M.Auxilia ME.,MISTE., Assistant Professor/IT. CONTENTS Introduction Abstract Literature survey Overall drawback of Literature survey Existing system Proposed system Conclusion
INTRODUCTION The growing popularity of cloud computing draws attention to its security challenges. Cloud computings multitenency and virtualization features increase risk of side-channel attacks. Additionally, interference of multitenency computation result in unauthorized information flow. Cont
Demands varying degrees of granularity in access control mechanism.
Such attacks can be overcome by a fine grained authorization mechanism assists in implementing standard security measures.
Provide a sophisticated security architecture captures access management requirements also ensure interoperation across multiple clouds.
Cont
A distributed access control architecture for multitenants & virtualized environment.
Security management perspective the goal is to meet cloud users access control requirements.
Software engineering perspective , the goal is to generate detailed specifications of such requirements.
Cont Researchers previous addressed access control issues for cloud: Daniel Nurmi and his colleagues provided an authorization system to control execution of VMs ensures that only administrators and owners can access them. Stefan & his colleagues promoted RBAC to control access to shared data, VMs & network resources. Jose Alcarez & his colleagues presented centralized authorization system which provides federated path- based access control mechanism.
Cont The Paper presents an architecture that can be implemented using XML-based formalism, & also have addressed problems of side-channel attacks & noninterference & present an access control architecture.
About Distributed access control architecture: Authorization requirements Designing a distributed cloud architecture Distributed cloud security architecture
ABSTRACT A large-scale, dynamic & heterogeneous nature of cloud computing posses numerous security challenges. But clouds main challenge Provide a robust authorization mechanism that incorporates principles from : Security management Software engineering Also propose key requirements & a design model from the architecture.
LITERATURE SURVEY 10 SL. NO. TITLE YEAR AUTHOR MERITS
DEMERITS
1 Security and privacy challenges in cloud computing environment
2010 H.Takabi, J.B.D.Joshi, G.-J.Ahn
This paper provided the security for an application and privacy designed for cloud Even though this paper provide some security for cloud environment , still cloud is infancy of more security for future enhance ment
2 Hey,You,Get off of My Cloud: Exploring information Leakage in Third-Party Compute Cloud
2009
T.Ristenpart et al This paper exploit cross-VM information leakage ,and provided some basic security for cloud for distrustful user and third party attacker
This paper does not provide for the Shared physical infrastructure may and most likely will cause problems
11 SL. NO. TITLE YEAR AUTHOR MERITS
DEMERITS
3
The Encalyptus open-source Cloud- computing
2009
D.Nurmi It provides a open source software framework which is poratable, modular and simple to use than Grid and HPC. Installing the EUCALYPTUS only provide to have a open source that in which we can be used for research and milit purpose but it doesnt provide a security for it .
4
Security for the cloud infrastructur-e : Trusted Virtual Data Center Implementation
2009
S.Berger Controlled access to network storage based on security, integrity checking This paper does not provide a administrative model based trusted virtual domain which help future work 12 SL. NO. TITLE YEAR AUTHOR MERITS
DEMERITS
5
Towards a Multitenancy Authorization System for Cloud Services
2010
J.M.Alcaraz The model proposed in this paper supports multi-tenancy, role- base access control, hierarchical RBAC, path-based object hierarchies and federation. In this authorizat-ion statement-s are private unless trust is stated explicitly
6
OPTIMAL SECURE INTEROPERATION IN A MULTI-DOMAIN ENVIRONMENT EMPLOYING RBAC POLICIES 2005 B.Shafiq This paper provides security for multi- domain and for resources sharing Any inter- domain constraint does not cause any violation of the security and autonomy requirements of the constituent domains EXISTING SYSTEM Side-channel attacks and Interference among different policy domain pose daunting challenges in distributed cloud. PROBLEM DEFINED
PROPOSED SYSTEM The increasing pervasiveness of cloud computing is changing the state of the practice in software testing. In an interview with James Whittaker, an engineering director at Google, editor in chief Forrest Shull explores some of the important trends in cloud computing and their implications. The conversation covers key technology changes, such as more pervasive access to monitoring frameworks, the ability to aggregate and act on feedback directly from massive user communities (the "crowd sourcing" of quality assurance), and the ability to know the exact machine configuration when bugs are discovered. All of these changes are having concrete impacts on which skills are importantand which no longer sofor software testers. An accompanying audio interview provides a complete recording of the conversation and more details on points such as privacy testing. CONCLUSION