Adaptable conveyed administration uprightness verification for software as a service clouds
Abstract
SaaS gives an adaptable situation through which application administration providers permitted to have their applications in a conveyed domain, with the goal that clients can get to the facilitated administrations in a less demanding manner. As the earth is partaking in nature there is more degree for SaaS mists defenseless against vindictive assailants. In this paper IntTest another trustworthiness verification plan is presented that can utilize diagram investigation plan to accomplish higher Pinpointing of aggressors. Here additionally consequently rectifying the aftereffects of malignant aggressors with results gave by kindhearted administration supplier's method called auto revision is presented. Additionally we actualized IntTest and tried on a creation cloud foundation, the exploratory results demonstrate this plan accomplished higher precision than past plans. IntTest does not require any protected piece backing and equipment and it additionally underpins for huge scale cloud computing foundation.
Keywords
References
Garay.J and Huelsbergen.L, “Software integrity protection using timed executable agents,†in Proceedings of ACM Symposium on Information, Computer and Communications Security (ASIACCS), Taiwan, Mar. 2006.
Juan Du Daniel J. Dean, Yongmin Tan, Xiaohui Gu, Senior and Ting Yu Scalable Distributed Service Integrity Attestation for Softwareas-a-Service Clouds
Du.J, Wei.W, Gu.X, and Yu.T, “Runtest: Assuring Integrity of Dataflow Processing in Cloud Computing Infrastructures,†Proc.ACM Symp. Information, Computer and Comm. Security (ASIACCS),2010.
Du.J, Shah.N, and Gu.X, “Adaptive Data-Driven Service Integrity Attestation for Multi-Tenant Cloud Systems,†Proc. Int’l Workshop Quality of Service (IWQoS), 2011. Virtual Computing Lab, http://vcl.ncsu.edu/, 2013.
Ho et al.T, “Byzantine Modification Detection in Multicast Networks Using Randomized Network Coding,†Proc. IEEE Int’l Symp. Information Theory (ISIT), 2004.
Hwang.I, “A Survey of Fault Detection, Isolation, and Reconfiguration Methods,†IEEE Trans. Control System Technology, vol. 18,no. 3, pp. 636-653, May 2010.
Lamport.L, Shostak.R, and Pease.M, “The Byzantine Generals Problem,†ACM Trans. Programming Languages and Systems, vol. 4,no. 3, pp. 382-401, 1982
Shi.E, Perrig.A, and Doorn.L.V, “Bind: A fine-grained attestation service for secure distributed systems,†in Proceedings of the IEEE Symposium on Security and Privacy, 2005.
Xu.W, Venkatakrishnan.V. N, Sekar.R, and Ramakrishnan .I. V, “A framework for building privacy-conscious composite web services,†in IEEE International Conference on Web Services, Chicago, IL, Sep. 2006, pp. 655–662.
Zhang.H, Savoie.M,Campbell.S, Figuerola.S, von Bochmann.G, and Arnaud.B.S, “Service-oriented virtual private networks for grid applications,†in IEEE International Conference on Web Services, Salt Lake City, UT, Jul. 2007, pp. 944–951.
Refbacks
- There are currently no refbacks.
Copyright © 2013, All rights reserved.| ijseat.com
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.
Â