Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds



Similar documents
PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE

How To Ensure Correctness Of Data In The Cloud

Secure cloud access system using JAR ABSTRACT:

CloudFTP: A free Storage Cloud

A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract

ASSURING INTEGRITY OF DATAFLOW PROCESSING IN CLOUD COMPUTING INFRASTRUCTURE

A Survey on Service Integrity in Software as a Service

Juan (Jenn) Du. Homepage: www4.ncsu.edu/ jdu/ Co-advisors: Dr. Xiaohui (Helen) Gu and Dr. Douglas Reeves

OPTIMAL MULTI SERVER CONFIGURATION FOR PROFIT MAXIMIZATION IN CLOUD COMPUTING

DYNAMIC GOOGLE REMOTE DATA COLLECTION

Detecting false users in Online Rating system & Securing Reputation

preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.

SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS

Online Student Attendance Management System using Android

Android City Tour Guide System

WEB COMPAS MINIMUM HOSTING REQUIREMENTS

Efficient load balancing system in SIP Servers ABSTRACT:

ISSN: (Online) Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies

SECURITY FOR ENCRYPTED CLOUD DATA BY USING TOP-KEY TREE TECHNOLOGIES

Enterprise Edition. Hardware Requirements

Cloud Cost Management for Customer Sensitive Data

System Requirements - Table of Contents

AuditMatic Enterprise Edition Installation Specifications

Privacy preserving technique to secure cloud

Data Collection Agent for NAS EMC Isilon Edition

Hardware and Software Requirements for Sage 50 v15 to v22

Professional and Enterprise Edition. Hardware Requirements

Abila Grant Management. System Requirements

IBM Rational AppScan Source Edition

Trust based Peer-to-Peer System for Secure Data Transmission ABSTRACT:

Data Collection Agent for Active Directory

Version: 0.4 Issue date: March Sage 200 v2010 System Requirements

RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

How To Test For Performance And Scalability On A Server With A Multi-Core Computer (For A Large Server)

System Requirements - CommNet Server

TENDER NOTICE No. UGVCL/SP/III/608/GPRS Modem Page 1 of 6. TECHNICAL SPECIFICATION OF GPRS based MODEM PART 4

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Spyware Doctor Enterprise Technical Data Sheet

Computer Science. About PaaS Security. Donghoon Kim Henry E. Schaffer Mladen A. Vouk

Microsoft Office Outlook 2013: Part 1

Point & PointCentral 9.1

Grant Management. System Requirements

User Guide. Web Chat for IIS. Release 5.0

Hardware & Software Requirements for BID2WIN Estimating & Bidding, the BUILD2WIN Product Suite, and BID2WIN Management Reporting

Bandaru, Mounika; Gangishetti, Anil; and Putha, Sudharshan Reddy, "Attendance Tracker" (2015). All Capstone Projects. Paper 160.

Hardware and Software Requirements for Installing California.pro

A Novel Approach for Evaluating and Detecting Low Rate SIP Flooding Attack

IBM Cognos TM1 on Cloud Solution scalability with rapid time to value

Learn to Personalized Image Search from the Photo Sharing Websites

Secure Way of Storing Data in Cloud Using Third Party Auditor

CREDIT CARD FRAUD DETECTION SYSTEM USING GENETIC ALGORITHM

SYSTEM SETUP FOR SPE PLATFORMS

Network device management solution

Complete Fleet Management Software Systems for the Equipment Rental, Construction, Crane & Rigging Industry

Minimum System Requirements

NETWRIX CHANGE NOTIFIER

LabStats 5 System Requirements

Peer-to-peer Cooperative Backup System

Kentico CMS 6.0 Performance Test Report. Kentico CMS 6.0. Performance Test Report February 2012 ANOTHER SUBTITLE

System Requirements for Microsoft Dynamics SL 2015

Performance Test Report KENTICO CMS 5.5. Prepared by Kentico Software in July 2010

Please contact Cyber and Technology Training at for registration and pricing information.

White Paper. Recording Server Virtualization

User Guide. Web Chat Gateway. Release 5.0

Sage Grant Management System Requirements

System Requirements Table of contents

Scalability and Performance Report - Analyzer 2007

PACK: PREDICTION-BASED CLOUD BANDWIDTH AND COST REDUCTION SYSTEM

Product Brief SysTrack VMP

User Guide. Web Chat Gateway. Release 4.0

METAmessage Server and Domain Requirements

Prerequisites Guide. Version 4.0, Rev. 1

Automated deployment of virtualization-based research models of distributed computer systems

Philips IntelliSpace Critical Care and Anesthesia on VMware vsphere 5.1

Chapter 1: Introduction

Topic 1 Lesson 1: Importance of network security

IBM Rational Asset Manager

HALF THE PRICE. HALF THE POWER. HALF THE SPACE.

Microsoft Dynamics CRM 2011 Guide to features and requirements

Emergency Alert System using Android Text Message Service ABSTRACT:

Migrating SaaS Applications to Windows Azure

70-243: Administering and Deploying System Center 2012 Configuration Manager : Monitoring and Operating a Private Cloud with System Center 2012

e-config Data Migration Guidelines Version 1.1 Author: e-config Team Owner: e-config Team

System Requirements Across v6 (Revision: April 29, 2015)

Installation Quick Start SUSE Linux Enterprise Server 11 SP1

PPC s SMART Practice Aids Prepare for Installing database upgrade to SQL Express 2008 R2

System Requirements for Microsoft Dynamics GP 2013

Kaspersky Endpoint Security 10 for Windows. Deployment guide

Transcription:

Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds ABSTRACT: Software-as-a-service (SaaS) cloud systems enable application service providers to deliver their applications via massive cloud computing infrastructures. However, due to their sharing nature, SaaS clouds are vulnerable to malicious attacks. In this paper, we present IntTest, a scalable and effective service integrity attestation framework for SaaS clouds. IntTest provides a novel integrated attestation graph analysis scheme that can provide stronger attacker pinpointing power than previous schemes. Moreover, IntTest can automatically enhance result quality by replacing bad results produced by malicious attackers with good results produced by benign service providers. We have implemented a prototype of the IntTest system and tested it on a production cloud computing infrastructure using IBM System S stream processing applications. Our experimental results show that IntTest can achieve higher attacker pinpointing accuracy than existing approaches. IntTest does not require any special hardware or secure kernel support and imposes little performance impact to the application, which makes it practical for largescale cloud systems

EXISTING SYSTEM: Which enable application service providers (ASPs) to deliver their applications via the massive cloud computing infrastructure. In particular, our work focuses on data stream processing services that are considered to be one class of killer applications for clouds with many real-world applications in security surveillance, scientific computing, and business intelligence. However, cloud computing infrastructures are often shared by ASPs from different security domains, which make them vulnerable to malicious attacks. For example, attackers can pretend to be legitimate service providers to provide fake service components, and the service components provided by benign service providers may include security holes that can be exploited by attackers. PROBLEM DEFINITION: Those techniques often require special trusted hardware or secure kernel support. Which makes them difficult to be deployed on large-scale cloud computing infrastructures PROPOSED SYSTEM: In this paper, we present IntTest, a new integrated service integrity attestation framework for multitenant cloud systems. IntTest provides a practical service integrity attestation scheme that does not assume trusted entities on third-party service provisioning sites or require application modifications. IntTest builds upon our previous work RunTest and AdapTest

but can provide stronger malicious attacker pinpointing power than RunTest and AdapTest. Specifically, both RunText and AdapTest as well as traditional majority voting schemes need to assume that benign service providers take majority in every service function. However, in large-scale multitenant cloud systems, multiple malicious attackers may launch colluding attacks on certain targeted service functions to invalidate the assumption. To address the challenge, IntTest takes a holistic approach by systematically examining both consistency and inconsistency relationships among different service providers within the entire cloud system. IntTest examines both per-function consistency graphs and the global ADVANTAGES OF PROPOSED SYSTEM: A scalable and efficient distributed service integrity attestation framework for large scale cloud computing infrastructures. A novel integrated service integrity attestation scheme that can achieve higher pinpointing accuracy than previous techniques. A result auto correction technique that can automatically correct the corrupted results produced by malicious attackers. Both analytical study and experimental evaluation to quantify the accuracy and overhead of the integrated service integrity attestation scheme.

SYSTEM ARCHITECTURE: HARDWARE REQUIREMENTS: System : Pentium IV 2.4 GHz. Hard Disk : 40 GB. Floppy Drive : 1.44 Mb. Monitor : 15 VGA Colour. Mouse : Logitech. Ram : 512 Mb.

SOFTWARE REQUIREMENTS: Operating system : Windows XP/7. Coding Language : ASP.net, C#.net Tool : Visual Studio 2010 Database : SQL SERVER 2008