concerned (e.g. Service Provider), considering various parameters such as the past behavior and the history of previous transactions with the same service provider and also by considering the trust values or information of the entity from the Trusted Third Parties. 192
5 Agent-Based Cloud Broker Architecture for Distributed Access Control User profiling (UP) This module of the ABCB collects, processes and stores the details of the cloud users such as identity information, preferences, contact details etc. This information could be used by the agent for further interaction with other components in the system with minimal user-agent interaction or user interference Access request analyzer (ARA) This module handles the access control requirements generated as a result of the CSCs trying to access some service from the service provider. This module anlyses the request type, resource required etc. and communicates with the Task Identification module Tasks identification (TI) This module identifies tasks such as communicating with the Identity Provider, initiating the access request to the CSP chosen, mediating Identification, Authentication and Authorization with the CSP, on behalf of the user. This activity may take information stored internally (user s identification data or preferences) or from the outside environment (any feedback data from other agents or entities in the system) Identity provider selector (IdPS) The selection of a particular Identity Provider (IdP) among the available ones can be based on parameters such as: 1) the type of the service requested (like the provider details, its authentication and authorization mechanism) 2) also, the security and privacy concerns of the cloud user regarding the degree of disclosure of his identity credentials such as partial or full disclosure of the Pesonally Identifiable Information (PII) Learning, autonomy and workflow management (LAWM) This module helps the agent to improve its knowledge base, so that it can act with minimal interaction of the human users in mediating the access control requests. 3.3 Cloud service providers (CSPs) The Cloud Service Provider provides the required services or resources to the various requesting users. Before providing services, the users need to be authenticated and their access rights need to be verified so that illegal or unauthorized access can be avoided. The main modules of the Cloud Service Provider (CSP) are: Authentication (AuthN) This module involves verifying the identity of the requesting user by interacting with the Identity Provider using SAML assertions. The CSP can have many IdPs in its trusted domain. The CSP and the CSC agree on a particular IdP for interaction between them. 193
6 Manoj V. Thomas and Chandra Sekaran K Authorization (AuthZ) This module verifies the privileges of each requestor (CSC). Policy Decision Point (PDP) interacts with policy storage database stored locally with the CSP. PDP also interacts with the Policy Conflict Manager (PCM) module. PDP is to be implemented with break-glass mechanism to allow emergency cases of accessing the resources. The decision taken by the PDP is implemented by the Policy Enforcement Point (PEP) Policy conflict manager (PCM) Events of possible policy conflicts, arising out of the various access requirements made by different users in the organization at the same time, are handled by this module Identity provider selector (IdPS) The Identity Provider Selector module on the CSP selects the trusted IdPs in its domain. IdPS interacts with the Trust Provider module to get the current trust value of various IdPs Trust provider (TP) The Trust Provider module on the service provider side monitors the trust value of various service consumers based on factors such as the previous experience with the customers and the current reputation value collected from the Trusted Third Parties. This module also calculates the trust information concerned with the various Identity Providers. This trust calculation should be dynamic because the trust value can change from time to time. 3.4 Identity provider(idp) In service computing, a user or an organization may subscribe to services from multiple service providers. The organization can also integrate the individual services from various cloud service providers and provide the final combined service to its customers. The users in a cloud federation don t need to use separate credentials for each cloud service provider or service they subscribe to; instead, they can have the identity issued by the Identity Provider (Ping Identity, Symplified etc.). They can submit the security tokens (normally SAML assertions) issued by the identity provider, to the service providers in the cloud federation. This is both efficient and secure, and relieves the users of the multiple credentials problem when accessing services from multiple cloud service providers. 4. Workflow Model for the Agent-Based Cloud Broker Architecture The diagram showing the workflow for the distributed access control is given in the Figure 2. As shown in the figure above, the various steps performed by the ABCB and the CSPs in this workflow are: (i) The Cloud Service Consumer (CSC) wants to access the service hosted by the Cloud Service Provider (CSP), and the Agent-Based Cloud Broker (ABCB) mediates the access control request. 194
7 Agent-Based Cloud Broker Architecture for Distributed Access Control Figure 2. Workflow model for the distributed access control. (ii) The dynamic trust value of the CSP is calculated by the agent based on the previous transaction and the information provided by the Trusted Third Parities. (iii) The agent performs the access request analysis and the tasks to be performed are identified. (iv) The Cloud Service Provider (CSP) selects the IdPs by calculating the trust values of various IdPs, based on the previous history of interaction and, the trust or reputation value provided by other trusted entities. (v) The agent interacts with the CSP to decide the IdP based on the type of service request and the security preferences. (vi) Agent interacts with the IdP to get the security tokens (SAML assertions). (vii) Agent then interacts with the CSP using the tokens given by the IdP. (viii) CSP verifies the tokens submitted by the agent by interacting with the IdP. (ix) Authorization request is handled by the PEP and PDP. (x) PDP decides if that request could be granted, considering the various issues such as policy conflict management, dynamic trust management of the agent and the proper break-glass mechanism of granting privileges. (xi) If the request could be granted, the CSC is given access to the services requested, otherwise the access is denied. 5. Analysis and Results We have adopted the agent-based system for mediating the distributed access control in the cloud computing scenario, because of the salient features and advantages it offers. It is seen that the establishment of dynamic trust relationship between user domains and cloud domains, and between various cloud domains is an important issue to be considered for active research. Privacy protection in consumer cloud has potential for further research. Also based on the analysis done, we can see that most of the research works do not give proper solutions for solving policy conflict in the cloud scenario, which needs to be further explored. In addition to that, an effective break-glass mechanism should be incorporated in the authorization process to handle emergency access requirements 195
8 Manoj V. Thomas and Chandra Sekaran K. of cloud consumers. The agent-based architecture has enough potential for further research as far as a reliable and scalable access control mechanism in cloud computing is considered. 6. Conclusion In this paper, the issue of distributed access control is discussed and the various approaches, mentioning their advantages and drawbacks are analyzed. Distributed Access Control is an important issue in the domain of distributed applications. It is evident that, there is no single efficient solution for distributed access control meeting the needs of the present day distributed applications, which entails further research in this direction. In this paper, we have proposed agent-based cloud broker architecture for mediating the access requests of various cloud users in cloud computing, by considering the requirements of the present cloud computing paradigm. Also, the workflow model for the Agent-Based Distributed Access Control architecture proposed, is explained. A few open issues for further research in the areas of distributed access control are also discussed. References [1] Manvi, S. S. and Venkataram, P.: Applications of Agent Technology in Communications: A Review. Computer Communications, 27, (2004). [2] Danny B. Lange and Mitsuru Oshima: Dispatch Your Agents; Shut Off Your Machine. Communications of the ACM, 42(3), (1999). [3] Yonghe Wei, Chunjing Shi and Weiping Shao: An Attribute and Role Based Access Control Model for Service-Oriented Environment. In Chinese Control and Decision Conference, (2010). [4] Chang N. Zang and Cungang Yang: An Object-Oriented RBAC Model for Distributed System. In Working IEEE/IFIP Conference on Software Architecture, (2001). [5] Birget, J. C., Zou, X., Noubir, G. and Ramamurthy, B.: Hierarchy-Based Access Control in Distributed Environments. In IEEE International Conference on Communication, 1, (2001). [6] Cungang Yang and Chang N. Zhang: Designing Secure E-Commerce with Role-based Access Control. In IEEE International Conference on E-Commerce (CEC 03), /03, (2003). [7] Yuri Demchenko and Cees de Laat: Domain Based Access Control Model for Distributed Collaborative Applications. In Second IEEE International Conference on e-science and Grid Computing (2006). [8] Bo Lang, Zhibin Wang and Qingwen Wang: Trust Representation and Reasoning for Access Control in Large Scale Distributed Systems. In 2nd International Conference on Pervasive Computing and Applications, (2007). [9] Jin Wang, Daxing Li, Qiang Li and Bai Xi: Constructing Role-Based Access Control and Delegation Based on Hierarchical IBS. In IFIP International Conference on Network and Parallel Computing- Workshops, (2007). [10] Clara Bertolissi and Maribel Fernandez: An Algebraic-Functional Framework for Distributed Access Control. In Third International Conference on Risks and Security of Internet and Systems, 1 8 (2008). [11] Fujun Feng, Chuang Lin, Dongsheng Peng and Junshan Li: A Trust and Context Based Access Control Model for Distributed Systems. In 10th IEEE International Conference on High Performance Computing and Communications, (2008). [12] Chang Chaowen, Wang Yuqiao and Liu Chen: Analysis and Design of an Access Control Model Based on Credibility. In International Conference on Computer Engineering and Technology, (2009). [13] Lingli Zhao, Shuai Liu, Junsheng Li and Haicheng Xu: A Dynamic Access Control Model Based on Trust. In 2nd Conference on Environmental Science and Information Application Technology, (2010). [14] Faith Turkmen, Eunjin (EJ) Jung and Bruno Crispo: Towards Run-time Verification in Access Control. In IEEE International Symposium on Policies for Distributed Systems and Networks, (2011). 196
9 Agent-Based Cloud Broker Architecture for Distributed Access Control [15] Anil L. Pereira: RBAC for High Performance Computing Systems Integration in Grid Computing and Cloud Computing. In IEEE International Symposium on Parallel & Distributed Processing, (2011). [16] Kumar Gunjan, Sahoo, G. and Tiwari, R. K.: Identity Management in Cloud Computing-A Review. International Journal of Engineering Research and Technology (IJERT), ISSN: , 1(4) (2012). [17] Kagal, L., Finin, T. and Joshi, A.: Trust-Based Security in Pervasive Computing Environments, Computer 34.12, (2001). [18] Varadharajan, V., Kumar, N. and Mu, Y.: Security Agent Based Distributed Authorization: An Approach. In 21st National Information Systems Security Conference (NISSC), USA, (1998). [19] Antonopoulos, N., Koukoumpetsos, K. and Shafarenko, A.: Access Control for Agent-based Computing: A Distributed Approach, Internet Research, 11(1), (2001). 197
An Object Oriented Role-based Access Control Model for Secure Domain Environments
International Journal of Network Security, Vol.4, No.1, PP.10 16, Jan. 2007 10 An Object Oriented -based Access Control Model for Secure Domain Environments Cungang Yang Department of Electrical and Computer
Security Analysis of Cloud Computing: A Survey
Security Analysis of Cloud Computing: A Survey Kamaljeet Pakhre 1, Navdeep Singh 2, Sanket Mani Tiwari 3 1,2,3 Research Scholar, M. Tech. (CSE), Galgotias University, Greater Noida, India. Abstract Now
Towards Securing APIs in Cloud Computing
Towards Securing APIs in Cloud Computing Kumar Gunjan #1, R. K. Tiwari *2, G. Sahoo #3 # Department of Information Technology, Birla Institute of Technology, Mesra Ranchi, India * RVS College of Engineering&
Cloud Computing for Agent-based Traffic Management Systems
Cloud Computing for Agent-based Traffic Management Systems Manoj A Patil Asst.Prof. IT Dept. Khyamling A Parane Asst.Prof. CSE Dept. D. Rajesh Asst.Prof. IT Dept. ABSTRACT Increased traffic congestion
Evolution Feature Oriented Model Driven Product Line Engineering Approach for Synergistic and Dynamic Service Evolution in Clouds
Evolution Feature Oriented Model Driven Product Line Engineering Approach for Synergistic and Dynamic Service Evolution in Clouds Zhe Wang, Xiaodong Liu, Kevin Chalmers School of Computing Edinburgh Napier
Multi Tenancy Access Control Using Cloud Service in MVC
Multi Tenancy Access Control Using Cloud Service in MVC 1 Sonia Gupta, 2 Rubal Choudary Indo Global College of Engg, Abhipur, Mohali Abstract - Cloud Computing is the next generation Internet service and
Chapter 2 Taxonomy and Classification of Access Control Models for Cloud Environments
Chapter 2 Taxonomy and Classification of Access Control Models for Cloud Environments Abhishek Majumder, Suyel Namasudra and Samir Nath Abstract Cloud computing is an emerging and highly attractive technology
Access Control of Cloud Service Based on UCON
Access Control of Cloud Service Based on UCON Chen Danwei, Huang Xiuli, and Ren Xunyi Nanjing University of posts & Telecommunications, New Model Street No.66, 210003, Nanjing, China [email protected],
Access Control Framework of Personal Cloud based on XACML
Access Control Framework of Personal Cloud based on XACML 1 Jun-Young Park, 2 Young-Rok Shin, 3 Kyoung-Hun Kim, 4 Eui-Nam Huh 1First Author, 2 Kyung Hee University, {parkhans, shinyr}@khu.ac.kr 3 Gangdong
ADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS NETWORKS USING AGLETS
ANNALS OF THE FACULTY OF ENGINEERING HUNEDOARA 2006, Tome IV, Fascicole 1, (ISSN 1584 2665) FACULTY OF ENGINEERING HUNEDOARA, 5, REVOLUTIEI, 331128, HUNEDOARA ADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS
Research and realization of Resource Cloud Encapsulation in Cloud Manufacturing
www.ijcsi.org 579 Research and realization of Resource Cloud Encapsulation in Cloud Manufacturing Zhang Ming 1, Hu Chunyang 2 1 Department of Teaching and Practicing, Guilin University of Electronic Technology
Federated Access Control in Heterogeneous Intercloud Environment: Basic Models and Architecture Patterns
Federated Access Control in Heterogeneous Intercloud Environment: Basic Models and Architecture Patterns Craig Lee, The Aerospace Corporation On behalf of Yuri Demchenko, Craig Lee, Canh Ngo, Cees de Laat
A CROSS - DOMAIN ROLE MAPPING AND AUTHORIZATION FRAMEWORK FOR RBAC IN GRID SYSTEMS
International Journal of Computer Science and Applications c 2009 Technomathematics Research Foundation Vol.6 No.1, pp. 1-12 A CROSS - DOMAIN ROLE MAPPING AND AUTHORIZATION FRAMEWORK FOR RBAC IN GRID SYSTEMS
N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD. R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 ABSTRACT
N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 1 M.Tech Student, Department of Computer Science and Engineering, S.R.M. University Chennai 2 Asst.Professor,
Research on Mobile Agent-based E-Commerce System Framework
440 Research on Mobile -based E-Commerce System Framework Wenna Liu 1, Deli Yang 2 School of Management, Dalian University of Technology, Dalian 116024, China 1 [email protected], 2 [email protected] ABSTRACT
International Journal of Advanced Research in Computer Science and Software Engineering
Volume 3, Issue 3, March 3 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Using Third Party
Role Based Encryption with Efficient Access Control in Cloud Storage
Role Based Encryption with Efficient Access Control in Cloud Storage G. V. Bandewar 1, R. H. Borhade 2 1 Department of Information Technology, Sinhgad Technical Education Society s SKNCOE, Pune, India
Adding Federated Identity Management to OpenStack
Adding Federated Identity Management to OpenStack David Chadwick University of Kent 3 December 2012 University of Kent 1 Some Definitions What is Identity? A whole set of attributes that in combination
Author. Ginés Dólera Tormo. Advisors Dr. Félix Gómez Mármol (NEC Laboratories Europe) Prof. Dr. Gregorio Martínez Pérez (University of Murcia)
Systems with Faculty of Computer Science ENHANCING USER CENTRIC IDENTITY MANAGEMENT SYSTEMS WITH REPUTATION MODELS IN DISTRIBUTED ENVIRONMENTS Author Advisors Dr. Félix Gómez Mármol (NEC Laboratories Europe)
DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION
DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION Hasna.R 1, S.Sangeetha 2 1 PG Scholar, Dhanalakshmi Srinivasan College of Engineering, Coimbatore. 2 Assistant Professor, Dhanalakshmi Srinivasan
UPS battery remote monitoring system in cloud computing
, pp.11-15 http://dx.doi.org/10.14257/astl.2014.53.03 UPS battery remote monitoring system in cloud computing Shiwei Li, Haiying Wang, Qi Fan School of Automation, Harbin University of Science and Technology
Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.
Secure Privacy-Preserving Cloud Services. Abhaya Ghatkar, Reena Jadhav, Renju Georgekutty, Avriel William, Amita Jajoo DYPCOE, Akurdi, Pune [email protected], [email protected], [email protected],
A Layered Signcryption Model for Secure Cloud System Communication
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.1086
Evaluation of different Open Source Identity management Systems
Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems
CLOUD-HOSTED PROXY BASED COLLABORATION IN MULTI- CLOUD COMPUTING ENVIRONMENTS WITH ABAC METHODS
CLOUD-HOSTED PROXY BASED COLLABORATION IN MULTI- CLOUD COMPUTING ENVIRONMENTS WITH ABAC METHODS Shilpa G S 1, Maria Navin J R 2 1 PG Student, Dept. of Computer Science and Engineering, SVCE Bangalore,
http://www.paper.edu.cn
5 10 15 20 25 30 35 A platform for massive railway information data storage # SHAN Xu 1, WANG Genying 1, LIU Lin 2** (1. Key Laboratory of Communication and Information Systems, Beijing Municipal Commission
Implementing XML-based Role and Schema Migration Scheme for Clouds
Implementing XML-based Role and Schema Migration Scheme for Clouds Gurleen Kaur 1, Sarbjeet Singh 2 Computer Science and Engineering, UIET Panjab University, Chandigarh, India 1 [email protected]
A Quality Model for E-Learning as a Service in Cloud Computing Framework
A Quality Model for E-Learning as a Service in Cloud Computing Framework Dr Rajni Jindal Professor, Department of IT Indira Gandhi Institute of Technology, New Delhi, INDIA [email protected] Alka Singhal
Keywords Distributed Computing, On Demand Resources, Cloud Computing, Virtualization, Server Consolidation, Load Balancing
Volume 5, Issue 1, January 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Survey on Load
Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication
Volume 4, Issue 6, June 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Three Layered
A QoS-Aware Web Service Selection Based on Clustering
International Journal of Scientific and Research Publications, Volume 4, Issue 2, February 2014 1 A QoS-Aware Web Service Selection Based on Clustering R.Karthiban PG scholar, Computer Science and Engineering,
A TRUST BASED DELEGATION SYSTEM FOR MANAGING ACCESS CONTROL. Rainer Steffen, Rudi Knorr*
A TRUST BASED DELEGATION SYSTEM FOR MANAGING ACCESS CONTROL Rainer Steffen, Rudi Knorr* Abstract Trust is considered to be a powerful approach for managing access control in pervasive computing scenarios.
SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD
Volume 1, Issue 7, PP:, JAN JUL 2015. SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD B ANNAPURNA 1*, G RAVI 2*, 1. II-M.Tech Student, MRCET 2. Assoc. Prof, Dept.
Offline Data Synchronization in Order Management System
Offline Data Synchronization in Order Management System Abstract: We live in an increasingly connected world. However, in many cases we cannot rely on connectivity 100 percent of the time. Your users may
Near Sheltered and Loyal storage Space Navigating in Cloud
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 8 (August. 2013), V2 PP 01-05 Near Sheltered and Loyal storage Space Navigating in Cloud N.Venkata Krishna, M.Venkata
ARM7 Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology
ARM7 Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology Khatmode Ranjit P 1, Kulkarni Ramchandra V 2, Ghodke Bharat S 3, Prof. P. P. Chitte 4, Prof. Anap S. D 5 1 Student
Secure Cloud Architecture for Preserving Privacy in Cloud Computing using OTPWTP
Global Journal of Computer Science and Technology Cloud and Distributed Volume 13 Issue 3 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
A Flexible and Dynamic Failure Recovery Mechanism for Composite Web Services Using Subset Replacement
A Flexible and Dynamic Failure Recovery Mechanism for Composite Web Services Using Subset Replacement Shuchi Gupta 1, Prof. Praveen Bhanodia 2 1 Department of Computer Science & Engineering, Patel College
Privacy-preserving Digital Identity Management for Cloud Computing
Privacy-preserving Digital Identity Management for Cloud Computing Elisa Bertino [email protected] Federica Paci [email protected] Ning Shang [email protected] Rodolfo Ferrini [email protected]
Cloud Information Accountability Framework for Auditing the Data Usage in Cloud Environment
International Journal of Computational Engineering Research Vol, 03 Issue, 11 Cloud Information Accountability Framework for Auditing the Data Usage in Cloud Environment D.Dhivya 1, S.CHINNADURAI 2 1,M.E.(Cse),
An Efficient and Light weight Secure Framework for Applications of Cloud Environment using Identity Encryption Method
An Efficient and Light weight Secure Framework for Applications of Cloud Environment using Identity Encryption Method E.Sathiyamoorthy 1, S.S.Manivannan 2 1&2 School of Information Technology and Engineering
AEIJST - June 2015 - Vol 3 - Issue 6 ISSN - 2348-6732. Cloud Broker. * Prasanna Kumar ** Shalini N M *** Sowmya R **** V Ashalatha
Abstract Cloud Broker * Prasanna Kumar ** Shalini N M *** Sowmya R **** V Ashalatha Dept of ISE, The National Institute of Engineering, Mysore, India Cloud computing is kinetically evolving areas which
Improving data integrity on cloud storage services
International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services
A Review of Cloud Environment and Recognition of Highly Secure Public Data Verification Architecture using Secure Public Verifier Auditor
I J C International Journal of lectrical, lectronics ISSN No. (Online): 2277-2626 and Computer ngineering 3(2): 144-148(2014) A Review of Cloud nvironment and Recognition of Highly Secure Public Data Verification
A Security Integrated Data Storage Model for Cloud Environment
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 8, August 2014,
Research and Practice of DataRBAC-based Big Data Privacy Protection
Send Orders for Reprints to [email protected] The Open Cybernetics & Systemics Journal, 2015, 9, 669-673 669 Open Access Research and Practice of DataRBAC-based Big Data Privacy Protection Huang
A Conceptual Technique for Modelling Security as a Service in Service Oriented Distributed Systems
Volume 1, Number 2, December 2014 JOURNAL OF COMPUTER SCIENCE AND SOFTWARE APPLICATION A Conceptual Technique for Modelling Security as a Service in Service Oriented Distributed Systems Satish Kumar*,
CHAPTER - 3 WEB APPLICATION AND SECURITY
CHAPTER - 3 WEB APPLICATION AND SECURITY 3.1 Introduction Web application or Wepapp is the general term that is normally used to refer to all distributed web-based applications. According to the more technical
A Broker Based Trust Model for Cloud Computing Environment
A Broker Based Trust Model for Cloud Computing Environment Chaitali Uikey 1, Dr. D. S. Bhilare 2 1 School of Computer Science & IT, DAVV, Indore, MP. India 2 Computer Center, DAVV, Indore, MP. India Abstract
Dynamic Query Updation for User Authentication in cloud Environment
Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,
Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving,
Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Third Party
Setting deadlines and priorities to the tasks to improve energy efficiency in cloud computing
Setting deadlines and priorities to the tasks to improve energy efficiency in cloud computing Problem description Cloud computing is a technology used more and more every day, requiring an important amount
IBM WebSphere Application Server
IBM WebSphere Application Server OAuth 2.0 service provider and TAI 2012 IBM Corporation This presentation describes support for OAuth 2.0 included in IBM WebSphere Application Server V7.0.0.25. WASV70025_OAuth20.ppt
IMPLEMENTATION OF NETWORK SECURITY MODEL IN CLOUD COMPUTING USING ENCRYPTION TECHNIQUE
IMPLEMENTATION OF NETWORK SECURITY MODEL IN CLOUD COMPUTING USING ENCRYPTION TECHNIQUE 1 Rajesh L Gaikwad, 2 Dhananjay M Dakhane, 3 Ravindra L Pardhi M.E Student, Associate Professor, Assistant Professor,
QoS Based Scheduling of Workflows in Cloud Computing UPnP Architecture
QoS Based Scheduling of Workflows in Cloud Computing UPnP Architecture 1 K. Ramkumar Research Scholar Computer Science and Engineering Manonmaniam Sundaranar University Tirunelveli - 627012, Tamilnadu,
How To Create A Privacy Preserving And Dynamic Load Balancing System In A Distributed System
Enforcing Secure and Privacy-Preserving Information Brokering with Dynamic Load Balancing in Distributed Information Sharing. 1 M.E. Computer Engineering Department GHRCEM, Wagholi, Pune. [email protected]
FIPA agent based network distributed control system
FIPA agent based network distributed control system V.Gyurjyan, D. Abbott, G. Heyes, E. Jastrzembski, C. Timmer, E. Wolin TJNAF, Newport News, VA 23606, USA A control system with the capabilities to combine
Glossary of Key Terms
and s Branch Glossary of Key Terms The terms and definitions listed in this glossary are used throughout the s Package to define key terms in the context of. Access Control Access The processes by which
Analysis of Different Access Control Mechanism in Cloud
Analysis of Different Access Control Mechanism in Cloud Punithasurya K Post Graduate Scholar Department of Information Technology Karunya University, India Jeba Priya S Lecturer Department of Information
GENERIC SECURITY FRAMEWORK FOR CLOUD COMPUTING USING CRYPTONET
http:// GENERIC SECURITY FRAMEWORK FOR CLOUD COMPUTING USING CRYPTONET Manisha Dawra 1, Ramdev Singh 2 1 Al-Falah School of Engg. & Tech., Vill-Dhauj, Ballabgarh-Sohna Road, Faridabad, Haryana (INDIA)-121004
A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA
A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA Mr.Mahesh S.Giri Department of Computer Science & Engineering Technocrats Institute of Technology Bhopal, India
Attribute-Based Access Control. Stephen Schwab and Jay Jacobs. SPARTA ISSO Security Research Division (d.b.a. Cobham Analytic Solutions)
March 18, 2010 Attribute-Based Access Control Stephen Schwab and Jay Jacobs SPARTA ISSO Security Research Division (d.b.a. Cobham Analytic Solutions) Topics ABAC Usage and Features RT 0 Credentials Delegation
Data Mining Governance for Service Oriented Architecture
Data Mining Governance for Service Oriented Architecture Ali Beklen Software Group IBM Turkey Istanbul, TURKEY [email protected] Turgay Tugay Bilgin Dept. of Computer Engineering Maltepe University Istanbul,
Agent Based Negotiation using Cloud - an Approach in E-Commerce
Agent Based Negotiation using Cloud - an Approach in E-Commerce Amruta More 1, Sheetal Vij 1, Debajyoti Mukhopadhyay 2, 1 Department of Computer Engineering, 2 Department of Information Technology, Maharashtra
A Delegation Framework for Federated Identity Management
A Framework for Federated Identity Management Hidehito Gomi, Makoto Hatakeyama, Shigeru Hosono and Satoru Fujita NEC Internet Systems Research Laboratories 1753, Shimonumabe, Nakahara-Ku, Kawasaki, Kanagawa
Federation Proxy for Cross Domain Identity Federation
Proxy for Cross Domain Identity Makoto Hatakeyama NEC Corporation, Common Platform Software Res. Lab. 1753, Shimonumabe, Nakahara-Ku, Kawasaki, Kanagawa 211-8666, Japan +81-44-431-7663 [email protected]
CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW
CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW 1 XINQIN GAO, 2 MINGSHUN YANG, 3 YONG LIU, 4 XIAOLI HOU School of Mechanical and Precision Instrument Engineering, Xi'an University
Development of Software As a Service Based GIS Cloud for Academic Institutes. Singh, Pushpraj 1 and Gupta, R. D. 2
Development of Software As a Service Based GIS Cloud for Academic Institutes Singh, Pushpraj 1 and Gupta, R. D. 2 1 Student, M. Tech. (GIS & Remote Sensing); GIS Cell; Motilal Nehru National Institute
An Agent-Based Concept for Problem Management Systems to Enhance Reliability
An Agent-Based Concept for Problem Management Systems to Enhance Reliability H. Wang, N. Jazdi, P. Goehner A defective component in an industrial automation system affects only a limited number of sub
Index Terms: Data integrity, dependable distributed storage, Cloud Computing
Volume 5, Issue 5, May 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Cloud Data Protection
Common Capabilities for Service Oriented Infrastructures In A Grid & Cloud Computing
Common Capabilities for Service Oriented Infrastructures In A Grid & Cloud Computing Prof. R.T Nakhate Nagpur University DMIETR, Salod Wardha Prof. M. Sayankar Nagpur University BDCOE Sevagram, Wardha
Secure Role-Based Access Control on Encrypted Data in Cloud Storage using Raspberry PI
Volume: 2, Issue: 7, 20-27 July 2015 www.allsubjectjournal.com e-issn: 2349-4182 p-issn: 2349-5979 Impact Factor: 3.762 Miss Rohini Vidhate Savitribai Phule Pune University. Mr. V. D. Shinde Savitribai
Cloud Based E-Learning Platform Using Dynamic Chunk Size
Cloud Based E-Learning Platform Using Dynamic Chunk Size Dinoop M.S #1, Durga.S*2 PG Scholar, Karunya University Assistant Professor, Karunya University Abstract: E-learning is a tool which has the potential
A STUDY OF THE BEHAVIOUR OF THE MOBILE AGENT IN THE NETWORK MANAGEMENT SYSTEMS
A STUDY OF THE BEHAVIOUR OF THE MOBILE AGENT IN THE NETWORK MANAGEMENT SYSTEMS Tarag Fahad, Sufian Yousef & Caroline Strange School of Design and Communication Systems, Anglia Polytechnic University Victoria
Enhance data security of private cloud using encryption scheme with RBAC
Enhance data security of private cloud using encryption scheme with RBAC Dimpi Rani 1, Rajiv Kumar Ranjan 2 M.Tech (CSE) Student, Arni University, Indora, Kangra, India 1 Assistant Professor, Dept. of
Implementation of Role Based Access Control on Encrypted Data in Hybrid Cloud
Implementation of Role Based Access Control on Encrypted Data in Hybrid Cloud Gajanan Ganorkar, Prof. A.B. Deshmukh, Prof M.D.Tambhakhe Information Technology Email:[email protected] Contact: 8600200142
Secure Semantic Web Service Using SAML
Secure Semantic Web Service Using SAML JOO-YOUNG LEE and KI-YOUNG MOON Information Security Department Electronics and Telecommunications Research Institute 161 Gajeong-dong, Yuseong-gu, Daejeon KOREA
International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 Software as a Model for Security in Cloud over Virtual Environments S.Vengadesan, B.Muthulakshmi PG Student,
MULTI AGENT-BASED DISTRIBUTED DATA MINING
MULTI AGENT-BASED DISTRIBUTED DATA MINING REECHA B. PRAJAPATI 1, SUMITRA MENARIA 2 Department of Computer Science and Engineering, Parul Institute of Technology, Gujarat Technology University Abstract:
SHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING
SHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING Er. Kavin M 1, Mr.J.Jayavel 2 1 PG Scholar, 2 Teaching Assistant, Department of Information Technology, Anna University Regional
Capability Service Management System for Manufacturing Equipments in
Capability Service Management System for Manufacturing Equipments in Cloud Manufacturing 1 Junwei Yan, 2 Sijin Xin, 3 Quan Liu, 4 Wenjun Xu *1, Corresponding Author School of Information Engineering, Wuhan
The Data Grid: Towards an Architecture for Distributed Management and Analysis of Large Scientific Datasets
The Data Grid: Towards an Architecture for Distributed Management and Analysis of Large Scientific Datasets!! Large data collections appear in many scientific domains like climate studies.!! Users and
