ASSURING INTEGRITY OF DATAFLOW PROCESSING IN CLOUD COMPUTING INFRASTRUCTURE

Similar documents
Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds

Secure Way of Storing Data in Cloud Using Third Party Auditor

ISSN: (Online) Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies

A Survey on Service Integrity in Software as a Service

Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment

Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System

Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing.

CONSIDERATION OF TRUST LEVELS IN CLOUD ENVIRONMENT

Secure Cloud Transactions by Performance, Accuracy, and Precision

Ensuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication

Juan (Jenn) Du. Homepage: www4.ncsu.edu/ jdu/ Co-advisors: Dr. Xiaohui (Helen) Gu and Dr. Douglas Reeves

Virtualisation Without a Hypervisor in Cloud Infrastructures: An Initial Analysis

Enhancing Data Security in Cloud Storage Auditing With Key Abstraction

Security Considerations for Virtual Platform Provisioning

RE-TRUST. PoliTO Prototypes Overview. Paolo Falcarin, Stefano DiCarlo Alessandro Cabutto, Nicola Garazzino, Davide Barberis

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION

Ensuring Security in Cloud with Multi-Level IDS and Log Management System

Near Sheltered and Loyal storage Space Navigating in Cloud

Index Terms: Data integrity, dependable distributed storage, Cloud Computing

IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD

ADVANCE SECURITY TO CLOUD DATA STORAGE

How To Ensure Correctness Of Data In The Cloud

Android Security Extensions

Cloud Battlefield Support and Security Assessment

A Threat Model for a Cloud Infrastructure with no Hypervisor

Seeding Clouds with Trust Anchors

An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud

International Journal of Advance Research in Computer Science and Management Studies

A Comparative Study of Applying Real- Time Encryption in Cloud Computing Environments

Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment

Identifying Data Integrity in the Cloud Storage

How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System

SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD

Security Considerations for Public Mobile Cloud Computing

Lecture and Presentation Topics (tentative) CS 7301: Recent Advances in Cloud Computing

A Secure and Dependable Cloud Storage Service in Cloud Computing

Data Deduplication Scheme for Cloud Storage

Cloud Based E-Learning Platform Using Dynamic Chunk Size

RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM

Analysis of Secure Cloud Data Sharing Within a Group

Dynamic Query Updation for User Authentication in cloud Environment

Ashok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram.

Cryptographic Data Security over Cloud

Payment minimization and Error-tolerant Resource Allocation for Cloud System Using equally spread current execution load

Secure Data transfer in Cloud Storage Systems using Dynamic Tokens.

Enabling Public Auditing for Secured Data Storage in Cloud Computing

Trusted Virtual Datacenter Radically simplified security management

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 4, Issue 8, February 2015

CIT 668: System Architecture

Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving,

Privacy preserving technique to secure cloud

Improving data integrity on cloud storage services

Cloud Data Storage Services Considering Public Audit for Security

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 1, March, 2013 ISSN:

Proof of Retrivability: A Third Party Auditor Using Cloud Computing

Data Storage Security in Cloud Computing

SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING

A Comprehensive Data Forwarding Technique under Cloud with Dynamic Notification

Detection and mitigation of Web Services Attacks using Markov Model

Service and Data Security for Multi Cloud Environment

February. ISSN:

International Journal of Computer & Organization Trends Volume21 Number1 June 2015 A Study on Load Balancing in Cloud Computing

CDBMS Physical Layer issue: Load Balancing

Universities of Leeds, Sheffield and York

An Efficient Data Correctness Approach over Cloud Architectures

Mobile Cloud Computing Security Considerations

Implementation of Role Based Access Control on Encrypted Data in Hybrid Cloud

Load Balancing on a Grid Using Data Characteristics

Verifying Correctness of Trusted data in Clouds

A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA

Erasure correcting to enhance data security in cloud data storage

Application Based Access Control on Cloud Networks for Data Security

A Survey Paper: Cloud Computing and Virtual Machine Migration

Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES

IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD ENVIRONMENT

Load Distribution in Large Scale Network Monitoring Infrastructures

International Journal of Advance Research in Computer Science and Management Studies

Secure Framework for Data Storage from Single to Multi clouds in Cloud Networking

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA

Security and Privacy in Cloud Computing

Securing Storage as a Service Model of Cloud Computing using Client Authentication in Virtualized Environment

Visualisation in the Google Cloud

A survey on cost effective multi-cloud storage in cloud computing

Transcription:

ASSURING INTEGRITY OF DATAFLOW PROCESSING IN CLOUD COMPUTING INFRASTRUCTURE R.Genga devi 1, K.Anitha 2, M.Murugeshwari 3,S.vidhya 4, Dr.K.Ramasamy 5 1, 2, 3- UG STUDENT, P.S.R.RENGASAMY COLLEGE OF ENGINEERING FOR WOMEN,SIVAKASI 4, - ASSISTANT PROFESSOR,, P.S.R.RENGASAMY COLLEGE OF ENGINEERING FOR WOMEN, SIVAKASI 5- PRINCIPAL, P.S.R.RENGASAMY COLLEGE OF ENGINEERING FOR WOMEN, SIVAKASI 1 rgenga11@gmail.com, 2 rrajam79@gmail.com, 3 murugeshwari03@gmail.com ABSTRACT: In cloud service provider will provides different types of service. In our project they are using Software as a Service (SaaS). In the cloud service provider will enables application will be shared via massive cloud infrastructure. In the type of sharing nature they will spread the infected code and then make the system more vulnerable then perform malicious attack in the service provider. In the project, they will perform intruder test and make the system is scalable and effective service integrity in the Software as a Service Provider (SaaS). In intruder test can provides the novel integrated attestation scheme provide stronger attacker in the pin point scheme in the previous models. In the Intruder test will automatically provides good results when will provide a better when compared to previous of malicious attack code. So, it is very effective for the cloud shares. In the type will provide secure to all type of files. In the model will provide effective result in the type of intruder test. So, they will share effective information in the Software as a Service Provider (SaaS). Therefore, any type of malicious attacker will not attack our files. So, the Intruder test will be used in the project. Keywords: Intruder test, Malicious attacker, Pin point power, Software as a Service, Integrated attestation scheme. Introduction: Cloud computing is a emerged technique because of the physical system infrastructure will not have enough memory space. So, we are using the clod computing. In the Google App Engine will also in built with the Software as a Service (SaaS), Service Oriented Architecture (SOA) and enables the application service providers (ASPs) to deliver their applications via the massive cloud computing infrastructure. In the project will store the massive amount of data stream and then they will uses Intruder Test. In the Traditional system they use the Byzantine fault tolerance (BFT) technique and pin point power technique and then our system uses the Intruder test. Intruder test examines the both per-function consistency graphs and the global inconsistency graph. In per-function consistency graph will shows the analysis and scope of the colluding attackers. In the global inconsistency graph will shows to expose the attackers to compromise the system. In Intruder test will provides auto correction of the data stream 89

in the system. So, they will first using the Intruder test and the auto correction model for Software as a Service provider model (Saas). type of service provider will checks the file and upload to cloud. So, the malicious code will not share the system. System Design: In this paper we are using the Intruder test technique and auto correction techniques. We make the following contributions. We propose an Intruder test technique, what type of data stream will be attacked and then test the data stream. We also propose a auto correction technique it will be used to automatically correct the intruder information. Administrator Some type of malicious code share the file Malicious attack Benign service provider We carry out the technique to provide more security and then enhance a system model. In the admin phase, they will share the file in the cloud and the admin will also checks any type of malicious code will be found in the file. The admin will use Intruder test and then they manage these type of malicious file. In the admin will also uses the auto correction technique to correct the uploading the file. So, they will manage only correct type of file to upload it. user User share the file In the Malicious attack phase, will any type of malicious code in the cloud share. In the clod these type any vulnerability of attack will be find out and manage in the admin phase. So, they we are using the Intruder test and auto correction technique. In the Benign service provider, is nothing but checks the any type of attack in the system. In the Pin Point Power Auto correction technique 90

In the user phase, the user will wants to share the data stream into the cloud. In the type of sharing any type of vulnerability will proof into the system. In the System, we are using some techniques to remove these vulnerabilities. In the Pin point power, is the traditional technique for remove the vulnerability. In the approach we are remove small amount of attack. But, those type of system using the Intruder test to remove the malicious code. It will be used to any kind of attack to remove it. In the Auto correction Technique, will be used to automatically correct that attack. In the phase, any type of viruses and vulnerability can be removed. So, it will produce very effective sharing. Implementing Safe Shares: A Safe share will provides some of the technique. These technique are used to satisfy and correct the malicious code in the attack. Pin Point Power Algorithm: 7. final malicious node set R = R Ω 8. if R = Ø 9. continue 10. else 11. for every Gi 12. compute Mi 13. set Ωi to the subset of appearing in the Gi 14. if (Ωi Mi Ø ) 15. R = R Mi 16. return all sets of R Simulation Parameters: There are different type of simulation parameters are used to detect the system performance. In the type we are use no of users in the cloud and then the how many data strea are uploaded in the cloud. And how many minutes to take to complete the process. In the process there are two graphs will be used. Graph Analysis Time for Intruder Test No.of Providers Consistency graph Inconsistency graph In the system will also uses this type of algorithm. And then also provides very safe share of file or data stream in the cloud. Algorithm: 1. for every M [ CG, N/2 ] 2. Ω = Ø, R = Ø 3. for every node p in G 4. compute Np + CG 5. if ( Np + CG > M) 6. Ω= Ω {p} 200 4.22 ± 0.018 400 15.89± 0.013 600 35.29 ± 0.095 1.64 ± 0.001 6.52 ± 0.004 15.11 ± 0.015 91

800 62.62 ± 0.021 1000 100.00 ± 0.434 1200 120.00 ± 0.544 26.18 ± 0.350 39.98 ± 0.179 49.98 ± 0.119 Using that type of the graph analysis, we have analysis the time of the security share. We are also use the auto correction method to deploy for the security file share. ATTESTATED OVERHEAD COMPARISION Related Work: Distributed Authorization: If a dynamic cloud Environment, the consistency of distributed environment for security shares. It describes an inconsistency issue that can be arise in the authorization policies are in a static but it can be revoked or altered. These inconsistency leads to an unsafe share of the data stream. Relaxed Consistency Model: in a cloud environment the database solution can be written. In large scale applications it will introduce a new set of consistency proble when it will provided the new dimensions. In the Intruder test will also provide the attested use of the data stream and then how to use of it. In the auto correction technique is used to correct that type of malicious file. In the related system will sometimes makes inconsistency and dynamic environment. Future work: 100 90 80 70 60 50 40 30 20 10 0 Run test PMTV FTMV Inturder test In the Paper, will also provides some new techniques to test any type of file. In they will also uses dynamic, scalable environment in future. In the paper will also exhibits in any size of file will used to share. Some new techniques are added to the system and it will make the system very fast. In the System will check any type of redundant malicious code in the system it will be easily find out. So, it will uses any type of auto correction technique is used to correct any type of file (i.e., video, audio, image an text file also) 92

Conclusion: In this paper, we have presented the design and implementation of Intruder Test, and a novel integrated service attestation framework for multitenant software-as-a-service (Saas) cloud syste. Intruder Test enables randomized replay-based consistency check and verify the integrity of distributed service components without imposing high overhead of the cloud infrastructure. Intruder Test also perfor integrated analysis over both consistency and global inconsistency attestation graphs to pinpoint colluding attackers more efficiently than existing techniques. Furthermore, Intruder Test provides result to auto correction to automatically correct compromised results to improve the result quality. We have implemented Intruder Test and tested it on a commercial stream of data processing platform running inside a production virtualized cloud computing infrastructure.our experimental results will show that Intruder Test can achieve higher pinpointing accuracy than existing alternative schemes. Intruder Test is light-weight, which imposes low performance impact to the input data processing, services running inside the cloud computing. It will also detect any type of malicious code present in the shared file. REFERENCES: [1] Amazon Web Services, http://aws.amazon.com/. [2] Google App Engine, http://code.google.com/appengine/. [3] Software as a Service, http://en.wikipedia.org/wiki/software as a Service. [4] G. A. amd F. Casati, H. Kuno, and V. Machiraju, Web Services Concepts, Architectures and Applications Series: Data-Centric Syste and Applications, Addison-Wesley Professional, 2002. [5] T. Erl, Service-Oriented Architecture (SOA): Concepts, Technology, -and Design, Prentice Hall, 2005. [6] T. S. Group, STREAM: The Stanford Stream Data Manager, IEEE Data Engineering Bulletin, 26(1):19-26, Mar. 2003. [7] D. J. Abadi and et al, The Design of the Borealis Stream Processing Engine, Proc. of CIDR, 2005. [8] B. Gedik, H. Andrade, and et. al., SPADE: the System S Declarative Stream Processing Engine, Proc. of SIGMOD, Apr. 2008. [9] S. Berger, R. Caceres, and et. al., TVDc: Managing security in the trusted virtual datacenter, ACM SIGOPS Operating Syste Review, vol. 42, no. 1, pp. 40 47, 2008. [10] T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, Hey, you, get off my cloud! exploring information leakage in third- party compute clouds, in Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS), 2009. 93

[11] J. Garay and L. Huelsbergen, Software integrity protection using timed executable agents, in Proceedings of ACM Symposium on Information, Computer and Communications Security (ASIACCS), Taiwan, Mar. 2006. [12] T. Garfinkel, B. Pfaff, and et. al., Terra: A virtual machine-based platform for trusted computing, in Proceedings of the 19th ACM Symposium on Operating Syste Principles (SOSP), Oct. 2003. [13] R. Sailer, X. Zhang, T. Jaeger, and L. van Doorn, Design and implementation of a tcg-based integrity measurement architecture, in Proceedings of 13th USENIX Security Symposium, San Diego, CA, Aug. 2004. [14] A. Seshadri, M. Luk, E. Shi, A. Perrig, L. van Doorn, and P. Khosla, Pioneer: Verifying code integrity and enforcing untampered code execution on legacy syste, in Proceedings of the 20th ACM Symposium on Operating Syste Principles (SOSP), Oct. 2005. trusted virtual datacenter, ACM SIGOPS Operating Syste Review, vol. 42, no. 1, pp. 40 47, 2008. [17] E. Kaiser, W. Feng, and T. Schluessler, Fides: Remote anomalybased cheat detection using client emulation, in Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS), 2009. [18] E. Shi, A. Perrig, and L. V. Doorn, Bind: A fine-grained attestation service for secure distributed syste, in Proceedings of the IEEE Symposium on Security and Privacy, 2005. [19] F. Monrose, P. Wyckoff, and A. D. Rubin, Distributed execution with remote audit, in Proceedings of ISOC Network and Distributed System Security Symposium (NDSS), Feb. 1999. [20] M. Alam, M. Nauman, X. Zhang, T. Ali, and P. C. Hung, Behavioralattestation for business processes, in IEEE International Conference [15] A. Seshadri, A. Perrig, L. V. Doorn, and P. Khosla, Swatt: Softwarebased attestation for embedded devices, in IEEE Symposium on Security and Privacy, May 2004. [16] S. Berger, R. Caceres, and et. al., TVDc: Managing security in the 94