BALANCING PERFORMANCE, ACCURACY, AND
PRECISION FOR SECURE CLOUD TRANSACTIONS
CLICK HERE TO VIEW THE OUTPUT
CLICK HERE TO VIEW THE OUTPUT
ABSTRACT:
In
distributed transactional database systems deployed over cloud servers,
entities cooperate to form proofs of authorizations that are justified by
collections of certified credentials. These proofs and credentials may be
evaluated and collected over extended time periods under the risk of having the
underlying authorization policies or the user credentials being in inconsistent
states. It therefore becomes possible for policy-based authorization systems to
make unsafe decisions that might threaten sensitive resources. In this paper,
we highlight the criticality of the problem. We then define the notion of
trusted transactions when dealing with proofs of authorization. Accordingly, we
propose several increasingly stringent levels of policy consistency
constraints, and present different enforcement approaches to guarantee the
trustworthiness of transactions executing On cloud servers. We propose a
Two-Phase Validation Commit protocol as a solution, which is a modified version
of the basic Two-Phase Validation Commit protocols. We finally analyze the
different approaches presented using both analytical evaluation of the
overheads and simulations to guide the decision makers to which approach to
use.
EXISTING SYSTEM:
Interesting
consistency problems can arise as transactional database systems are deployed
in cloud environments and use policy-based authorization systems to protect
sensitive resources. In addition to handling consistency issues among database
replicas, we must also handle two types of security inconsistency conditions.
First, the system may suffer from policy inconsistencies during policy updates
due to the relaxed consistency model underlying most cloud services. For
example, it is possible for several versions of the policy to be observed at
multiple sites within a single transaction, leading to inconsistent (and likely
unsafe) access decisions during the transaction. Second, it is possible for
external factors to cause user credential inconsistencies over the lifetime of
a transaction. For instance, a user’s login credentials could be invalidatedor
revoked after collection by the authorization server, but before the completion
of the transaction.
DISADVANTAGES OF
EXISTING SYSTEM:
v Insecure
Data’s.
v Time
takes too long for authentication.
v Requiring
expensive infrastructure.
PROPOSED
SYSTEM:
We
propose several increasingly stringent levels of policy consistency
constraints, and present different enforcement approaches to guarantee the
trustworthiness of transactions executing on cloud servers. We propose a
Two-Phase Validation Commit protocol as a solution, which is a modified version
of the basic Two-Phase Validation Commit protocols. We finally analyze the
different approaches presented using both analytical evaluation of the
overheads and simulations to guide the decision makers to which approach to
use.
ADVANTAGES OF PROPOSED
SYSTEM:
v
Safe transactions, that identifies transactions
that are both trusted and conform to the ACID properties of distributed
database systems.
v
Two-Phase Validation Commit (2PVC) protocol
that ensures that a transaction is safe by checking policy.
SYSTEM
ARCHITECTURE
SYSTEM CONFIGURATION:-
HARDWARE REQUIREMENTS:-
Processor - Pentium –IV
Speed - 1.1 Ghz
RAM - 512 MB(min)
Hard Disk - 40 GB
Key Board - Standard Windows Keyboard
Mouse - Two or Three Button Mouse
Monitor - LCD/LED
SOFTWARE
REQUIREMENTS:
Operating
system : Windows XP.
Coding
Language : .Net
Data
Base : SQL Server 2005
Tool : VISUAL STUDIO 2008.
REFERENCE:
Marian
K. Iskander, Tucker Trainor, Dave W. Wilkinson, Adam J. Lee, and
Panos K. Chrysanthis, “Balancing Performance, Accuracy, and Precision for Secure Cloud
Transactions” IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL.
25, NO. 2, FEBRUARY 2014
No comments:
Post a Comment