Novel Method For Examine Progress in Cloud Environment Using Secure Cloud Forensic Structure

Size: px
Start display at page:

Download "Novel Method For Examine Progress in Cloud Environment Using Secure Cloud Forensic Structure"

Transcription

1 GLOBAL IMPACT FACTOR INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING IN RESEARCH TRENDS VOLUME 1, ISSUE 3, SEPTEMBER 2014, PP Novel Method For Examine Progress in Cloud Environment Using Secure Cloud Forensic Structure Vankam Anil Madhava 1, M.Tech Research Scholar P.Kiran Rao 2, Assistant Professor Dr.S.Prem Kumar 3, Head of the Department Department Of CSE, G.Pullaiah College of Engineering and Technology. Kurnool JNTU Anatapur, Andhra Pradesh, India Abstract: Cloud computing signifying a noticeably new innovation and an alternate ideal model in the field of Cloud computing that include more researchers. We can see in this context the need to know precisely where, when and how a bit of information is transformed or put away. Contrasted and excellent digital forensic, the field of cloud legal represents a considerable measure of troubles since information is not put away on a solitary stockpiling unit and moreover it includes the utilization of virtualization advances. In this paper we will introduce in detail another and novel method for observing movement in cloud situations and datacenters utilizing a safe cloud forensic structure. We discuss the building design of such schema and in what manner would it be able to be connected on top of new or existing Cloud computing arrangements. Additionally, for testing and results gathering we have executed this answer for our past created Cloud computing framework. Keywords: cloud computing; data forensics; logging framework; Cloud computing; binary diff. 1. INTRODUCTION Since its creation, the Cloud computing engineering introduced itself to the clients as a route in which they could lease different measures of figuring power under the manifestation of virtual machines, middle stage focused to engineers or prepared to utilize applications for mass utilization. The innovations encompassing it have advanced with extraordinary pace, yet by the by, we can discover a solitary concern in every one of them - Cloud computing security. Additionally, the need of knowing how the data is conveyed from and to the customers and under what condition is it transformed is rising nearby with the security issues. In this setting, Cloud computing has gotten to be in the most recent years an ideal model that pulls in more specialists. One of the fundamental exploration regions in this field is the route in which normal information and handling force could be imparted and conveyed crosswise over single or different datacenters that are spread over a particular topographical zone or even the whole globe. Another IJCERT

2 requirement for IT specialists is expanding: the need to know precisely how, where and in what condition is the information from the cloud put away, handled and conveyed to the customers. We can say with extraordinary certainty that Cloud computing crime scene investigation has gotten to be more a need in today s disseminated computerized world. In the event of exemplary machine legal sciences, the object is to inquiry, safeguard and break down data on machine frameworks to discover potential proof for a trial. In cloud situations the whole standard progressions in light of the fact that we don't have admittance to a physical machine, and regardless of the possibility that we have entry, it is an extraordinary risk that the information put away on it is encoded or part crosswise over different other machine frameworks. So as to resolution these central issues, scientists have created through the years different innovations. Frameworks, for example, Host-based Interruption Insurance Frameworks (HIPS) or System based Interruption Security Frameworks (NIPS) have a solitary perspective at their center: making system entrance hard. Anyhow this is insufficient in our current computerized world, as we store more information remotely, in cloud frameworks. Programmers, malware and all other Web dangers are genuine threats to our information. In this manner, lawful agents must have a route in which they can screen the movement of a certain virtual machine. The issue that they confront for this situation is primarily concerning purview, as the cloud information is frequently part crosswise over various datacenters, over numerous nations or even landmasses. On second case, current cloud bases have a tendency to leave this sensible part away and just screen virtual machines for execution instead of what is occurring inside them. Taking in record all the variables that have showed up in Cloud computing advances, advanced hypervisors and virtualization innovations execute pretty much basic components for information checking crosswise over straightforward logs that are accumulated from the whole cloud base, each checking module must have an exact target and must not influence the correct capacity of the frameworks from the datacenter. All virtualization innovations have a trouble around there. As a result of the reasons clarified as such, a reasonable perception might be made: Cloud computing is another, crude and intense exploration area on the grounds that it includes learning from numerous different areas like Dispersed Processing, calculations and information structures, organizing conventions and numerous others, with the end goal it should work appropriately. The principle worries that are climbing are impacted by the move from the customary fundamental server foundation held by clients to a brought together datacenter kept up by an outsider supplier. In this paper we are going to present another and novel path in which we can coordinate a full legal sciences system on top of another or existing cloud framework. We will discuss the structural planning that stands at it ground and we will present its focal points for the whole Cloud computing group. We will introduce additionally the effect that our innovation proposal will have on existing cloud foundations and as an evidence of idea we will display some specific usage points of interest over our Cloud computing schema that we have effectively created in (Patrascu et al., 2012). Obviously we are not ignoring the security piece of our proposal and we will display quickly a system that helps us secure the transmissions over our cloud framework modules. Whatever remains of the archive is organized as takes after. we display a percentage of the related work in this field, that is interfaced with our theme and we exhibit in detail our proposed cloud legal sciences logging skeleton. Shows how our system could be introduced inside a datacenter and what alterations might be made to enhance the general execution without interfering with the ordinary movement of the datacenter. Is committed to exhibiting our results from datacenters. Beginning from the essential building squares created by our execution made in this way, and in we close our report. IJCERT

3 2. RELATED WORK In the field of fantastic episode reaction there are is a great deal of dynamic examination and numerous books, aides and papers. All things considered, in the field of Cloud computing occurrence reaction the papers are basically hypothetical and present just a perfect model for it. Toward exemplary occurrence reaction, a standout amongst the most fascinating aides is the one from NIST. In it we can discover a synopsis containing a short depiction and suggestions for the field of machine crime scene investigation, alongside the fundamental steps that must be made when leading a scientific examination: accumulation, examination, dissection and reporting. A lot of consideration is paid to the issue on occurrence reaction and in what capacity ought to an episode be recognized, separated and dissected. Bernd Grobauer and Thomas Scheck talk in (Grobauer et al., 2010) about the difficulties forced by Cloud computing occurrence taking care of and reaction. This issue is likewise dissected in (Chen et al., 2012), where they consider that occurrence taking care of ought to be viewed as an overall characterized piece of the security process. Additionally it is introduced a portrayal for current courses of action and strategies utilized as a part of occurrence taking care of and what progressions could be made when moving towards a cloud environment from the perspective of a client or a security director. Moreover, the combination of cloud episode taking care of and cyber security is displayed in two papers, one composed by (Takahashi et al., 2010) and the other composed by (Simmons et al., 2012). They discuss how Web advancement prompts an across the board sending of different IT innovations and security propels. In their paper they additionally propose an ontological methodology for incorporation of cyber security in the connection of Cloud computing and present how data ought to be utilized and dissected within such situations. The field of cloud logging, as a backing for crime scene investigation, is additionally beginning to rise alongside the ones displayed some time recently. In these bearings, we discover theory, for example, the one of Zawoad et al which displays in (Zawoad, 2013) a structural engineering for a safe cloud logging administration. They discuss the need of log social occasion from different sources around the datacenter or hypervisors keeping in mind the end goal to make a lasting picture of the operations done in a datacenter and they exhibit an structural planning that could be utilized to help in this heading. The paper examines a logging system and presents an arrangement of rules that can give confirmation to crime scene investigation specialists that the information has been dependably produced and gathered and propose an institutionalized approach to do logging, with a specific end goal to have a solitary and unified logging authority and processor, therefore sparing time and cash for both organizations and clients. Additionally, as could be seen in papers, for example, (Amarilli et al., 2011; Atanasiu et al., 2012), the assortment of uses that incorporate logging and that might be utilized within instance of a system is huge and incorporate likewise instruments for figuring out and obscurity recognition and counteractive action. This is the primary reason that measurable examiners must take after a standard set of systems: after physically disconnecting the focused on machine, so that its information can't be coincidentally adjusted, they make a computerized duplicate of the hard drive. When the drive has been replicated, it is placed in a protected storeroom to keep up it in legitimate conditions. The majority of our examination is carried out on an advanced duplicate of the first information. 3. CATALOGUING STRUCTURE CONSTRUCTION MODELING IJCERT

4 In this segment we will exhibit the top perspective construction modeling of a cloud empowered legal sciences framework. We will begin with the general ideas and viewpoints that our framework will execute and afterward concentrate on the logging part. We will likewise discuss the framework viewpoint from the criminological agent part. 3.1 General legal sciences building design The framework exhibited in this paper has a secluded structural planning and each of the modules is introduced in subtle element. It is not difficult to see that the whole system might be stretched out with different modules or plug-in. To have a robust working stage, we should first present the idea of a Cloud computing system. As might be seen in Figure 1 the top perspective of a Cloud computing structure contains two primary layers: the virtualization layer and the administration layer. Fig. 1. Basic Cloud Computing architecture. In the virtualization layer we discover the genuine workstations that have the virtual machines and have virtualization empowered equipment. In the administration layer we discover the modules mindful with empowering the whole operations particular to the cloud, as exhibited in the past areas. Security: This module is capable with all security concerns identified with the cloud framework. For straightforwardness we can consider it as an interruption discovery and disturbing module. Validation motor: This module gets appeals to add new employments to be handled. Each new ask for is checked for consistency and it is approved and on the off chance that it is genuine, the new rent is changed in work for our framework and it is appropriately embedded in the occupation line. Virtual employments: This module makes a deliberation between the information asked for by the client and the payload that must be conveyed to the cloud framework. Scheduler: This is a standout amongst the most critical modules in a cloud skeleton. Its fundamental object is to productively plan the occupations to the virtualization layer. It likewise must speak with alternate modules to discover new cases, new administrations, virtual machine chiefs, load balancers in the framework. This module demonstrations like an interpretation layer that is particular to a virtualization programming seller. It must execute every merchant Programming interface details. Load Circulation: This module is mindful with level and vertical scaling of the appeals got from the scheduler. It must run a different application system to decouple the code from the current underneath runtime. The calculation must be connected naturally and currently this dissection, the quantity of workstations must be taken in record. IJCERT

5 Interior cloud Programming interface: This module is planned as a connection between the virtualization layer and the cloud framework. So as to be more versatile furthermore keep up a high level of reflection, a typical interface must be given and each execution of the particular Programming interface must actualize this. Outer cloud Programming interface: This module offers a route to the client to connect with the framework. It must give intends to include new occupations in the cloud framework. The appeals are enrolled and sent to the approval motor module. This Programming interface must be adaptable enough to allow adding points of interest to the employments, in the same way as the equipment particulars of the virtual machine, working framework to be utilized, bundles to be introduced. Presently that the idea of a distributed computing schema was introduced, we willable about the alterations that must be made to it with a specific end goal to make a scientific empowered cloud processing structural planning. As could be seen in Figure 2 the change influences Fig. 2. Forensic enabled cloud computing architecture. All the more precisely, we see another module, the Cloud forensic Module. Its fundamental objective is to assemble all scientific and log information from the virtual machines that are running inside the virtualization layer. Moreover, we must ascribe to the security module more noteworthy obligations and license it to speak with the various modules in the administration layer. Obviously, to accumulate information dependably from the virtual machines we must collaborate with the hypervisors existing in the workstations portion. In our paper we introduce just what adjustments must be made to a Linux piece. We have picked this option in light of the fact that in a Linux bit we can discover no less than two different, free and open source virtualization methods: KVM and XEN. A picture of a measurable empowered part might be seen in Figure 3. Fig. 3. Forensic enabled kernel. On our exploration we will concentrate on the KVM innovation. KVM (Kernel-based Virtual Machine) is a full virtualization answer for Linux on x86 equipment containing virtualization expansions on Intel or AMD processors. It comprises of a loadable piece module called KVM.ko, that IJCERT

6 gives the center virtualization framework and a processor particular module called kvm-intel.ko or kvm-amd.ko. Utilizing KVM a client can run various virtual machines running unmodified Linux or Windows pictures. Every virtual machine has private virtualized fittings, for example, a system card, circle and a realistic connector. The cloud criminological interface is executed as an arrangement of alone part modules and client space applications that could be enacted or debilitated at runtime 4 CONCLUSIONS In this paper we exhibited a novel result that gives to the digital forensic investigators a solid and secure system in which they can screen client action over a Cloud foundation. Our methodology takes the type of a complete skeleton on top of a current Cloud framework and we have depicted each of its layers and attributes. Besides, our work is centered on expanding dependability, wellbeing, security and accessibility of Cloud Computing frameworks. The qualities of such frameworks present issues when handling with secure asset administration because of its heterogeneity and topographical dissemination. We displayed the outline of a progressive design demonstrate that permits agents to flawlessly dissect workloads and virtual machines, while safeguarding versatility of vast scale Cloud frameworks. REFERENCES [1] A. Amarilli, D. Naccache, P. Rauzy and E. Simion, Can a program reverse-engineer itself?, in Proceedings of the Thirteenth IMA International Conference on Cryptography and Coding, [2] A. Atanasiu, R.F. Olimid and E. Simion, On the Security of Black- Box Implementation of Visual Secret Sharing Schemes, in Journal of Mobile, Embedded and Cloud Systems, [3] A. Pătrașcu and V. Patriciu, Beyond Digital Forensics. A Cloud Computing Perspective Over Incident Response and Reporting, in IEEE 8th International Symposium on Applied Computational Intelligence and Informatics (SACI), 2013 [4] A. Pătrașcu, C. Leordeanu, C. Dobre and V. Cristea, ReC2S:Reliable Cloud Computing System, in European Concurrent Engineering Conference, Bucharest, [5] B. Grobauer and T. Schreck, Towards incident handling in the cloud: challenges and approaches, in Proceedings of the 2010 ACM workshop on Cloud computing security workshop, New York, 2010 [6] G. Chen, Suggestions to digital forensics in Cloud computing ERA, in Third IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC), 2012 G. Sibiya, H. Venter and T. Fogwill, Digital forensic framework for a cloud environment, Proceedings of the 2012 Africa Conference, 2012 [7] [8] [9] M. Al-Fares, A. Loukissas and A. Vahdat, A Scalable,Commodity Data Center Network Architecture, in Proceedings of the ACM SIGCOMM 2008 conference on Data communication, 2008 IJCERT

Logging for Cloud Computing Forensic Systems

Logging for Cloud Computing Forensic Systems INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL ISSN 1841-9836, 10(2):222-229, April, 2015. Logging for Cloud Computing Forensic Systems A. Pătraşcu, V.V. Patriciu Alecsandru Pătraşcu* 1. Military

More information

Iaas for Private and Public Cloud using Openstack

Iaas for Private and Public Cloud using Openstack Iaas for Private and Public Cloud using Openstack J. Beschi Raja, Assistant Professor, Department of CSE, Kalasalingam Institute of Technology, TamilNadu, India, K.Vivek Rabinson, PG Student, Department

More information

Security Saving Open Examining for Secure Cloud storage

Security Saving Open Examining for Secure Cloud storage ISSN (Online): 2349-7084 GLOBAL IMPACT FACTOR 0.238 INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING IN RESEARCH TRENDS VOLUME 1, ISSUE 3, SEPTEMBER 2014, PP 131-136 Security Saving Open Examining for Secure

More information

International Journal of Enterprise Computing and Business Systems

International Journal of Enterprise Computing and Business Systems PREVENTING CYBER CRIME: A STUDY REGARDING AWARENESS OF CYBER CRIME IN TRICITY Ms.Arpana(PhD in Progress) Lecturer GJIMT, Ph-II,Mohali,India Dr.Meenal Chauhan Assistant Professor GJIMT,Ph-II, Mohali, India

More information

College Web Content Management System

College Web Content Management System College Web Content Management System. Bankar Sandeep, Doiphode Pankaj, Gunaware Bapu, Waghmode Barikrao, Prof.Nalawade V.S Department of Computer Engineering, S.P.Patil College of Engineering, Indapur,

More information

GUEST OPERATING SYSTEM BASED PERFORMANCE COMPARISON OF VMWARE AND XEN HYPERVISOR

GUEST OPERATING SYSTEM BASED PERFORMANCE COMPARISON OF VMWARE AND XEN HYPERVISOR GUEST OPERATING SYSTEM BASED PERFORMANCE COMPARISON OF VMWARE AND XEN HYPERVISOR ANKIT KUMAR, SAVITA SHIWANI 1 M. Tech Scholar, Software Engineering, Suresh Gyan Vihar University, Rajasthan, India, Email:

More information

A SMART AND EFFICIENT CLOUD APPROACH FOR BACKUP AND DATA STORAGE

A SMART AND EFFICIENT CLOUD APPROACH FOR BACKUP AND DATA STORAGE A SMART AND EFFICIENT CLOUD APPROACH FOR BACKUP AND DATA STORAGE Allagadda Gurappa 1, M.Purushotham Reddy 2, G.Rama Subba Reddy 3 1 M.tech Scholar (CSE), 2 Asst.professor, Dept. of CSE, Vignana Bharathi

More information

Full and Para Virtualization

Full and Para Virtualization Full and Para Virtualization Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF x86 Hardware Virtualization The x86 architecture offers four levels

More information

Dynamic Load Balancing of Virtual Machines using QEMU-KVM

Dynamic Load Balancing of Virtual Machines using QEMU-KVM Dynamic Load Balancing of Virtual Machines using QEMU-KVM Akshay Chandak Krishnakant Jaju Technology, College of Engineering, Pune. Maharashtra, India. Akshay Kanfade Pushkar Lohiya Technology, College

More information

Migration of Virtual Machines for Better Performance in Cloud Computing Environment

Migration of Virtual Machines for Better Performance in Cloud Computing Environment Migration of Virtual Machines for Better Performance in Cloud Computing Environment J.Sreekanth 1, B.Santhosh Kumar 2 PG Scholar, Dept. of CSE, G Pulla Reddy Engineering College, Kurnool, Andhra Pradesh,

More information

International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 Software as a Model for Security in Cloud over Virtual Environments S.Vengadesan, B.Muthulakshmi PG Student,

More information

A Research on Security Awareness and Countermeasures for the Single Server

A Research on Security Awareness and Countermeasures for the Single Server , pp.31-42 http://dx.doi.org/10.14257/ijsia.2013.7.6.04 A Research on Security Awareness and Countermeasures for the Single Server Hyuk-Jin Son 1 and Seungdo Jeong 2,* 1 IT MBA, Graduate School of Business

More information

kvm: Kernel-based Virtual Machine for Linux

kvm: Kernel-based Virtual Machine for Linux kvm: Kernel-based Virtual Machine for Linux 1 Company Overview Founded 2005 A Delaware corporation Locations US Office Santa Clara, CA R&D - Netanya/Poleg Funding Expertise in enterprise infrastructure

More information

HRG Assessment: Stratus everrun Enterprise

HRG Assessment: Stratus everrun Enterprise HRG Assessment: Stratus everrun Enterprise Today IT executive decision makers and their technology recommenders are faced with escalating demands for more effective technology based solutions while at

More information

Resource usage monitoring for KVM based virtual machines

Resource usage monitoring for KVM based virtual machines 2012 18th International Conference on Adavanced Computing and Communications (ADCOM) Resource usage monitoring for KVM based virtual machines Ankit Anand, Mohit Dhingra, J. Lakshmi, S. K. Nandy CAD Lab,

More information

Practical Threat Intelligence. with Bromium LAVA

Practical Threat Intelligence. with Bromium LAVA Practical Threat Intelligence with Bromium LAVA Practical Threat Intelligence Executive Summary Threat intelligence today is costly and time consuming and does not always result in a reduction of successful

More information

An Architecture Model of Sensor Information System Based on Cloud Computing

An Architecture Model of Sensor Information System Based on Cloud Computing An Architecture Model of Sensor Information System Based on Cloud Computing Pengfei You, Yuxing Peng National Key Laboratory for Parallel and Distributed Processing, School of Computer Science, National

More information

A SECURE BALANCING SUPPORT ON CLOUD PANEL DIVISION FOR PUBLIC CLOUDS

A SECURE BALANCING SUPPORT ON CLOUD PANEL DIVISION FOR PUBLIC CLOUDS A SECURE BALANCING SUPPORT ON CLOUD PANEL DIVISION FOR PUBLIC CLOUDS Apparao Settipalli 1, Kunapareddy Rajanidevi 2 1 M.Tech Scholar (CSE), 2 Associate Professor Nalanda Institute of Technology (NIT),

More information

Data sets preparing for Data mining analysis by SQL Horizontal Aggregation

Data sets preparing for Data mining analysis by SQL Horizontal Aggregation Data sets preparing for Data mining analysis by SQL Horizontal Aggregation V.Nikitha 1, P.Jhansi 2, K.Neelima 3, D.Anusha 4 Department Of IT, G.Pullaiah College of Engineering and Technology. Kurnool JNTU

More information

Ensuring Security in Cloud with Multi-Level IDS and Log Management System

Ensuring Security in Cloud with Multi-Level IDS and Log Management System Ensuring Security in Cloud with Multi-Level IDS and Log Management System 1 Prema Jain, 2 Ashwin Kumar PG Scholar, Mangalore Institute of Technology & Engineering, Moodbidri, Karnataka1, Assistant Professor,

More information

Implementing Digital Forensic Readiness for Cloud Computing Using Performance Monitoring Tools

Implementing Digital Forensic Readiness for Cloud Computing Using Performance Monitoring Tools Implementing Digital Forensic Readiness for Cloud Computing Using Performance Monitoring Tools F.R. Van Staden and H.S. Venter University of Pretoria Abstract Cloud computing is a scalable, distributed

More information

Seven Simple steps. For Mobile Device Management (MDM) 1. Why MDM? Series

Seven Simple steps. For Mobile Device Management (MDM) 1. Why MDM? Series Series Seven Simple steps For Mobile Device Management (MDM) Mobile device management (MDM) has become a necessity across the globe due to the ever expanding and developing world of technology; Technavio

More information

Advanced Library Management System Using Bluetooth in Android Platform

Advanced Library Management System Using Bluetooth in Android Platform Advanced Library Management System Using Bluetooth in Android Platform A.M.Rangarajan 1 S.Gavaskar 2 P. Purusotham Naidu 3 Associate Professor MCA Scholar MCA Scholar Department of Master of Computer Applications

More information

Move beyond monitoring to holistic management of application performance

Move beyond monitoring to holistic management of application performance Move beyond monitoring to holistic management of application performance IBM SmartCloud Application Performance Management: Actionable insights to minimize issues Highlights Manage critical applications

More information

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination

More information

Associate Professor, Department of CSE, Shri Vishnu Engineering College for Women, Andhra Pradesh, India 2

Associate Professor, Department of CSE, Shri Vishnu Engineering College for Women, Andhra Pradesh, India 2 Volume 6, Issue 3, March 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Special Issue

More information

Cyber Forensic for Hadoop based Cloud System

Cyber Forensic for Hadoop based Cloud System Cyber Forensic for Hadoop based Cloud System ChaeHo Cho 1, SungHo Chin 2 and * Kwang Sik Chung 3 1 Korea National Open University graduate school Dept. of Computer Science 2 LG Electronics CTO Division

More information

A Review on Cloud Computing Vulnerabilities

A Review on Cloud Computing Vulnerabilities A Review on Cloud Computing Vulnerabilities Ms. Sugandha Nandedkar, Ms.Sangeeta Kakarwal Asst.Prof., Department of Computer Science and Engineering, DIEMS /Dr. BAMU, Aurangabad, MH, India. Prof. and HOD,

More information

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services Lifecycle Solutions & Services Managed Industrial Cyber Security Services Around the world, industrial firms and critical infrastructure operators partner with Honeywell to address the unique requirements

More information

An Agent-Based Concept for Problem Management Systems to Enhance Reliability

An Agent-Based Concept for Problem Management Systems to Enhance Reliability An Agent-Based Concept for Problem Management Systems to Enhance Reliability H. Wang, N. Jazdi, P. Goehner A defective component in an industrial automation system affects only a limited number of sub

More information

What Do You Mean My Cloud Data Isn t Secure?

What Do You Mean My Cloud Data Isn t Secure? Kaseya White Paper What Do You Mean My Cloud Data Isn t Secure? Understanding Your Level of Data Protection www.kaseya.com As today s businesses transition more critical applications to the cloud, there

More information

SPACK FIREWALL RESTRICTION WITH SECURITY IN CLOUD OVER THE VIRTUAL ENVIRONMENT

SPACK FIREWALL RESTRICTION WITH SECURITY IN CLOUD OVER THE VIRTUAL ENVIRONMENT SPACK FIREWALL RESTRICTION WITH SECURITY IN CLOUD OVER THE VIRTUAL ENVIRONMENT V. Devi PG Scholar, Department of CSE, Indira Institute of Engineering & Technology, India. J. Chenni Kumaran Associate Professor,

More information

Virtualization for Cloud Computing

Virtualization for Cloud Computing Virtualization for Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF CLOUD COMPUTING On demand provision of computational resources

More information

Installing & Using KVM with Virtual Machine Manager COSC 495

Installing & Using KVM with Virtual Machine Manager COSC 495 Installing & Using KVM with Virtual Machine Manager COSC 495 1 Abstract:. There are many different hypervisors and virtualization software available for use. One commonly use hypervisor in the Linux system

More information

Cloud Computing for Agent-based Traffic Management Systems

Cloud Computing for Agent-based Traffic Management Systems Cloud Computing for Agent-based Traffic Management Systems Manoj A Patil Asst.Prof. IT Dept. Khyamling A Parane Asst.Prof. CSE Dept. D. Rajesh Asst.Prof. IT Dept. ABSTRACT Increased traffic congestion

More information

Overview - Snort Intrusion Detection System in Cloud Environment

Overview - Snort Intrusion Detection System in Cloud Environment International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 3 (2014), pp. 329-334 International Research Publications House http://www. irphouse.com /ijict.htm Overview

More information

How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System

How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System REVIEW ARTICAL A Novel Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage Dumala Harisha 1, V.Gouthami 2 1 Student, Computer Science & Engineering-Department, JNTU Hyderabad India

More information

Analysis and Research of Cloud Computing System to Comparison of Several Cloud Computing Platforms

Analysis and Research of Cloud Computing System to Comparison of Several Cloud Computing Platforms Volume 1, Issue 1 ISSN: 2320-5288 International Journal of Engineering Technology & Management Research Journal homepage: www.ijetmr.org Analysis and Research of Cloud Computing System to Comparison of

More information

A UPS Framework for Providing Privacy Protection in Personalized Web Search

A UPS Framework for Providing Privacy Protection in Personalized Web Search A UPS Framework for Providing Privacy Protection in Personalized Web Search V. Sai kumar 1, P.N.V.S. Pavan Kumar 2 PG Scholar, Dept. of CSE, G Pulla Reddy Engineering College, Kurnool, Andhra Pradesh,

More information

Virtualization. Jukka K. Nurminen 23.9.2015

Virtualization. Jukka K. Nurminen 23.9.2015 Virtualization Jukka K. Nurminen 23.9.2015 Virtualization Virtualization refers to the act of creating a virtual (rather than actual) version of something, including virtual computer hardware platforms,

More information

Research on Digital Forensics Based on Private Cloud Computing

Research on Digital Forensics Based on Private Cloud Computing Research on Digital Forensics Based on Private Cloud Computing Gang Zeng Police Information Technology Department, Liaoning Police Academy, Liaoning, China ABSTRACT With development of network, massive

More information

Challenges and Importance of Green Data Center on Virtualization Environment

Challenges and Importance of Green Data Center on Virtualization Environment Challenges and Importance of Green Data Center on Virtualization Environment Abhishek Singh Department of Information Technology Amity University, Noida, Uttar Pradesh, India Priyanka Upadhyay Department

More information

Advancement in Virtualization Based Intrusion Detection System in Cloud Environment

Advancement in Virtualization Based Intrusion Detection System in Cloud Environment Advancement in Virtualization Based Intrusion Detection System in Cloud Environment Jaimin K. Khatri IT Systems and Network Security GTU PG School, Ahmedabad, Gujarat, India Mr. Girish Khilari Senior Consultant,

More information

Dynamic and Efficient Student Management System

Dynamic and Efficient Student Management System Dynamic and Efficient Student Management System M.Sathish Kumar 1 G.Kumar 2 E.Siva 3 Assistant Professor MCA Scholar MCA Scholar Department of Master of Computer Applications Sri Venkateswara College of

More information

Stay ahead of insiderthreats with predictive,intelligent security

Stay ahead of insiderthreats with predictive,intelligent security Stay ahead of insiderthreats with predictive,intelligent security Sarah Cucuz [email protected] IBM Security White Paper Executive Summary Stay ahead of insider threats with predictive, intelligent

More information

Mobile Adaptive Opportunistic Junction for Health Care Networking in Different Geographical Region

Mobile Adaptive Opportunistic Junction for Health Care Networking in Different Geographical Region International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 2 (2014), pp. 113-118 International Research Publications House http://www. irphouse.com /ijict.htm Mobile

More information

Pre-scheduled Control of Online Device-Based Backup and Incremental Data Backup in VMware Virtual System Environment

Pre-scheduled Control of Online Device-Based Backup and Incremental Data Backup in VMware Virtual System Environment X Triennial International SAUM Conference on Systems, Automatic Control and Measurements Niš, Serbia, November 10 th -12 th, 2010 Pre-scheduled Control of Online Device-Based Backup and Incremental Data

More information

21/09/11. Introduction to Cloud Computing. First: do not be scared! Request for contributors. ToDO list. Revision history

21/09/11. Introduction to Cloud Computing. First: do not be scared! Request for contributors. ToDO list. Revision history Request for contributors Introduction to Cloud Computing https://portal.futuregrid.org/contrib/cloud-computing-class by various contributors (see last slide) Hi and thanks for your contribution! If you

More information

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 Load Balancing Heterogeneous Request in DHT-based P2P Systems Mrs. Yogita A. Dalvi Dr. R. Shankar Mr. Atesh

More information

Analysis on Virtualization Technologies in Cloud

Analysis on Virtualization Technologies in Cloud Analysis on Virtualization Technologies in Cloud 1 V RaviTeja Kanakala, V.Krishna Reddy, K.Thirupathi Rao 1 Research Scholar, Department of CSE, KL University, Vaddeswaram, India I. Abstract Virtualization

More information

Performance Comparison of VMware and Xen Hypervisor on Guest OS

Performance Comparison of VMware and Xen Hypervisor on Guest OS ISSN: 2393-8528 Contents lists available at www.ijicse.in International Journal of Innovative Computer Science & Engineering Volume 2 Issue 3; July-August-2015; Page No. 56-60 Performance Comparison of

More information

Design & Implementation about Mining Enterprise EAM (Enterprise Asset Management) System

Design & Implementation about Mining Enterprise EAM (Enterprise Asset Management) System Design & Implementation about Mining Enterprise EAM (Enterprise Asset Management) System Wang Huan, Li Changliang, Wang Dianlong Anshan Iron and Steel Group Corporation Mining Industry Company Abstract:

More information

THREATS AND VULNERABILITIES FOR C 4 I IN COMMERCIAL TELECOMMUNICATIONS: A PARADIGM FOR MITIGATION

THREATS AND VULNERABILITIES FOR C 4 I IN COMMERCIAL TELECOMMUNICATIONS: A PARADIGM FOR MITIGATION THREATS AND VULNERABILITIES FOR C 4 I IN COMMERCIAL TELECOMMUNICATIONS: A PARADIGM FOR MITIGATION Joan Fowler and Robert C. Seate III Data Systems Analysts, Inc. 10400 Eaton Place, Suite 400 Fairfax, VA

More information

Basics of Virtualisation

Basics of Virtualisation Basics of Virtualisation Volker Büge Institut für Experimentelle Kernphysik Universität Karlsruhe Die Kooperation von The x86 Architecture Why do we need virtualisation? x86 based operating systems are

More information

Find your perfect office space, in three easy steps.

Find your perfect office space, in three easy steps. Find your perfect office space, in three easy steps. 1 We are Instant, the global specialists in flexible offices, and our goal is to fulfill your need for the perfect workplace. We make sense of the huge

More information

Achieving HIPAA Compliance with Red Hat

Achieving HIPAA Compliance with Red Hat Achieving HIPAA Compliance with Red Hat Enterprise Virtualization for Desktops The Health Insurance Portability and Accountability Act (HIPAA) of 1996 introduced a sweeping set of regulations that have

More information

Achieving HIPAA Compliance with Red Hat

Achieving HIPAA Compliance with Red Hat Achieving HIPAA Compliance with Red Hat Enterprise Virtualization for Desktops The Health Insurance Portability and Accountability Act (HIPAA) of 1996 introduced a sweeping set of regulations that have

More information

VMware vsphere 4.1. Pricing, Packaging and Licensing Overview. E f f e c t i v e A u g u s t 1, 2 0 1 0 W H I T E P A P E R

VMware vsphere 4.1. Pricing, Packaging and Licensing Overview. E f f e c t i v e A u g u s t 1, 2 0 1 0 W H I T E P A P E R VMware vsphere 4.1 Pricing, Packaging and Licensing Overview E f f e c t i v e A u g u s t 1, 2 0 1 0 W H I T E P A P E R Table of Contents Executive Summary...................................................

More information

CONSIDERATION OF TRUST LEVELS IN CLOUD ENVIRONMENT

CONSIDERATION OF TRUST LEVELS IN CLOUD ENVIRONMENT INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE CONSIDERATION OF TRUST LEVELS IN CLOUD ENVIRONMENT Bhukya Ganesh 1, Mohd Mukram 2, MD.Tajuddin 3 1 M.Tech Student, Dept of CSE, Shaaz

More information

A Novel Solution on Alert Conflict Resolution Model in Network Management

A Novel Solution on Alert Conflict Resolution Model in Network Management A Novel Solution on Alert Conflict Resolution Model in Network Management Yi-Tung F. Chan University of Wales United Kingdom [email protected] Ramaswamy D.Thiyagu University of East London United

More information

A Study on Detection of Hacking and Malware Codes in Bare Metal Hypervisor for Virtualized Internal Environment of Cloud Service

A Study on Detection of Hacking and Malware Codes in Bare Metal Hypervisor for Virtualized Internal Environment of Cloud Service 78 A Study on Detection of Hacking and Malware Codes in Bare Metal Hypervisor for Virtualized Internal Environment of Cloud Service Jung-oh Park Dept. of Information Communications, DONGYANG MIRAE University,

More information

Energy Conscious Virtual Machine Migration by Job Shop Scheduling Algorithm

Energy Conscious Virtual Machine Migration by Job Shop Scheduling Algorithm Energy Conscious Virtual Machine Migration by Job Shop Scheduling Algorithm Shanthipriya.M 1, S.T.Munusamy 2 ProfSrinivasan. R 3 M.Tech (IT) Student, Department of IT, PSV College of Engg & Tech, Krishnagiri,

More information

Analysis of Issues with Load Balancing Algorithms in Hosted (Cloud) Environments

Analysis of Issues with Load Balancing Algorithms in Hosted (Cloud) Environments Analysis of Issues with Load Balancing Algorithms in Hosted (Cloud) Environments Branko Radojević *, Mario Žagar ** * Croatian Academic and Research Network (CARNet), Zagreb, Croatia ** Faculty of Electrical

More information

CPNI VIEWPOINT CONFIGURING AND MANAGING REMOTE ACCESS FOR INDUSTRIAL CONTROL SYSTEMS

CPNI VIEWPOINT CONFIGURING AND MANAGING REMOTE ACCESS FOR INDUSTRIAL CONTROL SYSTEMS CPNI VIEWPOINT CONFIGURING AND MANAGING REMOTE ACCESS FOR INDUSTRIAL CONTROL SYSTEMS MARCH 2011 Acknowledgements This Viewpoint is based upon the Recommended Practice: Configuring and Managing Remote Access

More information

International Journal of Advanced Engineering Research and Applications (IJAERA) ISSN: 2454-2377 Vol. 1, Issue 6, October 2015. Big Data and Hadoop

International Journal of Advanced Engineering Research and Applications (IJAERA) ISSN: 2454-2377 Vol. 1, Issue 6, October 2015. Big Data and Hadoop ISSN: 2454-2377, October 2015 Big Data and Hadoop Simmi Bagga 1 Satinder Kaur 2 1 Assistant Professor, Sant Hira Dass Kanya MahaVidyalaya, Kala Sanghian, Distt Kpt. INDIA E-mail: [email protected]

More information

VMware Server 2.0 Essentials. Virtualization Deployment and Management

VMware Server 2.0 Essentials. Virtualization Deployment and Management VMware Server 2.0 Essentials Virtualization Deployment and Management . This PDF is provided for personal use only. Unauthorized use, reproduction and/or distribution strictly prohibited. All rights reserved.

More information

Database Replication

Database Replication Database Systems Journal vol. I, no. 2/2010 33 Database Replication Marius Cristian MAZILU Academy of Economic Studies, Bucharest, Romania [email protected], [email protected] For someone

More information

OFFLOADING THE CLIENT-SERVER TRE EFFORT FOR MINIMIZING CLOUD BANDWITH AND COST

OFFLOADING THE CLIENT-SERVER TRE EFFORT FOR MINIMIZING CLOUD BANDWITH AND COST OFFLOADING THE CLIENT-SERVER TRE EFFORT FOR MINIMIZING CLOUD BANDWITH AND COST Akshata B Korwar #1,Ashwini B Korwar #2,Sharanabasappa D Hannure #3 #1 Karnataka Kalburgi, 9742090637, korwar9.aksha ta@ gmail.com.

More information

LASTLINE WHITEPAPER. Why Anti-Virus Solutions Based on Static Signatures Are Easy to Evade

LASTLINE WHITEPAPER. Why Anti-Virus Solutions Based on Static Signatures Are Easy to Evade LASTLINE WHITEPAPER Why Anti-Virus Solutions Based on Static Signatures Are Easy to Evade Abstract Malicious code is an increasingly important problem that threatens the security of computer systems. The

More information

CLOUD COMPUTING. DAV University, Jalandhar, Punjab, India. DAV University, Jalandhar, Punjab, India

CLOUD COMPUTING. DAV University, Jalandhar, Punjab, India. DAV University, Jalandhar, Punjab, India CLOUD COMPUTING 1 Er. Simar Preet Singh, 2 Er. Anshu Joshi 1 Assistant Professor, Computer Science & Engineering, DAV University, Jalandhar, Punjab, India 2 Research Scholar, Computer Science & Engineering,

More information

Practice of M2M Connecting Real-World Things with Cloud Computing

Practice of M2M Connecting Real-World Things with Cloud Computing Practice of M2M Connecting Real-World Things with Cloud Computing Tatsuzo Osawa Machine-to-Machine (M2M) means connecting many machines with a management center via wide-area mobile or satellite networks

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION CHAPTER 1 INTRODUCTION 1.1 Background The command over cloud computing infrastructure is increasing with the growing demands of IT infrastructure during the changed business scenario of the 21 st Century.

More information

The assignment of chunk size according to the target data characteristics in deduplication backup system

The assignment of chunk size according to the target data characteristics in deduplication backup system The assignment of chunk size according to the target data characteristics in deduplication backup system Mikito Ogata Norihisa Komoda Hitachi Information and Telecommunication Engineering, Ltd. 781 Sakai,

More information

ILLUMIO ADAPTIVE SECURITY PLATFORM TM

ILLUMIO ADAPTIVE SECURITY PLATFORM TM ILLUMIO ADAPTIVE SECURITY PLATFORM TM HIGHLIGHTS Security with Intelligence Illumio ASP is powered by the breakthrough PCE. The PCE contextualizes all traffic flows, services, and processes on application

More information

Identifying Data Integrity in the Cloud Storage

Identifying Data Integrity in the Cloud Storage www.ijcsi.org 403 Identifying Data Integrity in the Cloud Storage Saranya Eswaran 1 and Dr.Sunitha Abburu 2 1 Adhiyamaan College of Engineering, Department of Computer Application, Hosur. 2 Professor and

More information

IBM Security. 2013 IBM Corporation. 2013 IBM Corporation

IBM Security. 2013 IBM Corporation. 2013 IBM Corporation IBM Security Security Intelligence What is Security Intelligence? Security Intelligence --noun 1.the real-time collection, normalization and analytics of the data generated by users, applications and infrastructure

More information