Open Access Open Access  Restricted Access Subscription or Fee Access

A Novel Approach for Secure Cloud Environment using PPBA with Surveillance Center

D. Daniel, G. Naveen Samuel

Abstract


Cloud computing is vast and fast growing computing
technology, where everything is served as a service to the users. Cloud provides all the services to the users who has fast internet connection, nrest of the service such as platform infrastructure and hardware are
provided as service by the cloud. The cyber space commonly called as internet has never ending problem named as security. Since cloud alsoworks hand in hand with cyber space, providing security to the cloud
environment play a vital role. In the network providing security to the network service provider and monitoring the networks are considered to the security issues, whereas in cloud security must be provided to the cloud user , their data, and to the cloud service provider. The novel
security approach uses authentication with Digital Signature
Certificate which provides the access to the cloud user and do not allow the unauthenticated users into the cloud. The PPBA approach with surveillance center monitors the entire network for intrusion; this approach is design main for two kinds of attacks on the cloud environment DDOS and DNS Cache Poisoning attack. The security mechanism monitors the packets and payload through which mimicry attacks are carried out to inject the harmful codes such as worms and
viruses into the network. The novel approach provides security to both cloud user and cloud service provider. The surveillance center gives Smart and Secure Cloud environment which is reliable and durable.


Keywords


IDS, DDOS, Mimicry Attack, Bots, SLA, Survillance Manager.

Full Text:

PDF

References


Lskrao Chimakurthi, Madhu Kumar .S. D “Power Efficient Resource

Allocation for Clouds Using Ant Colony Framework”, arXiv: 1102.2608

,v1 [cs.DC] ,13 Feb 2011.

R. Buyya and D. Abramson, “Economic models for resource management

and scheduling in grid computing,” Concurrency and Computation:

Practice and Experience, pp. 1507–1542, Nov. 2002.

Y. Li, “A bio-inspired adaptive job scheduling mechanism on a

computational grid,” vol. 6, Mar. 2006.

Young Choon Lee, Riky Subrata, and Albert Y. Zomaya,“On the

Performance of a Dual-Objective Optimization Model for Workflow

Applications on Grid Platforms,” Proc, IEEE Transactions On Parallel

And Distributed systems, Vol. 20, N0. 9, September 2009.

B. Soumya, M. Indrajit, and P. Mahanti, “Cloud computing initiative

using modified ant colony framework,” in In the World Academy of

Science, Engineering and Technology 56, 2009.

Z.Yu and W.Shi, “An Adaptive Rescheduling Strategy for Grid

Workflow Applications,” Proc. 21st Int’l Parallel and Distributed

Processing Symp. (IPDPS), 2007.

Roland K¨ubert and Stefan Wesner,” Service level agreements for job

control in high-performance computing”, proceedings of the IMCSIT,

vol 5, 2010.

K. Djemame, I. Gourlay, J. Padgett, G. Birkenheuer, M. Hovestadt, O.

Kao, and K. Voß, “Introducing risk management into the grid,” in

e-Science. IEEE Computer Society, 2006.

V. Yarmolenko and R. Sakellariou, “An evaluation of heuristics for sla

based parallel job scheduling,” in Parallel and Distributed Processing

Symposium, 2006. IPDPS 2006. 20th International, April 2006.

G. Gallizo, R. Kuebert, K. Oberle, A. Menychtas, and K. Konstanteli,

“Service level agreements in virtualised service platforms,” in

eChallenges 2009, Istanbul, Turkey, 2009.

C. L. Dumitrescu, I. Raicu, and I. Foster, “Usage sla-based schedulingin

grids: Research articles,” Concurr. Comput. : Pract. Exper., vol. 19,no. 7,

pp. 945–963, 2007.

He, C., Gu, L., Du, B., Li, Z.: A WSLA-based monitoring system for grid

service-GSMon”, IEEE International Conference on Services Computing,

Proceedings,2004.

Foster, I., Zhao, Y., Raicu, I., Lu, S,”Cloud Computing and Grid

Computing 360-Degree Compared”,Grid Computing Environments

Workshop, GCE'08.2008.

Armbrust, M., Fox, A., Gri_th, R., Joseph, A.D., Katz, R.H., Konwinski,

A., Lee,G., Patterson, D.A., Rabkin, A., Stoica, I., Zaharia, M,” Above

the clouds: A berkeley view of cloud computing”,Technical Report

UCB/EECS-2009-28, EECS Department, University of California,

Berkeley ,Feb 2009.

H.A. Sanjay, S. Vadhiyar, Performance modeling of parallel applications

for grid scheduling, Journal of Parallel Distributed Computing 68 (8)

(2008) 1135_1145.

Haijun W, Yu D. Spatial clustering method based on cloud model.

Proceedings of the fourth international conference on fuzzy systems and

knowledge discovery 2007;7:272–6.

Pin Lv, Lin Yuan, Jinfang Zhang. Cloud theory-based simulated

annealing algorithm and application. Eng Appl Artif Intell

;22(4–5):742–9.

Deyi L, Cheung D, Shi XM, Ng V. Uncertainty reasoning based on cloud

models in controllers. Comput Math Appl 1998;35(3):99–123.

J. Chase, D. Irwin, L. Grit, J. Moore, S. Sprenkle, Dynamic virtual

clusters in a grid site manager, in: Twelfth IEEE Symposium on High

Performance Distributed Computing, HPDC, Seattle, Washington, June

K. Lee, N.W. Paton, R. Sakellariou, and A.A.A. Fernandes. Utility Driven

Adaptive Workflow Execution. In Proc. 9th CCGrid. IEEE Press, 2009.

Mike Fisk , George Varghese,”Fast Content – Based Packet Handling for

Intrusion Detection”, UCSD Technical Report CS2001-0670, MAY

G. Vigna and R. Kemmerer, NetSTAT: A Network-based intrusion

detection approach, Computer Security Application Conference, 1998.

C. Taylor and J. Alves-Foss. NATE – Network Analysis of Anomalous

Traffic Events, A Low-Cost approach, New Security Paradigms

Workshop, 2001.

M. Mahoney, P. K. Chan: An Analysis of the 1999 DARPA/Lincoln

Laboratory Evaluation Data for Network anomaly Detection.RAID 2003:

-237.

A. K. Ghosh, A. Schwartzbard, A study in Using Neural Networks for

Anomaly and Misuse Detection, Proc. 8th

USENIX Security Symposium

V. Paxson, Bro: A system for detecting network intruders in real-time,

USENIX Security Symposium, 1998.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.