Sie sind auf Seite 1von 19

A Distributed Access

Control Architecture for

cloud Computing

Under the guidance of :

M.Auxilia ME.,MISTE., Assistant Professor/IT.

Submitted by :

V.Jevapratha M.Malathi F.Razul Fathima

CONTENTS

  • Introduction

  • Abstract

  • Literature survey

CONTENTS  Introduction  Abstract  Literature survey  Overall drawback of Literature survey  Existing
  • Overall drawback of Literature survey

  • Existing system

  • Proposed system

  • Conclusion

INTRODUCTION

  • The growing popularity of cloud computing draws attention to its security challenges.

  • Cloud computing’s multitenency and virtualization features increase risk of side-channel attacks.

  • Additionally, interference of multitenency

computation result in unauthorized information flow.

INTRODUCTION  The growing popularity of cloud computing draws attention to its security challenges.  Cloud

Cont

  • Demands varying degrees of granularity in access control mechanism.

  • Such attacks can be overcome by a fine grained authorization mechanism assists in implementing standard security measures.

  • Provide a sophisticated security architecture captures access management requirements also ensure interoperation across multiple clouds.

Cont…

  • A distributed access control architecture for

multitenant’s & virtualized environment.

  • Security management perspective the goal is to meet cloud user’s access control requirements.

  • Software engineering perspective , the goal is to generate detailed specifications of such requirements.

Cont…

  • Researchers previous addressed access control issues for cloud:

    • Daniel Nurmi and his colleagues provided an

authorization system to control execution of VM’s

ensures that only administrators and owners can

access them.

  • Stefan & his colleagues promoted RBAC to control access to shared data, VMs & network resources.

  • Jose Alcarez & his colleagues presented centralized authorization system which provides federated path- based access control mechanism.

Cont…

  • The Paper presents an architecture that can be implemented using XML-based formalism, & also have addressed problem’s of side-channel attacks & noninterference & present an access control architecture.

  • About Distributed access control architecture:

    • Authorization requirements

    • Designing a distributed cloud architecture

    • Distributed cloud security architecture

ABSTRACT

  • A large-scale, dynamic & heterogeneous nature of

cloud computing posses numerous security

challenges.

  • But clouds main challenge Provide a robust authorization mechanism that incorporates principles from :

    • Security management

    • Software engineering

      • Also propose key requirements & a design model from the architecture.

LITERATURE SURVEY

LITERATURE SURVEY

LITERATURE SURVEY
LITERATURE SURVEY

SL.

NO.

TITLE

YEAR

AUTHOR

MERITS

1

Security and privacy

2010

H.Takabi,

This paper provided

 

J.B.D.Joshi,

the security for an

challenges in cloud computing environment

G.-J.Ahn

application and privacy designed for cloud

Hey,You,Get off of My

This paper exploit

2

Cloud: Exploring information Leakage

2009

T.Ristenpart et al

cross-VM information leakage

in Third-Party

Compute Cloud

,and provided some

basic security for cloud for distrustful user and third party attacker

DEMERITS

Even though this paper provide some security for cloud environment ,

still cloud is

infancy of more security for

future enhance ment

This paper does not provide for

the Shared

physical infrastructure may and most likely will cause problems

10

SL.

NO.

TITLE

YEAR

AUTHOR

3

The Encalyptus open-source Cloud-

2009

D.Nurmi

It provides a open source software framework which

Installing the EUCALYPTUS only provide to

computing

is poratable,

have a open

modular and simple to use than Grid and HPC.

source that in which we can be used for research and milit purpose

 

but it doesn’t

provide a security for it .

 

Controlled access to

This paper does

4

Security for the cloud

2009

S.Berger

network storage

not provide a

infrastructur-e :

based on security,

administrative

11

Trusted Virtual Data Center Implementation

integrity checking

model based trusted virtual domain which

 

help future work

SL.

NO.

TITLE

YEAR

AUTHOR

MERITS

DEMERITS

5

Towards a Multitenancy

2010

J.M.Alcaraz

The model proposed in this paper supports

In this authorizat-ion statement-s

Authorization System

multi-tenancy, role-

are private

for Cloud Services

base access control,

unless trust is

hierarchical RBAC, path-based object hierarchies and federation.

stated explicitly

6

OPTIMAL SECURE INTEROPERATION IN A MULTI-DOMAIN

2005

B.Shafiq

This paper provides security for multi- domain and for resources sharing

Any inter- domain constraint does not cause any violation of the

ENVIRONMENT

security and

EMPLOYING RBAC POLICIES

autonomy requirements of the constituent domains

12

EXISTING SYSTEM

  • Side-channel attacks and Interference among different policy domain pose daunting challenges in distributed cloud.

PROBLEM DEFINED

PROPOSED SYSTEM

  • The increasing pervasiveness of cloud computing is changing the state of the practice in software testing. In an interview with James Whittaker, an engineering director at Google, editor in chief Forrest Shull explores some of the important trends in cloud computing and their implications. The conversation covers key technology changes, such as more pervasive access to monitoring frameworks, the ability to aggregate and act on feedback directly from massive user communities (the "crowd sourcing" of quality assurance), and the ability to know the exact machine configuration when bugs are discovered.

  • All of these changes are having concrete impacts on which skills are importantand which no longer sofor software testers. An accompanying audio interview provides a complete recording of the

conversation and more details on points such as privacy testing.

CONCLUSION

REFERENCE

ANY QUERIES

ANY QUERIES