A Novel Approach for Secure Cloud Environment using PPBA with Surveillance Center
Abstract
Cloud computing is vast and fast growing computing
technology, where everything is served as a service to the users. Cloud provides all the services to the users who has fast internet connection, nrest of the service such as platform infrastructure and hardware are
provided as service by the cloud. The cyber space commonly called as internet has never ending problem named as security. Since cloud alsoworks hand in hand with cyber space, providing security to the cloud
environment play a vital role. In the network providing security to the network service provider and monitoring the networks are considered to the security issues, whereas in cloud security must be provided to the cloud user , their data, and to the cloud service provider. The novel
security approach uses authentication with Digital Signature
Certificate which provides the access to the cloud user and do not allow the unauthenticated users into the cloud. The PPBA approach with surveillance center monitors the entire network for intrusion; this approach is design main for two kinds of attacks on the cloud environment DDOS and DNS Cache Poisoning attack. The security mechanism monitors the packets and payload through which mimicry attacks are carried out to inject the harmful codes such as worms and
viruses into the network. The novel approach provides security to both cloud user and cloud service provider. The surveillance center gives Smart and Secure Cloud environment which is reliable and durable.
Keywords
Full Text:
PDFReferences
Lskrao Chimakurthi, Madhu Kumar .S. D “Power Efficient Resource
Allocation for Clouds Using Ant Colony Framework”, arXiv: 1102.2608
,v1 [cs.DC] ,13 Feb 2011.
R. Buyya and D. Abramson, “Economic models for resource management
and scheduling in grid computing,” Concurrency and Computation:
Practice and Experience, pp. 1507–1542, Nov. 2002.
Y. Li, “A bio-inspired adaptive job scheduling mechanism on a
computational grid,” vol. 6, Mar. 2006.
Young Choon Lee, Riky Subrata, and Albert Y. Zomaya,“On the
Performance of a Dual-Objective Optimization Model for Workflow
Applications on Grid Platforms,” Proc, IEEE Transactions On Parallel
And Distributed systems, Vol. 20, N0. 9, September 2009.
B. Soumya, M. Indrajit, and P. Mahanti, “Cloud computing initiative
using modified ant colony framework,” in In the World Academy of
Science, Engineering and Technology 56, 2009.
Z.Yu and W.Shi, “An Adaptive Rescheduling Strategy for Grid
Workflow Applications,” Proc. 21st Int’l Parallel and Distributed
Processing Symp. (IPDPS), 2007.
Roland K¨ubert and Stefan Wesner,” Service level agreements for job
control in high-performance computing”, proceedings of the IMCSIT,
vol 5, 2010.
K. Djemame, I. Gourlay, J. Padgett, G. Birkenheuer, M. Hovestadt, O.
Kao, and K. Voß, “Introducing risk management into the grid,” in
e-Science. IEEE Computer Society, 2006.
V. Yarmolenko and R. Sakellariou, “An evaluation of heuristics for sla
based parallel job scheduling,” in Parallel and Distributed Processing
Symposium, 2006. IPDPS 2006. 20th International, April 2006.
G. Gallizo, R. Kuebert, K. Oberle, A. Menychtas, and K. Konstanteli,
“Service level agreements in virtualised service platforms,” in
eChallenges 2009, Istanbul, Turkey, 2009.
C. L. Dumitrescu, I. Raicu, and I. Foster, “Usage sla-based schedulingin
grids: Research articles,” Concurr. Comput. : Pract. Exper., vol. 19,no. 7,
pp. 945–963, 2007.
He, C., Gu, L., Du, B., Li, Z.: A WSLA-based monitoring system for grid
service-GSMon”, IEEE International Conference on Services Computing,
Proceedings,2004.
Foster, I., Zhao, Y., Raicu, I., Lu, S,”Cloud Computing and Grid
Computing 360-Degree Compared”,Grid Computing Environments
Workshop, GCE'08.2008.
Armbrust, M., Fox, A., Gri_th, R., Joseph, A.D., Katz, R.H., Konwinski,
A., Lee,G., Patterson, D.A., Rabkin, A., Stoica, I., Zaharia, M,” Above
the clouds: A berkeley view of cloud computing”,Technical Report
UCB/EECS-2009-28, EECS Department, University of California,
Berkeley ,Feb 2009.
H.A. Sanjay, S. Vadhiyar, Performance modeling of parallel applications
for grid scheduling, Journal of Parallel Distributed Computing 68 (8)
(2008) 1135_1145.
Haijun W, Yu D. Spatial clustering method based on cloud model.
Proceedings of the fourth international conference on fuzzy systems and
knowledge discovery 2007;7:272–6.
Pin Lv, Lin Yuan, Jinfang Zhang. Cloud theory-based simulated
annealing algorithm and application. Eng Appl Artif Intell
;22(4–5):742–9.
Deyi L, Cheung D, Shi XM, Ng V. Uncertainty reasoning based on cloud
models in controllers. Comput Math Appl 1998;35(3):99–123.
J. Chase, D. Irwin, L. Grit, J. Moore, S. Sprenkle, Dynamic virtual
clusters in a grid site manager, in: Twelfth IEEE Symposium on High
Performance Distributed Computing, HPDC, Seattle, Washington, June
K. Lee, N.W. Paton, R. Sakellariou, and A.A.A. Fernandes. Utility Driven
Adaptive Workflow Execution. In Proc. 9th CCGrid. IEEE Press, 2009.
Mike Fisk , George Varghese,”Fast Content – Based Packet Handling for
Intrusion Detection”, UCSD Technical Report CS2001-0670, MAY
G. Vigna and R. Kemmerer, NetSTAT: A Network-based intrusion
detection approach, Computer Security Application Conference, 1998.
C. Taylor and J. Alves-Foss. NATE – Network Analysis of Anomalous
Traffic Events, A Low-Cost approach, New Security Paradigms
Workshop, 2001.
M. Mahoney, P. K. Chan: An Analysis of the 1999 DARPA/Lincoln
Laboratory Evaluation Data for Network anomaly Detection.RAID 2003:
-237.
A. K. Ghosh, A. Schwartzbard, A study in Using Neural Networks for
Anomaly and Misuse Detection, Proc. 8th
USENIX Security Symposium
V. Paxson, Bro: A system for detecting network intruders in real-time,
USENIX Security Symposium, 1998.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.