Integrated Attestation Scheme for Scalable Distributed Services in Software-as-a-Service Clouds

Pampana Satya Venkata Gowtham Raju, Md Imran

Abstract


Ensuring Security, Data Integrity and Seamless Availability for information very still, in movement, and being used, for Outsourcing delicate and vital information in the hands of a cloud supplier is essential assignment. Among the 3 sorts of administrations IaaS, PaaS and SaaS gave by the cloud, Software as a Service (SaaS) is a product dispersion model in which applications are facilitated by a seller or administration supplier and made accessible to clients over a system, ordinarily the Interne. In any case, because of their sharing nature, SaaS mists are helpless against vindictive assaults SaaS cloud frameworks empower application administration suppliers to convey their applications by means of huge distributed computing bases.. In this paper, we introduce IntTest, an adaptable and powerful administration uprightness authentication structure for SaaS mists. IntTest gives a novel incorporated validation chart examination plot that can give more grounded aggressor pinpointing power than past plans. In addition, IntTest can consequently upgrade result quality by supplanting terrible results delivered by vindictive assailants with great results created by benevolent administration suppliers. We have executed a model of the IntTest framework and tried it on a creation distributed computing base utilizing IBM System S stream handling applications. Our trial results demonstrate that IntTest can accomplish higher assailant pinpointing precision than existing methodologies. We show IntTest, another coordinated administration trustworthiness confirmation structure for multitenant cloud frameworks. IntTest gives a reasonable administration trustworthiness authentication plot that does not expect trusted substances on outsider administration provisioning destinations or require application modificationsIntTest does not require any uncommon equipment or secure part bolster and forces little execution effect to the application, which makes it down to earth for vast scale cloud frameworks.


References


Amazon Web Services, http://aws.amazon.com/, 2013.

Google App Engine, http://code.google.com/appengine/, 2013.

Software as a Service, http://en.wikipedia.org/wiki/Software as a Service, 2013.

G. Alonso, F. Casati, H. Kuno, and V. Machiraju, Web Services Concepts, Architectures and Applications (Data-Centric Systems and

Applications). Addison-Wesley Professional, 2002.

T. Erl, Service-Oriented Architecture (SOA): Concepts, Technology, and Design. Prentice Hall, 2005.

T.S. Group, “STREAM: The Stanford Stream Data Manager,” IEEE Data Eng. Bull., vol. 26, no. 1, pp. 19-26, Mar. 2003.

D.J. Abadi et al., “The Design of the Borealis Stream Processing

Engine,” Proc. Second Biennial Conf. Innovative Data Systems Research (CIDR ’05), 2005.

B. Gedik et al., “SPADE: The System S Declarative Stream Processing Engine,” Proc. ACM SIGMOD Int’l Conf. Management

Of Data (SIGMOD ’08), Apr. 2008.

S. Berger et al., “TVDc: Managing Security in the Trusted Virtual

Datacenter,” ACM SIGOPS Operating Systems Rev., vol. 42, no. 1, pp. 40-47, 2008.

T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, “Hey, You Get Off My Cloud! Exploring Information Leakage in Third-Party Compute Clouds,” Proc. 16th ACM Conf. Computer and Communications Security (CCS), 2009.

W. Xu, V.N. Venkatakrishnan, R. Sekar, and I.V. Ramakrishnan,“A Framework for Building Privacy-Conscious Composite Web Services,” Proc. IEEE Int’l Conf. Web Services, pp. 655-662, Sept. 2006.

P.C.K. Hung, E. Ferrari, and B. Carminati, “Towards Standardized Web Services Privacy Technologies,” IEEE Int’l Conf. Web Services, pp. 174-183, June 2004.

L. Alchaal, V. Roca, and M. Habert, “Managing and Securing Web Services with VPNs,” Proc. IEEE Int’l Conf. Web Services, pp. 236- 243, June 2004.

H. Zhang, M. Savoie, S. Campbell, S. Figuerola, G. von Bochmann, and B.S. Arnaud, “Service-Oriented Virtual Private Networks for Grid Applications,” Proc. IEEE Int’l Conf. Web Services, pp. 944-951, July 2007.

M. Burnside and A.D. Keromytis, “F3ildCrypt: End-to-End Protection of Sensitive Information in Web Services,” Proc. 12th Int’l Conf. Information Security (ISC), pp. 491-506, 2009.

I. Roy et al., “Airavat: Security and Privacy for MapReduce,” Proc. Seventh USENIX Conf. Networked Systems Design and Implementation (NSDI), Apr. 2010.


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.