Optimized Multi-tenancy Secure mechanism in SPI Cloud Architecture



Similar documents
Security Framework for Cloud Computing Environment: A Review Ayesha Malik, Muhammad Mohsin Nazir

Study of Security Issues in Cloud Computing

Filling the consistency and reliability gap in elastic cloud an IaaS approach

Security Issues in Cloud Computing

Cloud Computing Security Issues And Methods to Overcome

International Journal of Engineering Research & Management Technology

Security Issues in Cloud Computing

INCREASING THE CLOUD PERFORMANCE WITH LOCAL AUTHENTICATION

A Study of Infrastructure Clouds

SECURE CLOUD COMPUTING

Cloud Infrastructure Security

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption

Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao

Cloud Database Storage Model by Using Key-as-a-Service (KaaS)

Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication

Implementing XML-based Role and Schema Migration Scheme for Clouds

ISSN: (Online) Volume 2, Issue 5, May 2014 International Journal of Advance Research in Computer Science and Management Studies

A Quality Model for E-Learning as a Service in Cloud Computing Framework

A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments

Keyword: Cloud computing, service model, deployment model, network layer security.

An Intelligent Approach for Data Fortification in Cloud Computing

Security Issues In Cloud Computing and Countermeasures

[Sudhagar*, 5(5): May, 2016] ISSN: Impact Factor: 3.785

A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing

Cloud Computing. Karan Saxena * & Kritika Agarwal**

Cloud Computing, and REST-based Architectures Reid Holmes

A Review of Cloud Environment and Recognition of Highly Secure Public Data Verification Architecture using Secure Public Verifier Auditor

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master

in the figure below. Index Terms Cloud Computing, SaaS, Load Balancing.

Cloud Computing Services and its Application

EXIN Cloud Computing Foundation

Verifying Correctness of Trusted data in Clouds

A Proposed Secure Framework for Safe Data Transmission in Private Cloud

Cloud Computing. Course: Designing and Implementing Service Oriented Business Processes

THE BLUENOSE SECURITY FRAMEWORK

Third Party Cloud Services Its Adoption in the New Age

Cloud Security Through Threat Modeling. Robert M. Zigweid Director of Services for IOActive

Cloud Courses Description

FACING SECURITY CHALLENGES

What is Cloud Computing? Tackling the Challenges of Big Data. Tackling The Challenges of Big Data. Matei Zaharia. Matei Zaharia. Big Data Collection

REVIEW OF CLOUD TESTING, TYPES, CHALLENGES AND FUTURE SCOPE

Public Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.

Fig. 1 A model of cloud computing

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 1, Jan-Feb 2015

The Private Cloud Your Controlled Access Infrastructure

Cloud Computing. Cloud computing:

Data Storage Security in Cloud Computing

CLOUD COMPUTING IN HIGHER EDUCATION

Application Based Access Control on Cloud Networks for Data Security

Cloud Storage: Where Does It Fit Into Tomorrow s IT?

Dynamic Query Updation for User Authentication in cloud Environment

CLOUD COMPUTING SOLUTION - BENEFITS AND TESTING CHALLENGES

Cloud Computing Security

Secure Cloud Based Document Management System

Requirements and Challenges for Securing Cloud Applications and Services

Commercial Software Licensing

Services of Cloud Computing Kanusu Srinivasa Rao 2 Assistant Professor Department of MCA Yogi Vemana University Kadapa, AP India

Implications for Cloud Computing & Data Privacy

(C) Global Journal of Engineering Science and Research Management

Fundamental Concepts and Models

Building Blocks of the Private Cloud

Secure Cloud Service Management and its Resource Utilization of Server Using Volunteer Computing

A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services

Performance Gathering and Implementing Portability on Cloud Storage Data

Software as a Service (SaaS) Testing Challenges- An Indepth

International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May ISSN

See Appendix A for the complete definition which includes the five essential characteristics, three service models, and four deployment models.

A Secure Authenticate Framework for Cloud Computing Environment

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

A Survey on Cloud Security Issues and Techniques

Cloud Computing in a Regulated Environment

Cloud Infrastructure Pattern

Security Issues in Cloud Computing

Certified Cloud Computing Professional Sample Material

Intrusion Detection from Simple to Cloud

Securing Your Data In The Cloud: an insiders perspective

Subash Krishnaswamy Applications Software Technology Corporation

A Cloud Service Measure Index Framework to Evaluate Efficient Candidate with Ranked Technology

Cloud Computing in Medical Diagnosis for improving Health Care Environment

Topics. Images courtesy of Majd F. Sakr or from Wikipedia unless otherwise noted.

How To Understand Cloud Computing

Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS

Keywords Cloud Environment, Cloud Testing, Software Testing

Cloud Service Rollout. Chapter 9

SPACK FIREWALL RESTRICTION WITH SECURITY IN CLOUD OVER THE VIRTUAL ENVIRONMENT

Ranked Keyword Search Using RSE over Outsourced Cloud Data

Cloud Security and Algorithms: A Review Divya saraswat 1, Dr. Pooja Tripathi 2 1

SECURING HEALTH INFORMATION IN THE CLOUD. Feisal Nanji, Executive Director, Techumen

Privacy Preserving Public Auditing for Data in Cloud Storage

Networks and Services

Improving data integrity on cloud storage services

White Paper on CLOUD COMPUTING

Cloud Security. Nantawan Wongkachonkitti Electronic Government Agency, Thailand Cloud Security Alliance, Thailand Chapter October 2014

ADVANCEMENT TOWARDS PRIVACY PROCEEDINGS IN CLOUD PLATFORM

Testing as a Service on Cloud: A Review

STORAGE SECURITY TUTORIAL With a focus on Cloud Storage. Gordon Arnold, IBM

Cloud Security Introduction and Overview

APPLICABILITY OF CLOUD COMPUTING IN ACADEMIA

Cloud deployment model and cost analysis in Multicloud

Transcription:

Volume 1, No. 12, February 2013 ISSN 2278-1080 The International Journal of Computer Science & Applications (TIJCSA) RESEARCH PAPER Available Online at http://www.journalofcomputerscience.com/ Optimized Multi-tenancy Secure mechanism in SPI Cloud Architecture S.Bharanisethupandian 1, 1 Assistant Professor, Department of MCA, SOURASHTRA COLLEGE, Madurai, Tamilnadu, India 1 bharanisethupandian@yahoo.com Dr.M.Sumathi 2 2 Assistant Professor, Department of Computer Science, Sri Meenakshi Government College for Women, Madurai, Tamilnadu, India Abstract The era of digital media has made one of its most valuable computer concepts called "Cloud". This concept of computing makes the term Digital services work efficiently for its various computational tasks which it addresses as a whole. The computational process of cloud makes different services work on different platforms and finally address on unique solutions. The services of cloud were done with SPI architecture. In this paper we have proposed a mechanism that provides a secure firewall for every thin client services. The thin client services provided along with cloud deployable services were done along with API. We believe that such approach will provide secure and effective cloud services in SPI architecture through the thin client services. Keywords: Cloud Security, SPI architecture, Cloud model and services, Cloud API 1. Introduction The understanding of cloud and its services refers to the technology expertise that performs its various tasks over a network platform. A Cloud service [2][3] addresses both hardware and software which combines and provide valid information or required services in distributed approach. The cloud network can be broadly framed as private and public cloud. Both these approaches provide cloud computations depending on the type of services. This service can be either accessed locally or remotely. Hence cloud has its variety for addressing the same. Since cloud services can be provided either via hardware or software services, security level deployment can be on either of these two services. Nevertheless both these services address secure standards for effective cloud services. Fig 1 shows the cloud model where various users access the cloud for various services. 2013, http://www.journalofcomputerscience.com - TIJCSA All Rights Reserved 11

Fig 1: Cloud deployable model A user can access cloud service for variety of services like storage, application and process etc. The cloud does the function for the user using cloud network services. The only way where a user can be authenticated is the cloud services entry phase. Only here a user should notify him for accessing cloud services. What all users need from the cloud, is the services where he can access the cloud services via thin client services. Thin client service is an individual user personal system that helps to get access cloud services. The interface between thin client and cloud repository where done with the assistance of interface/link. The interface has to provide user authentication to the cloud service. Further to the link established with the cloud, the thin client interface services are identified using API services. The technology evidence of cloud works on its routine and does prescribed function based on its services and deploy ability. This will overcome the traditional approaches used in many business organizations. Basically cloud infrastructure has two layer i.e. one layer posses the functionality of hardware and other is the software services. This model is quite different from traditional computing setup. The architecture services of cloud were deployed with SOA for its unique application services. The technology portion of cloud is addressed along with its information and was identified differently based on layer classification in cloud service model. Fig 2: Cloud Model Layer approach The functionality of cloud [1][2] were stimulated from various services. Every service is different in cloud. This addresses the concept of Multi-tenancy. One services can be used by more than a person in cloud architecture [3][5]. Then the services of cloud were shared consistently for all users. This concept adds efficiency to cloud since the services were shared, instead of deploying it to individual user. 2013, http://www.journalofcomputerscience.com - TIJCSA All Rights Reserved 12

Multi-tenancy makes the services virtually available to the entire user and hence adds value to the cloud services. The Figure 3 shows the cloud shares three different services address different services for different users. Fig 3: Cloud shares three different services 2. Existing System The work of Miranda and Mowbary focuses on "A client based privacy manager for cloud computing" addresses the purpose of secure thin client architecture in effective cloud service. Further the work of Mather, T., Kumaraswamy, S., & Latif, S. (2009) influences the Cloud Security and Privacy dealing with third party security in cloud computing. Jinpeng Wei, Xiaolan Zhang, Glenn Ammons, VasanthBala and PengNing discusses on Managing security of virtual machine images in a cloud environment, November 2009 addressed on Virtualization in cloud computing. Transparent Cloud Protection System (TCPS) [10] identifies the protection system for early monitoring and reliability in cloud computing. All these work referred identify the security issues in cloud and also the other issues arise with the same. Our assumption is that security issues and its measures have to be deployed in the third party metrics not on the cloud architecture. This is due to the fact that cloud services were not transparent to client and clients were not given education for cloud services. 3. Proposed System Apart from the existing cloud model the proposed system address a deployed third party model enhanced with security measure for multi-tenancy problem. This model invokes self management strategy for addressing the current cloud security issues. Since the services of cloud were unnoticed and kept as secret for client, makes them hesitate to use cloud service. 3.1 Mapping cloud data 2013, http://www.journalofcomputerscience.com - TIJCSA All Rights Reserved 13

The concept of mapping cloud was used now a day to address the secure flaws in cloud. This principle mechanism was deployed in the fourth model of cloud, apart from the existing SPI cloud architecture. The fourth model belongs to third party services. Via these services the secure mechanisms were deployed in to SPI architecture. SPI architecture provides the stack of secure service in cloud were traditional security mechanism are used to address the said problem. Fig 4: SPI and Secure cloud model Fig 4 address the third party cloud service for securing API. This type of model is available in all user location to ensure secure standards. The secure API is available in all user personalized location and was integrated via virtualization for sharing and deploying cloud services. Every user initiated services to cloud will be transferred via third party secured API using traditionally proven secure mechanism. This secure mechanism will invoke secure standard for every sent and received information services from Secure API to SPI cloud architecture to worth. The Secure services in cloud were invoked using secure API. This secure API was initiated via XML services. The code mentioned below invokes secure API for SaaS [3] <version xmlns="http://docs.openstack.org/common/api/v1.0" xmlns:atom="h ttp://www.w3.org/2005/atom" id="v2.0" status="current" updated="2012-01- 21T11:33:21-06:00"> <media-types> <mediatype base="application/xml" type="application/vnd.openstack.identity+xml ;version=2.0"/> <mediatype base="application/json" type="application/vnd.openstack.identity+js on;version=2.0"/> </media-types> <atom:link rel="self" href="https://identity.api.cloudservice.com/v2.0"/ > <atom:link rel="describedby" type="application/pdf" href="http://docs. cloudservice.com/auth/api/v2.0/auth-client-devguide-latest.pdf"/> <atom:link rel="describedby" type="application/vnd.sun.wadl+xml" href="h ttp://docs. cloudservice.com/auth/api/v2.0/auth.wadl"/> </version> 2013, http://www.journalofcomputerscience.com - TIJCSA All Rights Reserved 14

This secure API works for SaaS services. Likewise different API was invoked on other services of PaaS and IaaS. Fig 5 shows data flow sequence carrying client data to SPI architecture via secure API Fig 5: Data flow from Client to SPI with encryption standards Here the encryption standards were provided by third party vendor like VeriSign to ensure secure transmission between clients to SPI [3]. Fig 6: Data flow from SPI to Client with decryption standards This mechanism will work for various users based on their services initiated to cloud services. Implementing security in API [6] [7] is done using traditional security algorithm like elliptical curve for providing effective and efficient services in cloud. 5. Conclusion and Future work In this work we have identified few API for all the three models of cloud. This API addresses the security issues in cloud and also for the effective cloud performance. The purpose of secure API is to invoke mapping services to the deployed Secure API and then to the client. This functionality will be reversed in due course. The future work will address a unique Secure API which will identify the potential instinct of all three models and its features. We believe that such approach will invoke efficient secure mechanism for sure. Reference [1] Mather, T., Kumaraswamy, S., & Latif, S. (2009). Cloud Security and Privacy. New York: O Reilly [2] Dinoor S (2010) Got Privilege? Ten Steps to Securing a Cloud-Based Enterprise. http://cloudcomputing.sys-con.com/node/1571649 [3] Security and Economic Benefits of standardization for security as a service. September 2011 proceedings. [4] Cloud security Alliance, Defined Categories of service 2011. [5] A guide to security metrics. SANS Institute, June 2006. http://www.sans.org [6] Amazon Elastic Compute Cloud Developer Guide, http://docs.amazonwebservices.com/awsec2/2009-03-01/developerguide/ [7] Amazon web services blog: Introducing amazon virtual private cloud (vpc), Amazon, August 2009. [8] CVSS A Complete Guide to the Common Vulnerability Scoring System, Version 2.0, 2007 [9] WeichaoWang,Zhiwei Li, Rodney Owens and Bharat Bhargava, Secure and Efficient Access to Outsourced Data, November 2009, Proceedings of the ACM workshop on Cloud computing security, pages 55-65. [10] Flavio Lombardi and Roberto Di Pietro, Transparent Security for Cloud, March 2010, Proceedings of the 2010 ACM Symposium on Applied Computing, pages 414-415 2013, http://www.journalofcomputerscience.com - TIJCSA All Rights Reserved 15