Vous êtes sur la page 1sur 19

A Distributed Access

Control Architecture for


cloud Computing
Submitted by :

V.Jevapratha

M.Malathi

F.Razul Fathima
Under the guidance of :

M.Auxilia ME.,MISTE.,
Assistant Professor/IT.
CONTENTS
Introduction
Abstract
Literature survey
Overall drawback of Literature survey
Existing system
Proposed system
Conclusion

INTRODUCTION
The growing popularity of cloud computing draws
attention to its security challenges.
Cloud computings multitenency and virtualization
features increase risk of side-channel attacks.
Additionally, interference of multitenency
computation result in unauthorized information flow.
Cont

Demands varying degrees of granularity in access
control mechanism.

Such attacks can be overcome by a fine grained
authorization mechanism assists in implementing
standard security measures.

Provide a sophisticated security architecture captures
access management requirements also ensure
interoperation across multiple clouds.

Cont

A distributed access control architecture for
multitenants & virtualized environment.

Security management perspective the goal is to meet
cloud users access control requirements.

Software engineering perspective , the goal is to
generate detailed specifications of such requirements.


Cont
Researchers previous addressed access control issues
for cloud:
Daniel Nurmi and his colleagues provided an
authorization system to control execution of VMs
ensures that only administrators and owners can
access them.
Stefan & his colleagues promoted RBAC to control
access to shared data, VMs & network resources.
Jose Alcarez & his colleagues presented centralized
authorization system which provides federated path-
based access control mechanism.




Cont
The Paper presents an architecture that can be
implemented using XML-based formalism, & also have
addressed problems of side-channel attacks &
noninterference & present an access control
architecture.

About Distributed access control architecture:
Authorization requirements
Designing a distributed cloud architecture
Distributed cloud security architecture






ABSTRACT
A large-scale, dynamic & heterogeneous nature of
cloud computing posses numerous security
challenges.
But clouds main challenge Provide a robust
authorization mechanism that incorporates principles
from :
Security management
Software engineering
Also propose key requirements & a design model from
the architecture.



LITERATURE SURVEY
10
SL.
NO.
TITLE YEAR AUTHOR MERITS

DEMERITS

1
Security and privacy
challenges in cloud
computing
environment

2010 H.Takabi,
J.B.D.Joshi,
G.-J.Ahn

This paper provided
the security for an
application and
privacy designed for
cloud
Even though this
paper provide
some security
for cloud
environment ,
still cloud is
infancy of more
security for
future enhance
ment

2
Hey,You,Get off of My
Cloud: Exploring
information Leakage
in Third-Party
Compute Cloud


2009

T.Ristenpart et
al
This paper exploit
cross-VM
information leakage
,and provided some
basic security for
cloud for distrustful
user and third party
attacker


This paper does
not provide for
the Shared
physical
infrastructure
may and most
likely will cause
problems


11
SL.
NO.
TITLE YEAR AUTHOR MERITS

DEMERITS


3

The Encalyptus
open-source Cloud-
computing

2009

D.Nurmi
It provides a open
source software
framework which
is poratable,
modular and
simple to use than
Grid and HPC.
Installing the
EUCALYPTUS
only provide to
have a open
source that in
which we can
be used for
research and
milit purpose
but it doesnt
provide a
security for it
.

4

Security for the cloud
infrastructur-e :
Trusted Virtual Data
Center
Implementation

2009

S.Berger
Controlled access to
network storage
based on security,
integrity checking
This paper does
not provide a
administrative
model based
trusted virtual
domain which
help future
work
12
SL.
NO.
TITLE YEAR AUTHOR MERITS

DEMERITS


5

Towards a
Multitenancy
Authorization System
for Cloud Services

2010

J.M.Alcaraz
The model proposed
in this paper
supports
multi-tenancy, role-
base access control,
hierarchical
RBAC, path-based
object hierarchies
and federation.
In this
authorizat-ion
statement-s
are private
unless trust is
stated explicitly

6

OPTIMAL SECURE
INTEROPERATION
IN A
MULTI-DOMAIN
ENVIRONMENT
EMPLOYING RBAC
POLICIES
2005 B.Shafiq This paper provides
security for multi-
domain and for
resources sharing
Any inter-
domain
constraint does
not cause any
violation of the
security and
autonomy
requirements of
the constituent
domains
EXISTING SYSTEM
Side-channel attacks and Interference among different
policy domain pose daunting challenges in distributed
cloud.
PROBLEM DEFINED

PROPOSED SYSTEM
The increasing pervasiveness of cloud computing is changing the
state of the practice in software testing. In an interview with
James Whittaker, an engineering director at Google, editor in
chief Forrest Shull explores some of the important trends in
cloud computing and their implications. The conversation covers
key technology changes, such as more pervasive access to
monitoring frameworks, the ability to aggregate and act on
feedback directly from massive user communities (the "crowd
sourcing" of quality assurance), and the ability to know the exact
machine configuration when bugs are discovered.
All of these changes are having concrete impacts on which skills are
importantand which no longer sofor software testers. An
accompanying audio interview provides a complete recording of the
conversation and more details on points such as privacy testing.
CONCLUSION

REFERENCE
www.google.com
www.wikipedia.com
www.dl.acm.org
www.computer.org
www.mtechprojects.com
knowfuture.wordpress.com
www.ipa.go.jp
www.usenix.org

Vous aimerez peut-être aussi