SlideShare a Scribd company logo
BALANCING PERFORMANCE, 
ACCURACY, AND 
PRECISION FOR SECURE CLOUD 
TRANSACTIONS 
Presented by, 
LansA Informatics Pvt Ltd
ABSTRACT 
• In distributed transactional database systems deployed over 
cloud servers, entities cooperate to form proofs of authorizations 
that are justified by collections of certified credentials. These 
proofs and credentials may be evaluated and collected over 
extended time periods under the risk of having the underlying 
authorization policies or the user credentials being in 
inconsistent states. 
• It therefore becomes possible for policy-based authorization 
systems to make unsafe decisions that might threaten sensitive 
resources. In this paper, we highlight the criticality of the 
problem. 
• We then define the notion of trusted transactions when dealing 
with proofs of authorization. Accordingly, we propose several 
increasingly stringent levels of policy consistency constraints, 
and present different enforcement approaches to guarantee the 
trustworthiness of transactions executing On cloud servers. 
• We propose a Two-Phase Validation Commit protocol as a 
solution, which is a modified version of the basic Two-Phase 
Validation Commit protocols. 
• We finally analyze the different approaches presented using both 
analytical evaluation of the overheads and simulations to guide 
the decision makers to which approach to use.
EXISTING SYSTEM 
• Interesting consistency problems can arise as transactional database 
systems are deployed in cloud environments and use policy-based 
authorization systems to protect sensitive resources. In addition to 
handling consistency issues among database replicas, we must also 
handle two types of security inconsistency conditions. 
• First, the system may suffer from policy inconsistencies during 
policy updates due to the relaxed consistency model underlying most 
cloud services. For example, it is possible for several versions of the 
policy to be observed at multiple sites within a single transaction, 
leading to inconsistent (and likely unsafe) access decisions during the 
transaction. 
• Second, it is possible for external factors to cause user credential 
inconsistencies over the lifetime of a transaction. For instance, a 
user’s login credentials could be invalidatedor revoked after 
collection by the authorization server, but before the completion of 
the transaction
DISADVANTAGES OF EXISTING SYSTEM 
• Insecure Data’s. 
• Time takes too long for 
authentication. 
• Requiring expensive infrastructure
PROPOSED SYSTEM 
• We propose several increasingly stringent levels of 
policy consistency constraints, and present different 
enforcement approaches to guarantee the 
trustworthiness of transactions executing on cloud 
servers. 
• We propose a Two-Phase Validation Commit protocol 
as a solution, which is a modified version of the basic 
Two-Phase Validation Commit protocols. 
• We finally analyze the different approaches presented 
using both analytical evaluation of the overheads and 
simulations to guide the decision makers to which 
approach to use.
ADVANTAGES OF PROPOSED SYSTEM 
• Safe transactions, that identifies 
transactions that are both trusted and 
conform to the ACID properties of 
distributed database systems. 
• Two-Phase Validation Commit (2PVC) 
protocol that ensures that a transaction is 
safe by checking policy
SYSTEM ARCHITECTURE
SYSTEM CONFIGURATION:- 
HARDWARE REQUIREMENTS:- 
• Processor - Pentium –IV 
• Speed - 1.1 Ghz 
• RAM - 512 MB(min) 
• Hard Disk - 40 GB 
• Key Board - Standard 
Windows 
• Mouse - Two or Three 
Button Mouse 
• Monitor - LCD/LED 
SOFTWARE REQUIREMENTS 
• Operating system : Windows XP. 
• Coding Language : ASP.Net 
• Data Base :SQL Server 
2005
REFERENCE: 
• Marian K. Iskander, Tucker Trainor, Dave W. Wilkinson, 
Adam J. Lee, Member, IEEE, and Panos K. Chrysanthis, 
Senior Member, IEEE, “Balancing Performance, 
Accuracy, and Precision for Secure Cloud 
Transactions” IEEE TRANSACTIONS ON PARALLEL 
AND DISTRIBUTED SYSTEMS, VOL. 25, NO. 2, 
FEBRUARY 2014
JOIN US! 
OFFICE ADDRESS: 
LansA Informatics Pvt ltd 
No 165, 5th Street, 
Crosscut Road, Gandhipuram, 
Coimbatore - 641 015 
OTHER MODE OF CONTACT: 
Landline: 0422 – 4204373 
Mobile : +91 90 953 953 33 
+91 91 591 159 69 
Email ID: studentscdc@lansainformatics.com 
web: www.lansainformatics.com 
Blog: www.lansastudentscdc.blogspot.com 
Facebook: www.facebook.com/lansainformatics 
Twitter: www.twitter.com/lansainformatic

More Related Content

PPTX
balancing performance,accuracy and precision for secure cloud transactions
DOC
Balancing performance, accuracy, and precision for secure cloud transactions
DOCX
balancing performance, accuracy, and precision for secure cloud transactions
DOCX
JPD1401 Balancing Performance, Accuracy, and Precision for Secure Cloud Tran...
DOCX
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Balancing performance--accuracy--an...
PPTX
BALANCING PERFORMANCE,ACCURACY,AND PRECISION FOR SECURE CLOUD TRANSACTIONS
ODP
Large Scale Deployment of SOA-P
PPTX
Chris Phillips SCIM Mace-Dir Internet2 Fall Member Meeting Refresh
balancing performance,accuracy and precision for secure cloud transactions
Balancing performance, accuracy, and precision for secure cloud transactions
balancing performance, accuracy, and precision for secure cloud transactions
JPD1401 Balancing Performance, Accuracy, and Precision for Secure Cloud Tran...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Balancing performance--accuracy--an...
BALANCING PERFORMANCE,ACCURACY,AND PRECISION FOR SECURE CLOUD TRANSACTIONS
Large Scale Deployment of SOA-P
Chris Phillips SCIM Mace-Dir Internet2 Fall Member Meeting Refresh

What's hot (19)

PDF
Providing user security guarantees
PPT
Privacy preserving public auditing for secure cloud storage
PDF
Secure computing-ieee-2014-projects
PDF
Secure Computing IEEE 2014 Projects
PPTX
Service Mesh 101 - Digging into your service
PDF
JS Fest 2019/Autumn. Anton Cherednikov. Choreographic or orchestral architect...
PPTX
K8s Webhook Admission
PPTX
Final review presentation
PPTX
Towards secure & dependable storage services in cloud computing
DOC
Privacy Preserving Public Auditing for Data Storage Security in Cloud
PPTX
Microservices architecture
PDF
Troubleshooting and Best Practices with WSO2 Enterprise Integrator
PPT
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
PPTX
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
PDF
How to Create Observable Integration Solutions Using WSO2 Enterprise Integrator
PDF
Resilient microservices
PDF
Update to PCI DSS v3.2
PPTX
Privacy preserving public auditing
Providing user security guarantees
Privacy preserving public auditing for secure cloud storage
Secure computing-ieee-2014-projects
Secure Computing IEEE 2014 Projects
Service Mesh 101 - Digging into your service
JS Fest 2019/Autumn. Anton Cherednikov. Choreographic or orchestral architect...
K8s Webhook Admission
Final review presentation
Towards secure & dependable storage services in cloud computing
Privacy Preserving Public Auditing for Data Storage Security in Cloud
Microservices architecture
Troubleshooting and Best Practices with WSO2 Enterprise Integrator
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
How to Create Observable Integration Solutions Using WSO2 Enterprise Integrator
Resilient microservices
Update to PCI DSS v3.2
Privacy preserving public auditing
Ad

Similar to Balancing performance accuracy and precision for secure cloud transactions (20)

PDF
Ieeepro techno solutions ieee java project - balancing performance,accuracy ...
PDF
Ieeepro techno solutions ieee dotnet project - balancing performance,accurac...
PDF
Ieeepro techno solutions ieee java project - balancing performance,accuracy ...
PDF
Ieeepro techno solutions ieee java project - balancing performance,accuracy ...
PDF
Balancing performance, accuracy
PPTX
FINAL REVIEW.pptx
DOCX
Balancing performance, accuracy, and precision for secure cloud transactions
PPTX
Project Review PPT Model FOR STUDENTS __
PPTX
doctoral committee meeting minutes of synopsis meeting minutes
PDF
To Improve Data Storage Security Levels in the Cloud
PDF
Ieee projects-2014-bulk-ieee-projects-2015-title-list-for-me-be-mphil-final-y...
PDF
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
PDF
A proposed Solution: Data Availability and Error Correction in Cloud Computing
DOCX
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Distributed -concurrent--and-indepen...
DOCX
2014 IEEE JAVA CLOUD COMPUTING PROJECT Distributed, concurrent, and independe...
DOCX
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Distributed, concurrent, and independ...
DOCX
2014 IEEE JAVA CLOUD COMPUTING PROJECT Distributed, concurrent, and independe...
DOCX
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Distributed -concurrent--and-indepe...
PPTX
Fine grained two-factor access control for cloud
PDF
Cloud security issues and concerns
Ieeepro techno solutions ieee java project - balancing performance,accuracy ...
Ieeepro techno solutions ieee dotnet project - balancing performance,accurac...
Ieeepro techno solutions ieee java project - balancing performance,accuracy ...
Ieeepro techno solutions ieee java project - balancing performance,accuracy ...
Balancing performance, accuracy
FINAL REVIEW.pptx
Balancing performance, accuracy, and precision for secure cloud transactions
Project Review PPT Model FOR STUDENTS __
doctoral committee meeting minutes of synopsis meeting minutes
To Improve Data Storage Security Levels in the Cloud
Ieee projects-2014-bulk-ieee-projects-2015-title-list-for-me-be-mphil-final-y...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
A proposed Solution: Data Availability and Error Correction in Cloud Computing
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Distributed -concurrent--and-indepen...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Distributed, concurrent, and independe...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Distributed, concurrent, and independ...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Distributed, concurrent, and independe...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Distributed -concurrent--and-indepe...
Fine grained two-factor access control for cloud
Cloud security issues and concerns
Ad

More from Papitha Velumani (20)

PDF
2015 - 2016 IEEE Project Titles and abstracts in Java
PDF
2015 - 2016 IEEE Project Titles and abstracts in Android
PDF
2015 - 2016 IEEE Project Titles and abstracts in Dotnet
DOC
Trajectory improves data delivery in urban vehicular networks
DOC
Tracon interference aware scheduling for data-intensive applications in virtu...
DOC
Supporting privacy protection in personalized web search
DOC
Stochastic bandwidth estimation in networks with random service
DOC
Sos a distributed mobile q&a system based on social networks
DOC
Security evaluation of pattern classifiers under attack
DOC
Real time misbehavior detection in ieee 802.11-based wireless networks an ana...
DOC
Probabilistic consolidation of virtual machines in self organizing cloud data...
DOC
Privacy preserving multi-keyword ranked search over encrypted cloud data
DOC
Privacy preserving and content-protecting location based queries
DOC
Pack prediction based cloud bandwidth and cost reduction system
DOC
Occt a one class clustering tree for implementing one-to-man data linkage
DOC
Leveraging social networks for p2p content based file sharing in disconnected...
DOC
LDBP: localized boundary detection and parametrization for 3 d sensor networks
DOC
Integrity for join queries in the cloud
DOC
Improving fairness, efficiency, and stability in http based adaptive video st...
DOC
Hybrid attribute and re-encryption-based key management for secure and scala...
2015 - 2016 IEEE Project Titles and abstracts in Java
2015 - 2016 IEEE Project Titles and abstracts in Android
2015 - 2016 IEEE Project Titles and abstracts in Dotnet
Trajectory improves data delivery in urban vehicular networks
Tracon interference aware scheduling for data-intensive applications in virtu...
Supporting privacy protection in personalized web search
Stochastic bandwidth estimation in networks with random service
Sos a distributed mobile q&a system based on social networks
Security evaluation of pattern classifiers under attack
Real time misbehavior detection in ieee 802.11-based wireless networks an ana...
Probabilistic consolidation of virtual machines in self organizing cloud data...
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving and content-protecting location based queries
Pack prediction based cloud bandwidth and cost reduction system
Occt a one class clustering tree for implementing one-to-man data linkage
Leveraging social networks for p2p content based file sharing in disconnected...
LDBP: localized boundary detection and parametrization for 3 d sensor networks
Integrity for join queries in the cloud
Improving fairness, efficiency, and stability in http based adaptive video st...
Hybrid attribute and re-encryption-based key management for secure and scala...

Recently uploaded (20)

PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPTX
Week 4 Term 3 Study Techniques revisited.pptx
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
Pre independence Education in Inndia.pdf
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PPTX
Cell Types and Its function , kingdom of life
PDF
Classroom Observation Tools for Teachers
PDF
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
PDF
01-Introduction-to-Information-Management.pdf
PDF
Basic Mud Logging Guide for educational purpose
PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Final Presentation General Medicine 03-08-2024.pptx
STATICS OF THE RIGID BODIES Hibbelers.pdf
Week 4 Term 3 Study Techniques revisited.pptx
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
Pre independence Education in Inndia.pdf
Microbial diseases, their pathogenesis and prophylaxis
Cell Types and Its function , kingdom of life
Classroom Observation Tools for Teachers
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
01-Introduction-to-Information-Management.pdf
Basic Mud Logging Guide for educational purpose
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
Abdominal Access Techniques with Prof. Dr. R K Mishra
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Renaissance Architecture: A Journey from Faith to Humanism
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Supply Chain Operations Speaking Notes -ICLT Program
FourierSeries-QuestionsWithAnswers(Part-A).pdf
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf

Balancing performance accuracy and precision for secure cloud transactions

  • 1. BALANCING PERFORMANCE, ACCURACY, AND PRECISION FOR SECURE CLOUD TRANSACTIONS Presented by, LansA Informatics Pvt Ltd
  • 2. ABSTRACT • In distributed transactional database systems deployed over cloud servers, entities cooperate to form proofs of authorizations that are justified by collections of certified credentials. These proofs and credentials may be evaluated and collected over extended time periods under the risk of having the underlying authorization policies or the user credentials being in inconsistent states. • It therefore becomes possible for policy-based authorization systems to make unsafe decisions that might threaten sensitive resources. In this paper, we highlight the criticality of the problem. • We then define the notion of trusted transactions when dealing with proofs of authorization. Accordingly, we propose several increasingly stringent levels of policy consistency constraints, and present different enforcement approaches to guarantee the trustworthiness of transactions executing On cloud servers. • We propose a Two-Phase Validation Commit protocol as a solution, which is a modified version of the basic Two-Phase Validation Commit protocols. • We finally analyze the different approaches presented using both analytical evaluation of the overheads and simulations to guide the decision makers to which approach to use.
  • 3. EXISTING SYSTEM • Interesting consistency problems can arise as transactional database systems are deployed in cloud environments and use policy-based authorization systems to protect sensitive resources. In addition to handling consistency issues among database replicas, we must also handle two types of security inconsistency conditions. • First, the system may suffer from policy inconsistencies during policy updates due to the relaxed consistency model underlying most cloud services. For example, it is possible for several versions of the policy to be observed at multiple sites within a single transaction, leading to inconsistent (and likely unsafe) access decisions during the transaction. • Second, it is possible for external factors to cause user credential inconsistencies over the lifetime of a transaction. For instance, a user’s login credentials could be invalidatedor revoked after collection by the authorization server, but before the completion of the transaction
  • 4. DISADVANTAGES OF EXISTING SYSTEM • Insecure Data’s. • Time takes too long for authentication. • Requiring expensive infrastructure
  • 5. PROPOSED SYSTEM • We propose several increasingly stringent levels of policy consistency constraints, and present different enforcement approaches to guarantee the trustworthiness of transactions executing on cloud servers. • We propose a Two-Phase Validation Commit protocol as a solution, which is a modified version of the basic Two-Phase Validation Commit protocols. • We finally analyze the different approaches presented using both analytical evaluation of the overheads and simulations to guide the decision makers to which approach to use.
  • 6. ADVANTAGES OF PROPOSED SYSTEM • Safe transactions, that identifies transactions that are both trusted and conform to the ACID properties of distributed database systems. • Two-Phase Validation Commit (2PVC) protocol that ensures that a transaction is safe by checking policy
  • 8. SYSTEM CONFIGURATION:- HARDWARE REQUIREMENTS:- • Processor - Pentium –IV • Speed - 1.1 Ghz • RAM - 512 MB(min) • Hard Disk - 40 GB • Key Board - Standard Windows • Mouse - Two or Three Button Mouse • Monitor - LCD/LED SOFTWARE REQUIREMENTS • Operating system : Windows XP. • Coding Language : ASP.Net • Data Base :SQL Server 2005
  • 9. REFERENCE: • Marian K. Iskander, Tucker Trainor, Dave W. Wilkinson, Adam J. Lee, Member, IEEE, and Panos K. Chrysanthis, Senior Member, IEEE, “Balancing Performance, Accuracy, and Precision for Secure Cloud Transactions” IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 25, NO. 2, FEBRUARY 2014
  • 10. JOIN US! OFFICE ADDRESS: LansA Informatics Pvt ltd No 165, 5th Street, Crosscut Road, Gandhipuram, Coimbatore - 641 015 OTHER MODE OF CONTACT: Landline: 0422 – 4204373 Mobile : +91 90 953 953 33 +91 91 591 159 69 Email ID: studentscdc@lansainformatics.com web: www.lansainformatics.com Blog: www.lansastudentscdc.blogspot.com Facebook: www.facebook.com/lansainformatics Twitter: www.twitter.com/lansainformatic