Secure Cloud Service Management and its Resource Utilization of Server Using Volunteer Computing



Similar documents
International Journal of Computer Engineering and Technology (IJCET), ISSN (Print), INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING &

Kerberos. Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, BC. From Italy (?).

A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS

Development of Intranet App with JAVA on Oracle Cloud

CLOUD COMPUTING SECURITY CONCERNS

A Secure Authenticate Framework for Cloud Computing Environment

International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May ISSN

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments

Cloud Courses Description

Cloud Courses Description

CUMULUX WHICH CLOUD PLATFORM IS RIGHT FOR YOU? COMPARING CLOUD PLATFORMS. Review Business and Technology Series

Cloud SQL Security. Swati Srivastava 1 and Meenu 2. Engineering College., Gorakhpur, U.P. Gorakhpur, U.P. Abstract

The Private Cloud Your Controlled Access Infrastructure

MIGRATION FROM SINGLE TO MULTI-CLOUDS TO SHRIVEL SECURITY RISKS IN CLOUD COMPUTING. K.Sireesha 1 and S. Suresh 2

Chapter 11 Cloud Application Development

A SURVEY PAPER ON ENSURING SECURITY IN CLOUD COMPUTING

Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication

Performance Gathering and Implementing Portability on Cloud Storage Data

Keywords Cloud Computing, CRC, RC4, RSA, Windows Microsoft Azure

An Intelligent Approach for Data Fortification in Cloud Computing

RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES

INCREASING THE CLOUD PERFORMANCE WITH LOCAL AUTHENTICATION

International Journal of Advance Research in Computer Science and Management Studies

Dynamic Query Updation for User Authentication in cloud Environment

A Review on Cloud Computing Vulnerabilities

Cloud Computing Service Models, Types of Clouds and their Architectures, Challenges.

Improving Performance and Reliability Using New Load Balancing Strategy with Large Public Cloud

4.2: Kerberos Kerberos V4 Kerberos V5. Chapter 5: Security Concepts for Networks. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme

Essential Characteristics of Cloud Computing: On-Demand Self-Service Rapid Elasticity Location Independence Resource Pooling Measured Service

The Magical Cloud. Lennart Franked. Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall.

Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment

CS 494/594 Computer and Network Security

Security Issues In Cloud Computing and Countermeasures

Proof of Retrivability: A Third Party Auditor Using Cloud Computing

Research Paper Available online at: A COMPARATIVE STUDY OF CLOUD COMPUTING SERVICE PROVIDERS

2 Prof, Dept of CSE, Institute of Aeronautical Engineering, Hyderabad, Andhrapradesh, India,

NIST PKI 06: Integrating PKI and Kerberos (updated April 2007) Jeffrey Altman

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

TOPIC HIERARCHY. Distributed Environment. Security. Kerberos

Cloud Computing. Course: Designing and Implementing Service Oriented Business Processes

DESIGN OF A PLATFORM OF VIRTUAL SERVICE CONTAINERS FOR SERVICE ORIENTED CLOUD COMPUTING. Carlos de Alfonso Andrés García Vicente Hernández

A Survey on Cloud Computing

Cloud Computing Submitted By : Fahim Ilyas ( ) Submitted To : Martin Johnson Submitted On: 31 st May, 2009

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption

MULTI-DIMENSIONAL PASSWORD GENERATION TECHNIQUE FOR ACCESSING CLOUD SERVICES

A Survey on Cloud Security Issues and Techniques

Cloud Computing Services and its Application

A Model for Data Protection Based on the Concept of Secure Cloud Computing

Security Considerations for Public Mobile Cloud Computing

Selective dependable storage services for providing security in cloud computing

CLOUD COMPUTING. DAV University, Jalandhar, Punjab, India. DAV University, Jalandhar, Punjab, India


A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services

Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms

Resource Selection in Collaborative Cloud Computing Based on User Preference

Cloud Computing: Advantages and Security Challenges

Scientific Journal Impact Factor (SJIF): 1.711

Webpage: Volume 3, Issue XI, Nov ISSN

ABSTRACT. KEYWORDS: Cloud Computing, Load Balancing, Scheduling Algorithms, FCFS, Group-Based Scheduling Algorithm

A Quality Model for E-Learning as a Service in Cloud Computing Framework

FEDERATED CLOUD: A DEVELOPMENT IN CLOUD COMPUTING AND A SOLUTION TO EDUCATIONAL NEEDS

CLOUD COMPUTING INTRODUCTION HISTORY

A Game Theory Modal Based On Cloud Computing For Public Cloud

Application Based Access Control on Cloud Networks for Data Security

N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD. R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 ABSTRACT

Cloud definitions you've been pretending to understand. Jack Daniel, Reluctant CISSP, MVP Community Development Manager, Astaro

A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing

Providing Flexible Security as a Service Model for Cloud Infrastructure

SPACK FIREWALL RESTRICTION WITH SECURITY IN CLOUD OVER THE VIRTUAL ENVIRONMENT

Load Balancing in Cloud Computing using Observer's Algorithm with Dynamic Weight Table

CLOUD BASED STORAGE SERVICES FOR SECURITY FOLLOWED BY THE DATA AUTHENTICATION

Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India talk2tamanna@gmail.com

CSE331: Introduction to Networks and Security. Lecture 29 Fall 2006

The Hybrid Cloud: Bringing Cloud-Based IT Services to State Government

CHALLENGES AND ISSUES OF DEPLOYMENT ON CLOUD

A Naïve Approach for Managing Virtualized Resources and Optimistic cost

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

Cloud Computing Trends

CLOUD COMPUTING & WINDOWS AZURE

Optimized Multi-tenancy Secure mechanism in SPI Cloud Architecture

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD

Iaas for Private and Public Cloud using Openstack

Kerberos. Login via Password. Keys in Kerberos

Cloud Computing. Cloud computing:

How To Understand Cloud Computing

Introduction to Computer Security

LOAD BALANCING AS A STRATEGY LEARNING TASK

Digital Forensics. Lab 10: Cloud Computing & the Future of Digital Forensics

INTENSIFICATION OF EDUCATIONAL CLOUD COMPUTING AND CRISIS OF DATA SECURITY IN PUBLIC CLOUDS

What is Cloud Computing? Tackling the Challenges of Big Data. Tackling The Challenges of Big Data. Matei Zaharia. Matei Zaharia. Big Data Collection

Mobile Cloud Computing Security Considerations

Microsoft SharePoint Architectural Models

A STUDY ON CLOUD STORAGE

Security Issues in Cloud Computing

Verifying Correctness of Trusted data in Clouds

IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD ENVIRONMENT

CERTIFICATE PROGRAMME ON CLOUD SPECIALISTS DEVELOPMENT

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

Transcription:

Secure Cloud Service Management and its Resource Utilization of Server Using Volunteer Computing Nirupadi Tidigol, Thrilochana Kumara Y.P, T.P.Lokesh, nirupadi.tidigol@gmail.com thrilochankumaryp@gmail.com tplokeshtp@gmail.com EIT Ummathur, India, VVET Mysore India Abstract: Cloud computing Delivers the computing resources to the user as a service over an internet. It uses wireless services with a user's data, software and computation. So spreaded over almost all IT sector and become a rich area of research. Cloud Computing composes of virtualization, on demand deployment. Here user has to pay for the application on which they want. So extensive and effective cloud security is provided by using kerberos to ensure the correctness of data, as the number of users increases cloud server may busy and failure to provide the services to the users, volunteer computing can be used to maintain the load balance of a cloud server Keywords: Cloud computing, Dispatcher Algorithm, Kerberos, service models, secure cloud service, and Volunteer computing. I. INTRODUCTION Cloud computing uses the computing resources that are delivered as a service over an internet. Cloud computing entrusts wireless services with the user s data, software and computation. It spreaded over almost all IT field and it become a rich area of research. Cloud is used as a metaphor for the internet based on how the internet is represented in the computer network diagrams and is an abstraction for the complex infrastructure Cloud Computing composed of virtualization, on demand deployment. Cloud computing changes how we contrive, develop, deploy, scale, update, maintain and pay for application and the infrastructure on which the user used.because of these benefits, Cloud Computing requires an effective and extensive security mechanism to ensure the correctness of user s data in the cloud. Fig 2 simple architecture of Cloud computing Fig 1 schematic diagram of Cloud Computing The systems architecture of the software systems involved in the delivery of cloud computing, it involves multiple cloud components communicating with each other over a loose coupling mechanism such as a messaging queue.

The Inter cloud is an interconnected global "cloud of clouds" and an extension of the Internet. Advantages Companies need to pay only for the storage actually they used, as it is also possible for companies by utilizing actual virtual storage features like thin clients. Companies do not need to install physical storage devices in their own datacenter or offices. Storage maintenance tasks, such as backup, data replication, and purchasing additional storage devices are offloaded to the responsibility of a service provider. Cloud storage can be used for copying virtual machine images from the cloud to on-premise locations or to import a virtual machine image from an on-premise to the cloud image library. II SERVICE MODELS Cloud computing models can be mapped with layers of business value pyramid as shown in below: 3 Application Cloud Cloud computing providers offer their services according to the fallowing three fundamental models: 1. Infrastructure as a service (IaaS) 2. Platform as a service (PaaS) 3. Software as a service (SaaS) Where IaaS is the most basic and each higher model abstracts from the details of the lower models. Fig 4. Layer architecture of models Infrastructure as a service (IaaS) It is the basic cloud service model, cloud providers offer computers, as physical or more often as virtual machines, and other resources. Examples: Amazon Cloud Formation Engine. (Amazon EC2) and Google Compute Machine User Platform as a service (PaaS) 1 2 Platform Cloud Components Services Infrastructure Cloud Storage Computer Network Here, cloud providers deliver a computing platform typically including operating system, programming language execution environment, database, and web server. Examples: Amazon Elastic Beanstalk, Google App Engine, and OrangeScape. Fig 3 Cloud computing models can be mapped with layers of business value pyramid

Software as a service (SaaS) In this model cloud providers install and operate the application software in the cloud and cloud user access the software from cloud clients. The cloud users do not manage the cloud infrastructure and platform on which the application is running. III. DEPLOYMENT MODELS CAI (confidentiality, availability and integrity). With the competence provided by the cloud systems, as the number of users enhances, the probability of cybercrime increases. Cloud computing is becoming a tempting target for cybercrime. To overcome this problem we introduce Kerberos authentication mechanism to accessing the services securely. Public cloud In this model applications, storage and other resources are made available to the general public by a service provider. These services are free or offered on a pay. Community cloud Community cloud shares infrastructure between several organizations from a specific community with common concerns (security, compliance, jurisdiction, etc.), whether managed internally or by a third-party and hosted internally or externally. Hybrid cloud It is a composition of two or more clouds (private, community or public) that remain unique entities but they are bound together, offering the benefits of multiple deployment models. Private cloud Private cloud is operated solely for a single organization, whether managed internally or by a thirdparty and hosted internally or externally. IV. SECURE CLOUD SERVICES Fig.5. service access from the service provider through Kerberos Authentication Kerberos is a computer network authentication protocol which works on the basis of "tickets" to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner. Its designers aimed primarily at a client server model, and it provides mutual authentication for both user and the server verify each other's identity. Kerberos protocol messages are protected against eavesdropping and replay attacks. While accessing the cloud Services from a service provider, privacy and security will play a major roll. Security model must be developed which ensures

Algorithm for Secure cloud service access from service provider: Step 1: start Step 2: select the input data (Services) to be accessed. Step 3: Client request to the AS in a KDC (AS_REQ). Step 4: AS will take the information from the database in a KDC and response to the client request (AS_REP). Step 5: Based on reply from the AS client will request TGS for TGT. Step 6: TGS will check client authentication from the Database in a KDC. Step 7: If authentication is valid TGS generate SK, SK will be encrypted by using client_sk to create a TGT. Step 8: client decrypts the message to get the SK. Step 9: decrypted SK is used to create authenticator Containing user name, IP and Time stamp. Step 10: Authenticator request AP to get the result for input Services (AP_REQ). Step 11: based on the request secure service is accessed from the server (AP_REP) [Service provider]. Step 12: End. be sent to server and in turn the server sends it to volunteers. Depending upon the time taken for the execution of the task by the volunteers, the server allots the task to perform. Here the cloud server uses Dispatching Algorithm to perform the task. [Dispatching algorithm is to find the least load server for dispatching] Cloud clients Clients request cloud service to the server by providing Authentication after establishing connection with the server. Cloud volunteer Volunteer will perform the task assigned by the cloud server based on the client request. Volunteer will share the cloud applications from cloud server. V. CLOUD SERVICE THROUGH VOLUNTEER COMPUTING As the number of clients increases, cloud server will get busy for providing services to the clients, to reduce this load we introduce volunteer computing. This application contains mainly to perform the operation of Watermarking effectively and with faster performance. The function to be performed will be sent to server and intern the server sends it to volunteers. Volunteer computing consist of three modules: Cloud server, cloud clients and cloud volunteer. Cloud Server When client made a request regarding service from the cloud server, the function to be performed will Fig 6. Cloud service through volunteer computing

DISPATCHER ALGORITHM Step 1: Configuration of TCP Step 2: Checks the TCP connection table entry Step 3: Check if the incoming packets is in the range of Stateful service. Step 4: Check whether the packet is singleton or client activated method. Step 5: Directs the connection construction request to the least load server. Step 6: If the incoming method is indeed a stateful request, a session table is created.. Step 7: Checks for expiration of the session. Step 8: Algorithm does TCP header rewriting to forward Packets, to and from the intended server of that Connection. Step 9: Stop. CONCLUSION Using Kerberos cloud computing delivers the resources to the user securely. So it provides extensive and effective security to the cloud server as well as cloud clients. And also volunteer computing provides the solutions to reduce the server load balance. Hence speedy and secure services can be access by a client form the service provider. ACKNOWLEDGMENT REFERENCES [1] Udayan Banerji, The evolution of cloud computing,8 th March2011,http://cloud computing.sys -con.com/ node/1714332. [2] Current Trends in Cloud Computing. A Survey of Cloud Computing system By Harjith Singh. IJECSE,ISSN 2277-956 V1N3 1214-1219 [3] Klems,M,Lenk,A,Nimis,J,Sandholm T andtai S, What s inside the Cloud? An Architectural Map of the Cloud Landscape,IEEE Xplore,pp 23-31,viewed 21(2009) [4] Amazon. Amazon elastic compute cloud (amazon EC2). (2009).http://aws.amazon.com/ec2/ [5] Cryptography and Network Security By Atul Kahate,2 nd edition, Published By The McGraw.Hill Companies. [6] Ellis Horowitz, Sartaz Sahani Fundamental of Computer Algorithms [7] Y.Lan, T.Yu (1995) A Dynamic Central Scheduler Load-Balancing Mechanism, Proc. 14th IEEE Conf. on Computers and Communication, Tokyo, Japan, pp.734-740. [8] Guy Bernard,& Michel Simatic A Decentralized and Efficient Algorithm for Load Sharing in Networks of Workstations Acknowledge and express our sincere thanks to parents and family for their encouragement and support throughout this work. We also extend thanks to our friends and colleagues, who have encouraged us.

AUTHORS PROFILE Nirupadi Tidigol received B.E in CSE,SJMIT,Chithradurga and 1995. M.Tech in CNE, NIE, Mysore,2011. He is working as an Assistant Professor and Head, Department of Computer Science and Engineering in EIT,Ummathur, Chamarajanagara, India, 4Yrs. Experience as a Head,Department of CS&E VVET,Mysore, 1Yr. of Experience as a Head, Department of computer Science and engineering VVCE, 9 Yrs. Experience as Head/Lecturer Dept. of CS&E,SLN. presented, and attended the number of Conferences and workshops. His area of interests are Computer Networks and its Security, Data Mining, Cloud Computing,wireless communication and Image Processing Thrilochana Kumara Y.P received B.E in CSE, JVIT, Bangalore and 2005. M.Tech in IT, KSOU,Mysore, 2010. He has 3Yrs. Experience as a Lecturer, Department of CS&E VVET,Mysore, 2Yr. of Experience as a Administrator VET,Bannur.He Presented, and attended the number of Conferences and workshops. His area of interests are Computer Networks, Data Mining and its Security, Cloud Computing, wireless communication, Software Engineering, Software Testing & Image Processing. T.P.Lokesh received B.E in Electronics and Communication, M.Tech in Computer Network and Engineering and he is working as a Assistant Professor, Department of Electronics and Communication in VVET, Mysore. He has 8 years of teaching experience. He presented, attended the number of Conferences and workshops organized at various organizations.