+ All Categories
Home > Education > Research in Cloud

Research in Cloud

Date post: 11-Feb-2017
Category:
Upload: sandeepkmadaan
View: 317 times
Download: 0 times
Share this document with a friend
23
ATTESTATION in Presented by SANDEEP KAUR Under Guidance of Mr. PAWAN LUTHRA
Transcript

ATTESTATION in

Presented by SANDEEP KAURUnder Guidance of Mr. PAWAN LUTHRA

“THE COMPUTER INDUSTRY IS THE ONLY INDUSTRY THAT IS MORE FASHION-DRIVEN THAN WOMEN'S

FASHION”

What Cloud is...What Cloud is not....

ORGANIZATIONS USE CLOUD TO...

Increase Flexibility and Scalability 58%Reduce Operating Expenses 45%

Increase Efficiency 42%Reduce Capital Costs 40%

Provide Redundancy 35%Simplify Development 24%

Integrate Mutiple Vendor Application 23%Stay aligned with market acceptance 22%

Minimize need to develop in-house 20%Speed up Geographic 18%

Some Some ConcernsConcerns

SecuritySecurity

PrivacyPrivacy

SchedulingScheduling

Load Balancing

ReliabilityReliability

Scalability

Residency

Security, Privacy, TRUST

AttestationAttestation

Means by which a Trusted Computer assures a remote computer of its Trustworthy Status.

PROBLEM FORMULATION

Many Organizations are not on Cloud because they don't trust it. Developing trust on Cloud platforms through attestations

LITERATURE SURVEY

1) Vijay Varadharajan, Udaya Tupakula - “Counteracting security attacks in Vijay Varadharajan, Udaya Tupakula - “Counteracting security attacks in virtual machines in the cloud using property based attestation” Journal of virtual machines in the cloud using property based attestation” Journal of Network and Computer Applications 40 (2014) 31–45 Network and Computer Applications 40 (2014) 31–45

2) Udhayakumar Shanmugam, Latha Tamilselvan, Uma Nandhini, and 2) Udhayakumar Shanmugam, Latha Tamilselvan, Uma Nandhini, and Dhinakaran-”Attestation for Trusted Computing to Assure Security in Cloud Dhinakaran-”Attestation for Trusted Computing to Assure Security in Cloud Deployment Services” International Journal of Information and Electronics Deployment Services” International Journal of Information and Electronics Engineering, Vol. 2, No. 4, July 2012Engineering, Vol. 2, No. 4, July 2012

3) Abhishek Vaish, Abhishek Kushwaha, Rahul Das, Chandan Sharma “Data 3) Abhishek Vaish, Abhishek Kushwaha, Rahul Das, Chandan Sharma “Data Location Verification in Cloud Computing” International Journal of Location Verification in Cloud Computing” International Journal of Computer Applications (0975 – 8887) Volume 68– No.12, April 2013Computer Applications (0975 – 8887) Volume 68– No.12, April 2013

4)4) Ahmad-Reza Sadeghi, Christian Stüble “Property-based attestation Ahmad-Reza Sadeghi, Christian Stüble “Property-based attestation for computing platforms: caring about properties, not mechanisms” for computing platforms: caring about properties, not mechanisms” NSPW '04 Proceedings of the 2004 workshop on New security NSPW '04 Proceedings of the 2004 workshop on New security paradigmsparadigms

LITERATURE SURVEY

1) Vijay Varadharajan, Udaya Tupakula - “Counteracting security attacks in Vijay Varadharajan, Udaya Tupakula - “Counteracting security attacks in virtual machines in the cloud using property based attestation” Journal of virtual machines in the cloud using property based attestation” Journal of Network and Computer Applications 40 (2014) 31–45 Network and Computer Applications 40 (2014) 31–45

2) Udhayakumar Shanmugam, Latha Tamilselvan, Uma Nandhini, and 2) Udhayakumar Shanmugam, Latha Tamilselvan, Uma Nandhini, and Dhinakaran-”Attestation for Trusted Computing to Assure Security in Cloud Dhinakaran-”Attestation for Trusted Computing to Assure Security in Cloud Deployment Services” International Journal of Information and Electronics Deployment Services” International Journal of Information and Electronics Engineering, Vol. 2, No. 4, July 2012Engineering, Vol. 2, No. 4, July 2012

3) Abhishek Vaish, Abhishek Kushwaha, Rahul Das, Chandan Sharma “Data 3) Abhishek Vaish, Abhishek Kushwaha, Rahul Das, Chandan Sharma “Data Location Verification in Cloud Computing” International Journal of Location Verification in Cloud Computing” International Journal of Computer Applications (0975 – 8887) Volume 68– No.12, April 2013Computer Applications (0975 – 8887) Volume 68– No.12, April 2013

4)4) Ahmad-Reza Sadeghi, Christian Stüble “Property-based attestation Ahmad-Reza Sadeghi, Christian Stüble “Property-based attestation for computing platforms: caring about properties, not mechanisms” for computing platforms: caring about properties, not mechanisms” NSPW '04 Proceedings of the 2004 workshop on New security NSPW '04 Proceedings of the 2004 workshop on New security paradigmsparadigms

ABOUT PAPER

This Paper proposes a novel trust enhanced security model for Cloud Services that helps to detect and prevent security attacksin cloud infrastructure using trusted attestation techniques

RESEARCH GAPThe model s not implemented.

Trust Enhanced Cloud Architecture

RESOURCESRESOURCES - 2 Machines deployed with hypervisor and one of them has TPM installed- 1 or 2 Routers.

TOOLSTOOLS1. Some hypervior

: KVM2.Cloud tool :

Eucalyptus3.OS : Linux and

may be Windows

IMPLEMENTATIONIMPLEMENTATION

IMPLEMENTATION DESIGN

TVM-AM

R2

R1External Attacking Source

ARCustomer Machine

Hardware

OS Layer

XEN VMM

AVM

TPM

TPr_CA

DOM0CLC, NC

FUTURE SCOPEFUTURE SCOPE

REFERNCES

1) http://www.sciencedirect.com/2)https://www.researchgate.net/3)http://computer.howstuffworks.com/cloud-co

mputing/cloud-computing.htm4)http://en.wikipedia.org/wiki/Cloud_computing5)https://www.youtube.com/6)http://cloud-computing.tmcnet.com/

AND MANY MORE .....


Recommended