Open Access Open Access  Restricted Access Subscription or Fee Access

A Novel Approach for Secure Processing of Service Request with Security Manager in Cloud

J. Vikram, S. Agilesh, V. Guhan, B. Manikandan

Abstract


Cloud computing is globally connected computing
resource in same point, which supports all types of resource for executing an application or software. It provides all its resource as services like software as service and also hardware as service in infrastructure service. The cloud is accessed by millions of user at a
single point of time, since cloud is centralized service provider and all the request that is sent by the user has to be processed and it should respond to the user , where the security of the cloud also
depends on processing the requests. Hence this paper comes with a novel approach to provide a secure processing of the user service request, with security manager which monitors the overall cloud environment for any intrusion by the outsider and also by the cloud users. This approach provides secure environment for both cloud user
and also cloud service provider. It gives better response time and throughput for the cloud user and also security for the cloud resource and confidential data in cloud.


Keywords


Access Control List, Response Time, Secure Processing, SLA

Full Text:

PDF

References


Lskrao Chimakurthi, Madhu Kumar .S. D ―Power Efficient Resource

Allocation for Clouds Using Ant Colony Framework‖, arXiv: 1102.2608

,v1 [cs.DC] ,13 Feb 2011.

R. Buyya and D. Abramson, ―Economic models for resource

management and scheduling in grid computing,‖ Concurrency and

Computation: Practice and Experience, pp. 1507–1542, Nov. 2002.

Y. Li, ―A bio-inspired adaptive job scheduling mechanism on a

computational grid,‖ vol. 6, Mar. 2006.

Young Choon Lee, Riky Subrata, and Albert Y. Zomaya,―On the

Performance of a Dual-Objective Optimization Model for Workflow

Applications on Grid Platforms,‖ Proc, IEEE Transactions On Parallel

And Distributed systems, Vol. 20, N0. 9, September 2009.

B. Soumya, M. Indrajit, and P. Mahanti, ―Cloud computing initiative

using modified ant colony framework,‖ in In the World Academy of

Science, Engineering and Technology 56, 2009.

Z.Yu and W.Shi, ―An Adaptive Rescheduling Strategy for Grid

Workflow Applications,‖ Proc. 21st Int’l Parallel and Distributed

Processing Symp. (IPDPS), 2007.

Roland K¨ubert and Stefan Wesner,‖ Service level agreements for job

control in high-performance computing‖, proceedings of the IMCSIT,

vol 5, 2010.

K. Djemame, I. Gourlay, J. Padgett, G. Birkenheuer, M. Hovestadt, O.

Kao, and K. Voß, ―Introducing risk management into the grid,‖ in e-

Science. IEEE Computer Society, 2006.

V. Yarmolenko and R. Sakellariou, ―An evaluation of heuristics for sla

based parallel job scheduling,‖ in Parallel and Distributed Processing

Symposium, 2006. IPDPS 2006. 20th International, April 2006.

G. Gallizo, R. Kuebert, K. Oberle, A. Menychtas, and K. Konstanteli,

―Service level agreements in virtualised service platforms,‖ in

eChallenges 2009, Istanbul, Turkey, 2009.

C. L. Dumitrescu, I. Raicu, and I. Foster, ―Usage sla-based scheduling in

grids: Research articles,‖ Concurr. Comput. : Pract. Exper., vol. 19,no.

, pp. 945–963, 2007.

He, C., Gu, L., Du, B., Li, Z.: A WSLA-based monitoring system for

grid service-GSMon‖, IEEE International Conference on Services

Computing, Proceedings,2004.

Foster, I., Zhao, Y., Raicu, I., Lu, S,‖Cloud Computing and Grid

Computing 360-Degree Compared‖,Grid Computing Environments

Workshop, GCE'08.2008.

Armbrust, M., Fox, A., Gri_th, R., Joseph, A.D., Katz, R.H., Konwinski,

A., Lee,G., Patterson, D.A., Rabkin, A., Stoica, I., Zaharia, M,‖ Above the clouds: A berkeley view of cloud computing‖,Technical Report

UCB/EECS-2009-28, EECS Department, University of California,

Berkeley ,Feb 2009.

H.A. Sanjay, S. Vadhiyar, Performance modeling of parallel applications

for grid scheduling, Journal of Parallel Distributed Computing 68 (8)

(2008) 1135_1145.

Haijun W, Yu D. Spatial clustering method based on cloud model.

Proceedings of the fourth international conference on fuzzy systems and

knowledge discovery 2007;7:272–6.

Pin Lv, Lin Yuan, Jinfang Zhang. Cloud theory-based simulated

annealing algorithm and application. Eng Appl Artif Intell 2009;22(4–

:742–9.

Deyi L, Cheung D, Shi XM, Ng V. Uncertainty reasoning based on

cloud models in controllers. Comput Math Appl 1998;35(3):99–123.

J. Chase, D. Irwin, L. Grit, J. Moore, S. Sprenkle, Dynamic virtual

clusters in a grid site manager, in: Twelfth IEEE Symposium on High

Performance Distributed Computing, HPDC, Seattle, Washington, June

K. Lee, N.W. Paton, R. Sakellariou, and A.A.A. Fernandes. Utility

Driven Adaptive Workflow Execution. In Proc. 9th CCGrid. IEEE Press,

T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh.Terra: A

Virtual Machine-Based Platform for Trusted Computing.In Proc. of

SOSP’03, 2003.

V. Ciriani, S. De Capitani di Vimercati, S. Foresti, and P. Samarati. kanonymity.

Secure Data Management in Decentralized Systems, 2007.

Daniel J. Bernstein, Carl Ellison, Tanja Lange, Kristin Lauter, Victor

Miller, Michael Naehrig, and EranTromer. Secure cloud computing for

medical data, 2009. Presentation at Crypto 2009 Rump Session.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.