SlideShare a Scribd company logo
BALANCING PERFORMANCE, ACCURACY, AND 
PRECISION FOR SECURE CLOUD TRANSACTIONS 
ABSTRACT: 
In distributed transactional database systems deployed over 
cloud servers, entities cooperate to form proofs of authorizations 
that are justified by collections of certified credentials. These 
proofs and credentials may be evaluated and collected over 
extended time periods under the risk of having the underlying 
authorization policies or the user credentials being in 
inconsistent states. It therefore becomes possible for policy-based 
authorization systems to make unsafe decisions that might 
threaten sensitive resources. In this paper, we highlight the 
criticality of the problem. We then define the notion of trusted 
transactions when dealing with proofs of authorization. 
Accordingly, we propose several increasingly stringent levels of 
policy consistency constraints, and present different 
enforcement approaches to guarantee the trustworthiness of 
transactions executing On cloud servers. We propose a Two-
Phase Validation Commit protocol as a solution, which is a 
modified version of the basic Two-Phase Validation Commit 
protocols. We finally analyze the different approaches presented 
using both analytical evaluation of the overheads and 
simulations to guide the decision makers to which approach to 
use. 
EXISTING SYSTEM: 
Interesting consistency problems can arise as transactional 
database systems are deployed in cloud environments and use 
policy-based authorization systems to protect sensitive 
resources. In addition to handling consistency issues among 
database replicas, we must also handle two types of security 
inconsistency conditions. First, the system may suffer from 
policy inconsistencies during policy updates due to the relaxed 
consistency model underlying most cloud services. For example, 
it is possible for several versions of the policy to be observed at 
multiple sites within a single transaction, leading to inconsistent 
(and likely unsafe) access decisions during the transaction.
Second, it is possible for external factors to cause user credential 
inconsistencies over the lifetime of a transaction. For instance, a 
user’s login credentials could be invalidatedor revoked after 
collection by the authorization server, but before the completion 
of the transaction. 
DISADVANTAGES OF EXISTING SYSTEM: 
 Insecure Data’s. 
 Time takes too long for authentication. 
 Requiring expensive infrastructure. 
PROPOSED SYSTEM: 
We propose several increasingly stringent levels of policy 
consistency constraints, and present different enforcement 
approaches to guarantee the trustworthiness of transactions 
executing on cloud servers. We propose a Two-Phase Validation 
Commit protocol as a solution, which is a modified version of 
the basic Two-Phase Validation Commit protocols. We finally 
analyze the different approaches presented using both analytical
evaluation of the overheads and simulations to guide the 
decision makers to which approach to use. 
ADVANTAGES OF PROPOSED SYSTEM: 
Safe transactions, that identifies transactions that are both 
trusted and conform to the ACID properties of distributed 
database systems. 
Two-Phase Validation Commit (2PVC) protocol that ensures 
that a transaction is safe by checking policy.
SYSTEM ARCHITECTURE
SYSTEM CONFIGURATION:- 
HARDWARE REQUIREMENTS:- 
Processor - Pentium –IV 
Speed - 1.1 Ghz 
RAM - 512 MB(min) 
Hard Disk - 40 GB 
Key Board - Standard Windows Keyboard 
Mouse - Two or Three Button Mouse 
Monitor - LCD/LED 
SOFTWARE REQUIREMENTS: 
Operating system : Windows XP. 
Coding Language : .Net 
Data Base : SQL Server 2005 
Tool : VISUAL STUDIO 2008.
REFERENCE: 
Marian K. Iskander, Tucker Trainor, Dave W. Wilkinson, Adam J. Lee, Member, 
IEEE, and Panos K. Chrysanthis, Senior Member, IEEE, “Balancing 
Performance, Accuracy, and Precision for Secure Cloud Transactions” IEEE 
TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 25, 
NO. 2, FEBRUARY 2014

More Related Content

PPT
Balancing performance accuracy and precision for secure cloud transactions
PPTX
balancing performance,accuracy and precision for secure cloud transactions
DOCX
balancing performance, accuracy, and precision for secure cloud transactions
DOCX
JPD1401 Balancing Performance, Accuracy, and Precision for Secure Cloud Tran...
DOCX
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Balancing performance--accuracy--an...
PPTX
BALANCING PERFORMANCE,ACCURACY,AND PRECISION FOR SECURE CLOUD TRANSACTIONS
ODP
Large Scale Deployment of SOA-P
PDF
Secure Computing IEEE 2014 Projects
Balancing performance accuracy and precision for secure cloud transactions
balancing performance,accuracy and precision for secure cloud transactions
balancing performance, accuracy, and precision for secure cloud transactions
JPD1401 Balancing Performance, Accuracy, and Precision for Secure Cloud Tran...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Balancing performance--accuracy--an...
BALANCING PERFORMANCE,ACCURACY,AND PRECISION FOR SECURE CLOUD TRANSACTIONS
Large Scale Deployment of SOA-P
Secure Computing IEEE 2014 Projects

What's hot (19)

PDF
Secure computing-ieee-2014-projects
PPT
Privacy preserving public auditing for secure cloud storage
PPTX
Chris Phillips SCIM Mace-Dir Internet2 Fall Member Meeting Refresh
PDF
Providing user security guarantees
PPTX
Final review presentation
DOC
Privacy Preserving Public Auditing for Data Storage Security in Cloud
PPTX
Service Mesh 101 - Digging into your service
PPTX
K8s Webhook Admission
PPTX
Towards secure & dependable storage services in cloud computing
PPT
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
PPTX
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
PPTX
Privacy preserving public auditing
PDF
Privacy preserving public auditing for regenerating-code-based cloud storage
PDF
Troubleshooting and Best Practices with WSO2 Enterprise Integrator
PDF
Update to PCI DSS v3.2
PDF
Resilient microservices
PDF
How to Create Observable Integration Solutions Using WSO2 Enterprise Integrator
PDF
Wso2 italia Open Break Session #1 - EI 6.x - 7.x
Secure computing-ieee-2014-projects
Privacy preserving public auditing for secure cloud storage
Chris Phillips SCIM Mace-Dir Internet2 Fall Member Meeting Refresh
Providing user security guarantees
Final review presentation
Privacy Preserving Public Auditing for Data Storage Security in Cloud
Service Mesh 101 - Digging into your service
K8s Webhook Admission
Towards secure & dependable storage services in cloud computing
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
Privacy preserving public auditing
Privacy preserving public auditing for regenerating-code-based cloud storage
Troubleshooting and Best Practices with WSO2 Enterprise Integrator
Update to PCI DSS v3.2
Resilient microservices
How to Create Observable Integration Solutions Using WSO2 Enterprise Integrator
Wso2 italia Open Break Session #1 - EI 6.x - 7.x
Ad

Similar to Balancing performance, accuracy, and precision for secure cloud transactions (20)

PPTX
FINAL REVIEW.pptx
DOCX
Balancing performance, accuracy, and precision for secure cloud transactions
PDF
Providing user security guarantees
DOCX
Providing user security guarantees in public infrastructure clouds
DOC
Service operator aware trust scheme for resource
PDF
IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Clou...
PDF
Ieeepro techno solutions ieee java project - balancing performance,accuracy ...
PDF
Ieeepro techno solutions ieee java project - balancing performance,accuracy ...
PDF
Balancing performance, accuracy
PDF
Ieeepro techno solutions ieee java project - balancing performance,accuracy ...
PDF
Ieeepro techno solutions ieee dotnet project - balancing performance,accurac...
PPT
Consistency As A Service:Auditing Cloud Consistency
PPTX
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
DOC
Ensuring distributed accountability for data sharing in the cloud
DOC
Integrity for join queries in the cloud
PPTX
MCA PROJECT PRESENTATION KALAI SELVAN (1).pptx
PDF
Multi-Server Authentication Key Exchange Approach in BIGDATA Environment
PPT
Towards secure and dependable storage service in cloud
PPT
Towards secure and dependable storage service in cloud
DOC
Integrity for join queries in the cloud
FINAL REVIEW.pptx
Balancing performance, accuracy, and precision for secure cloud transactions
Providing user security guarantees
Providing user security guarantees in public infrastructure clouds
Service operator aware trust scheme for resource
IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Clou...
Ieeepro techno solutions ieee java project - balancing performance,accuracy ...
Ieeepro techno solutions ieee java project - balancing performance,accuracy ...
Balancing performance, accuracy
Ieeepro techno solutions ieee java project - balancing performance,accuracy ...
Ieeepro techno solutions ieee dotnet project - balancing performance,accurac...
Consistency As A Service:Auditing Cloud Consistency
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
Ensuring distributed accountability for data sharing in the cloud
Integrity for join queries in the cloud
MCA PROJECT PRESENTATION KALAI SELVAN (1).pptx
Multi-Server Authentication Key Exchange Approach in BIGDATA Environment
Towards secure and dependable storage service in cloud
Towards secure and dependable storage service in cloud
Integrity for join queries in the cloud
Ad

More from Papitha Velumani (20)

PDF
2015 - 2016 IEEE Project Titles and abstracts in Java
PDF
2015 - 2016 IEEE Project Titles and abstracts in Android
PDF
2015 - 2016 IEEE Project Titles and abstracts in Dotnet
DOC
Trajectory improves data delivery in urban vehicular networks
DOC
Tracon interference aware scheduling for data-intensive applications in virtu...
DOC
Supporting privacy protection in personalized web search
DOC
Stochastic bandwidth estimation in networks with random service
DOC
Sos a distributed mobile q&a system based on social networks
DOC
Security evaluation of pattern classifiers under attack
DOC
Real time misbehavior detection in ieee 802.11-based wireless networks an ana...
DOC
Probabilistic consolidation of virtual machines in self organizing cloud data...
DOC
Privacy preserving multi-keyword ranked search over encrypted cloud data
DOC
Privacy preserving and content-protecting location based queries
DOC
Pack prediction based cloud bandwidth and cost reduction system
DOC
Occt a one class clustering tree for implementing one-to-man data linkage
DOC
Leveraging social networks for p2p content based file sharing in disconnected...
DOC
LDBP: localized boundary detection and parametrization for 3 d sensor networks
DOC
Improving fairness, efficiency, and stability in http based adaptive video st...
DOC
Hybrid attribute and re-encryption-based key management for secure and scala...
DOC
Friendbook a semantic based friend recommendation system for social networks
2015 - 2016 IEEE Project Titles and abstracts in Java
2015 - 2016 IEEE Project Titles and abstracts in Android
2015 - 2016 IEEE Project Titles and abstracts in Dotnet
Trajectory improves data delivery in urban vehicular networks
Tracon interference aware scheduling for data-intensive applications in virtu...
Supporting privacy protection in personalized web search
Stochastic bandwidth estimation in networks with random service
Sos a distributed mobile q&a system based on social networks
Security evaluation of pattern classifiers under attack
Real time misbehavior detection in ieee 802.11-based wireless networks an ana...
Probabilistic consolidation of virtual machines in self organizing cloud data...
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving and content-protecting location based queries
Pack prediction based cloud bandwidth and cost reduction system
Occt a one class clustering tree for implementing one-to-man data linkage
Leveraging social networks for p2p content based file sharing in disconnected...
LDBP: localized boundary detection and parametrization for 3 d sensor networks
Improving fairness, efficiency, and stability in http based adaptive video st...
Hybrid attribute and re-encryption-based key management for secure and scala...
Friendbook a semantic based friend recommendation system for social networks

Recently uploaded (20)

PDF
Open folder Downloads.pdf yes yes ges yes
PPTX
Week 4 Term 3 Study Techniques revisited.pptx
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
01-Introduction-to-Information-Management.pdf
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
The Final Stretch: How to Release a Game and Not Die in the Process.
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
Open Quiz Monsoon Mind Game Prelims.pptx
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
BÀI TẬP TEST BỔ TRỢ THEO TỪNG CHỦ ĐỀ CỦA TỪNG UNIT KÈM BÀI TẬP NGHE - TIẾNG A...
PDF
Business Ethics Teaching Materials for college
PDF
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPTX
master seminar digital applications in india
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
Open folder Downloads.pdf yes yes ges yes
Week 4 Term 3 Study Techniques revisited.pptx
O5-L3 Freight Transport Ops (International) V1.pdf
01-Introduction-to-Information-Management.pdf
Renaissance Architecture: A Journey from Faith to Humanism
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
The Final Stretch: How to Release a Game and Not Die in the Process.
Anesthesia in Laparoscopic Surgery in India
Open Quiz Monsoon Mind Game Prelims.pptx
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
102 student loan defaulters named and shamed – Is someone you know on the list?
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
BÀI TẬP TEST BỔ TRỢ THEO TỪNG CHỦ ĐỀ CỦA TỪNG UNIT KÈM BÀI TẬP NGHE - TIẾNG A...
Business Ethics Teaching Materials for college
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
Abdominal Access Techniques with Prof. Dr. R K Mishra
master seminar digital applications in india
2.FourierTransform-ShortQuestionswithAnswers.pdf

Balancing performance, accuracy, and precision for secure cloud transactions

  • 1. BALANCING PERFORMANCE, ACCURACY, AND PRECISION FOR SECURE CLOUD TRANSACTIONS ABSTRACT: In distributed transactional database systems deployed over cloud servers, entities cooperate to form proofs of authorizations that are justified by collections of certified credentials. These proofs and credentials may be evaluated and collected over extended time periods under the risk of having the underlying authorization policies or the user credentials being in inconsistent states. It therefore becomes possible for policy-based authorization systems to make unsafe decisions that might threaten sensitive resources. In this paper, we highlight the criticality of the problem. We then define the notion of trusted transactions when dealing with proofs of authorization. Accordingly, we propose several increasingly stringent levels of policy consistency constraints, and present different enforcement approaches to guarantee the trustworthiness of transactions executing On cloud servers. We propose a Two-
  • 2. Phase Validation Commit protocol as a solution, which is a modified version of the basic Two-Phase Validation Commit protocols. We finally analyze the different approaches presented using both analytical evaluation of the overheads and simulations to guide the decision makers to which approach to use. EXISTING SYSTEM: Interesting consistency problems can arise as transactional database systems are deployed in cloud environments and use policy-based authorization systems to protect sensitive resources. In addition to handling consistency issues among database replicas, we must also handle two types of security inconsistency conditions. First, the system may suffer from policy inconsistencies during policy updates due to the relaxed consistency model underlying most cloud services. For example, it is possible for several versions of the policy to be observed at multiple sites within a single transaction, leading to inconsistent (and likely unsafe) access decisions during the transaction.
  • 3. Second, it is possible for external factors to cause user credential inconsistencies over the lifetime of a transaction. For instance, a user’s login credentials could be invalidatedor revoked after collection by the authorization server, but before the completion of the transaction. DISADVANTAGES OF EXISTING SYSTEM:  Insecure Data’s.  Time takes too long for authentication.  Requiring expensive infrastructure. PROPOSED SYSTEM: We propose several increasingly stringent levels of policy consistency constraints, and present different enforcement approaches to guarantee the trustworthiness of transactions executing on cloud servers. We propose a Two-Phase Validation Commit protocol as a solution, which is a modified version of the basic Two-Phase Validation Commit protocols. We finally analyze the different approaches presented using both analytical
  • 4. evaluation of the overheads and simulations to guide the decision makers to which approach to use. ADVANTAGES OF PROPOSED SYSTEM: Safe transactions, that identifies transactions that are both trusted and conform to the ACID properties of distributed database systems. Two-Phase Validation Commit (2PVC) protocol that ensures that a transaction is safe by checking policy.
  • 6. SYSTEM CONFIGURATION:- HARDWARE REQUIREMENTS:- Processor - Pentium –IV Speed - 1.1 Ghz RAM - 512 MB(min) Hard Disk - 40 GB Key Board - Standard Windows Keyboard Mouse - Two or Three Button Mouse Monitor - LCD/LED SOFTWARE REQUIREMENTS: Operating system : Windows XP. Coding Language : .Net Data Base : SQL Server 2005 Tool : VISUAL STUDIO 2008.
  • 7. REFERENCE: Marian K. Iskander, Tucker Trainor, Dave W. Wilkinson, Adam J. Lee, Member, IEEE, and Panos K. Chrysanthis, Senior Member, IEEE, “Balancing Performance, Accuracy, and Precision for Secure Cloud Transactions” IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 25, NO. 2, FEBRUARY 2014