SlideShare ist ein Scribd-Unternehmen logo
1 von 24
Downloaden Sie, um offline zu lesen
TECHNICAL SEMINAR REPORT
                         ON
SECURITY ISSUES FOR CLOUD COMPUTING



                      Presented by
                       E.PUSHPA




  PRIYADARSHINI COLLEGE OF ENGINEERING &
               TECHNOLOGY
 [Affiliated to Jawaharlal Nehru technological university,
                       Ananthapur]
                  Kanupartipadu, Nellore-524004
                          2012-2013
Overview
1. Introduction
2. Security Issues
3. Third Party Secure Data Publication Applied to
   CLOUD
4. Encrypted Data Storage for Cloud
5. Secure Query Processing with Hadoop
    5.1 Overview of Hadoop
    5.2 Inadequacies of Hadoop
         i)No facility to handle encrypted
         sensitive
         ii)Semantic Web Data Management
iii)No fine-grained access control
     iv)No strong authentication
  5.3 System Design
     i)Jena
    ii)Pellet
   iii)Pig Latin
   iv)Mahout, Hama
   v)Pre-processing

        5.3.3 Query Execution and Optimization

 5.4 Integrate SUN XACML Implementation into HDFS
  5.5 Strong Authentication
6. Conclusion
7. References
ABSTRACT

   We discuss security issues for cloud computing and
    present a layered framework for secure clouds and
    then focus on two of the layers, i.e., the storage
    layer and the data layer.
   we discuss a scheme for secure third party
    publications of documents in a cloud. Next, we will
    converse secure federated query processing with
    map Reduce and Hadoop, and discuss the use of
    secure co-processors for cloud computing.
    Finally, the we discuss XACML implementation for
    Hadoop and discuss their beliefs that building
    trusted applications from untrusted components
    will be a major aspect of secure cloud computing.
INTRODUCTION

There is a critical need to securely store,
manage,share and analyze massive amounts of
complex data to determine patterns and trends
 Because of the critical nature of the
applications, it is important that clouds be secure

Google has now introduced the MapReduce
framework for processing large amounts of data on
commodity hardware

Apache’s Hadoop distributed file system
(HDFS) is emerging as a superior software
component for cloud computing combined with
integrated parts such as MapReduce
Due to the extensive complexity of the
cloud, we contend that it will be difficult to
provide a holistic solution to securing the
cloud

Our cloud system will:
(a)support efficient storageof encrypted sensitive
   data,
(b) store, manage and query massive amounts of
   data,
(c) support fine-grained access control and
(d) support strong authentication
2.SECURITY ISSUES

 There are numerous security issues for cloud
computing as it encompasses many technologies
including networks, databases, operating systems
Data security involves encrypting the data as
well as ensuring that appropriate policies are
enforced for data sharing

We describe ways of efficiently storing the data
in foreign machines

Querying encrypted data, as much of the data on
the cloud may be encrypted
Data mining techniques may be applicable to
malware detection in clouds

 We are using Hadoop distributed file system for
virtualization at the storage level and applying security
for Hadoop which includes an XACML implementation

 Resource allocation and memory management
algorithms


We are investigating secure federated query
processing on clouds over Hadoop
3.THIRD PARTY SECURE DATAPUBLICATION
             APPLIED TO CLOUD

►We have developed techniques for third party publication
of data in a secure manner

►security policy is specified depending on user roles and
credentials


Figure : Access control framework
►Users must possess the credentials to access XML
documents
►For example, a professor has access to all of the details of
students while a secretary only has access to administrative
information

►If access is granted to the root, it does not necessarily
mean access is granted to all the children

►When the subject requests a document, the publisher
will apply the policies relevant to the subject and give
portions of the documents to the subject.

►Owner will encrypt various combinations of documents
and policies with his/her private key
►Using Merkle signature and the encryption techniques,
the subject can verify the authenticity and completeness
of the document

►In the cloud environment,
the third party publisher is the
machine that stored the
sensitive data in the cloud
4.ENCRYPTED DATA
        STORAGE FOR CLOUD

►Data in the cloud will be placed anywhere

►We are using secure co-processor as part of the cloud
infrastructure to enable efficient encrypted storage of
sensitive data.

► Open Cirrus provides limited access based on their
economic model

►Open Cirrus doesnot provide the hardware support
we need (e.g., secure co-processors).
►By embedding a secure co-processor (SCP)into the cloud
infrastructure, the system can handle encrypted data
efficiently

►SCP is a tamper resistant hardware capable of limited
general-purpose computation

►Secure coprocessor is tamper-resistant, one could be
tempted to run the entire sensitive data storage server on
the secure coprocessor.

►Due to the tamper-resistant shell, secure co-processors
have usually limited memory .
►Another issue is that the software running on the SCP
must be totally trusted and verified

►Framework will facilitate
(a)secure data storage and
(b) assured information
sharing

►We have conducted
research on querying
encrypted data as well as
secure multipart
computation (SMC)

►One drawback of SMC is the high computation costs
5.SECURE QUERY PROCESSING
              WITH HADOOP
                  5.1 Overview of Hadoop

A major part of our system is HDFS which is a
distributed Java-based file system with the capacity to
handle a large number of nodes storing petabytes of data

HDFS architecture
is based on the
Master- Slave
approach
5.3 SYSTEM DESIGN

We are using several software tools that are available
to help us in the process
i)Jena: Jena is a framework which is widely used
for solving SPARQL queries over RDF data
ii)Pellet: We use Pellet to reason at various stages.
We do real-time query reasoning using pellet libraries
(Pellet) coupled with Hadoop’s map-reduce functionalities

iii)Pig Latin: Pig Latin is a scripting language which
runs on top of Hadoop.
 It comes with many built-in functions, but we can also
 create our own user-defined functions to do special-
 purpose processing.

iv)Mahout, Hama: These are open source data mining
and machine learning packages that already augment
Hadoop.
    Our approach consists of processing SPARQL queries
securely over Hadoop. SPARQL is a query language used to
query RDF data


v)Pre-processing: Generally, RDF data is in XML format
In order to execute a SPARQL query, we propose some data
pre-processing steps and store the pre-processed data into
HDFS.
5.3.3 Query Execution and
                       Optimization

We are developing a SPARQL query execution and
optimization module for Hadoop.
As our storage strategy is based on predicate splits

First, we will look at the predicates present in the query.

 Second, rather than looking at all of the input files, we
will look at a subset of the input files that are matched with
predicates.

Third, SPARQL queries generally have many joins in them
and all of these joins may not be possible to perform in a
single Hadoop job.
5.4 Integrate SUN XACML
                  Implementation into HDFS

 Current Hadoop implementations enforce a very coarse-
grained access control policy that permits or denies a
principal access to essentially all system resources as a
group without distinguishing amongst resources.

 For example, users who are granted access to the
Namenode may execute any program on any client
machine, and all client machines have read and write
access to all files stored on all clients

 We are enforcing more flexible and fine-grained
access control policies on Hadoop by designing an In-
lined Reference Monitor implementation of Sun
XACML.
Untrusted processes in the framework access
securityrelevant resources by submitting a request to the
resource’s Policy Enforcement Point (PEP)

 PEP reformulates the
request as a policy query
and submits it to a
Policy Decision Point
(PDP)

IRM has advantage
that the policy can be
enforced without
modifying the
operating system
5.5 Strong Authentication

♦Open source community is actively working to integrate
kerberos protocols with hadoop

♦On top of the proposed Kerboros protocol, for some
assured information applications, there may be a need
for adding simple authentication protocols to
authenticate with secure co-processors

♦We can add a simple public key infrastructure to our
system so that users can independently authenticate with
secure coprocessors to retrieve secret keys used for
encrypting sensitive data
6.Conclusion

The main goal is to securely store and manage data that
is not controlled by the owner of the data


It will be difficult to achieve end-to-end security.
However, the challenge we have is to ensure more secure
operations even if some parts of the cloud fail


Building trust applications from untrusted components
will be a major aspect with respect to cloud security
7. References

W3C. (n.d.). SPARQL. Retrieved from http://www. w3.org/TR/rdf-sparql-query
Bertino, E. (2002). Access Control for XML Documents.
Data & Knowledge Engineering, 43(3).
Bertino, E. (2004).
Selective and Authentic Third Party Distribution of XML Documents. IEEE
Transactions on Knowledge and Data Engineering,
16(10). doi:10.1109/TKDE.2004.63
DeVries, B. W., Gupta, G., Hamlen, K. W., Moore, S.,
& Sridhar, M. (2009).
ActionScript Bytecode Verification
with Co-Logic Programming. In Proceedings
of the ACM SIGPLAN Workshop on Programming
Languages and Analysis for Security (PLAS).
Gates, F., Natkovich, O., Chopra, S., Kamath, S. M.,
THANK YOU

Weitere ähnliche Inhalte

Was ist angesagt?

Data security using rsa
Data security using rsaData security using rsa
Data security using rsa
LAKSHMI TEJA SAYABARAPU
 
Ryan_Holt_MS_Thesis_Project_Presentation
Ryan_Holt_MS_Thesis_Project_PresentationRyan_Holt_MS_Thesis_Project_Presentation
Ryan_Holt_MS_Thesis_Project_Presentation
Ryan Holt
 
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
SOME SECURITY CHALLENGES  IN CLOUD COMPUTINGSOME SECURITY CHALLENGES  IN CLOUD COMPUTING
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
Hoang Nguyen
 
Cloud computing & Security presentation
Cloud computing & Security presentationCloud computing & Security presentation
Cloud computing & Security presentation
Parveen Yadav
 

Was ist angesagt? (20)

Security Issues in Cloud Computing
Security Issues in Cloud ComputingSecurity Issues in Cloud Computing
Security Issues in Cloud Computing
 
Data Confidentiality in Cloud Computing
Data Confidentiality in Cloud ComputingData Confidentiality in Cloud Computing
Data Confidentiality in Cloud Computing
 
Cloud computing and data security
Cloud computing and data securityCloud computing and data security
Cloud computing and data security
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environments
 
Data storage security in cloud computing
Data storage security in cloud computingData storage security in cloud computing
Data storage security in cloud computing
 
Data security using rsa
Data security using rsaData security using rsa
Data security using rsa
 
Cloud Computing Security Organization Assessments Service Categories Responsi...
Cloud Computing Security Organization Assessments Service Categories Responsi...Cloud Computing Security Organization Assessments Service Categories Responsi...
Cloud Computing Security Organization Assessments Service Categories Responsi...
 
On technical security issues in cloud computing
On technical security issues in cloud computingOn technical security issues in cloud computing
On technical security issues in cloud computing
 
Cloud Security Issues 1.04.10
Cloud Security  Issues 1.04.10Cloud Security  Issues 1.04.10
Cloud Security Issues 1.04.10
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
PhD Projects in Cloud Computing Security Research Topics
PhD Projects in Cloud Computing Security Research TopicsPhD Projects in Cloud Computing Security Research Topics
PhD Projects in Cloud Computing Security Research Topics
 
Ryan_Holt_MS_Thesis_Project_Presentation
Ryan_Holt_MS_Thesis_Project_PresentationRyan_Holt_MS_Thesis_Project_Presentation
Ryan_Holt_MS_Thesis_Project_Presentation
 
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
SOME SECURITY CHALLENGES  IN CLOUD COMPUTINGSOME SECURITY CHALLENGES  IN CLOUD COMPUTING
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computing
 
Cloud computing & Security presentation
Cloud computing & Security presentationCloud computing & Security presentation
Cloud computing & Security presentation
 
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTINGDATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
 
Cloud Encryption
Cloud EncryptionCloud Encryption
Cloud Encryption
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computing
 
Cloud computing and its security issues
Cloud computing and its security issuesCloud computing and its security issues
Cloud computing and its security issues
 
Cloud security
Cloud security Cloud security
Cloud security
 

Andere mochten auch

Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
Prince Chandu
 
Cloud Computing Security Issues in Infrastructure as a Service”
Cloud Computing Security Issues in Infrastructure as a Service”Cloud Computing Security Issues in Infrastructure as a Service”
Cloud Computing Security Issues in Infrastructure as a Service”
Vivek Maurya
 
Sgx @ centre & vista
Sgx @ centre & vistaSgx @ centre & vista
Sgx @ centre & vista
Sim Shawn
 

Andere mochten auch (20)

Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Cloud Computing Security Issues in Infrastructure as a Service”
Cloud Computing Security Issues in Infrastructure as a Service”Cloud Computing Security Issues in Infrastructure as a Service”
Cloud Computing Security Issues in Infrastructure as a Service”
 
Cloud computing-security-issues
Cloud computing-security-issuesCloud computing-security-issues
Cloud computing-security-issues
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computing
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
 
Scaling People, Not Just Systems, to Take On Big Data Challenges
Scaling People, Not Just Systems, to Take On Big Data ChallengesScaling People, Not Just Systems, to Take On Big Data Challenges
Scaling People, Not Just Systems, to Take On Big Data Challenges
 
Defending Applications In the Cloud: Architecting Layered Security Solutions ...
Defending Applications In the Cloud: Architecting Layered Security Solutions ...Defending Applications In the Cloud: Architecting Layered Security Solutions ...
Defending Applications In the Cloud: Architecting Layered Security Solutions ...
 
A Reference Architecture for a Federated Cloud for Research
A Reference Architecture for a Federated Cloud for ResearchA Reference Architecture for a Federated Cloud for Research
A Reference Architecture for a Federated Cloud for Research
 
Data Security Essentials for Cloud Computing - JavaOne 2013
Data Security Essentials for Cloud Computing - JavaOne 2013Data Security Essentials for Cloud Computing - JavaOne 2013
Data Security Essentials for Cloud Computing - JavaOne 2013
 
Encrypted Databases for Untrusted Cloud
Encrypted Databases for Untrusted CloudEncrypted Databases for Untrusted Cloud
Encrypted Databases for Untrusted Cloud
 
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Web image re ranking using query-spe...
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Web image re ranking using query-spe...2014 IEEE DOTNET CLOUD COMPUTING PROJECT Web image re ranking using query-spe...
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Web image re ranking using query-spe...
 
Cloud computing legal issues
Cloud computing legal issuesCloud computing legal issues
Cloud computing legal issues
 
Synopsis_kamlesh
Synopsis_kamleshSynopsis_kamlesh
Synopsis_kamlesh
 
Mona secure multi owner data sharing for dynamic groups in the cloud-ppt
Mona secure multi owner data sharing for dynamic groups in the cloud-pptMona secure multi owner data sharing for dynamic groups in the cloud-ppt
Mona secure multi owner data sharing for dynamic groups in the cloud-ppt
 
IT Security As A Service
IT Security As A ServiceIT Security As A Service
IT Security As A Service
 
Cloud Computing Legal Issues
Cloud Computing Legal IssuesCloud Computing Legal Issues
Cloud Computing Legal Issues
 
Sgx @ centre & vista
Sgx @ centre & vistaSgx @ centre & vista
Sgx @ centre & vista
 

Ähnlich wie Presentation on cloud computing security issues using HADOOP and HDFS ARCHITECTURE

Imperative Induced Innovation - Patrick W. Dowd, Ph. D
Imperative Induced Innovation - Patrick W. Dowd, Ph. DImperative Induced Innovation - Patrick W. Dowd, Ph. D
Imperative Induced Innovation - Patrick W. Dowd, Ph. D
scoopnewsgroup
 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Editor IJMTER
 
Ijarcet vol-2-issue-3-951-956
Ijarcet vol-2-issue-3-951-956Ijarcet vol-2-issue-3-951-956
Ijarcet vol-2-issue-3-951-956
Editor IJARCET
 
Authenticated Key Exchange Protocols for Parallel Network File Systems
Authenticated Key Exchange Protocols for Parallel Network File SystemsAuthenticated Key Exchange Protocols for Parallel Network File Systems
Authenticated Key Exchange Protocols for Parallel Network File Systems
1crore projects
 

Ähnlich wie Presentation on cloud computing security issues using HADOOP and HDFS ARCHITECTURE (20)

IRJET- Secured Hadoop Environment
IRJET- Secured Hadoop EnvironmentIRJET- Secured Hadoop Environment
IRJET- Secured Hadoop Environment
 
Improving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using HadoopImproving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using Hadoop
 
Privacy Preserving Data Analytics using Cryptographic Technique for Large Dat...
Privacy Preserving Data Analytics using Cryptographic Technique for Large Dat...Privacy Preserving Data Analytics using Cryptographic Technique for Large Dat...
Privacy Preserving Data Analytics using Cryptographic Technique for Large Dat...
 
IRJET - A Secure Access Policies based on Data Deduplication System
IRJET - A Secure Access Policies based on Data Deduplication SystemIRJET - A Secure Access Policies based on Data Deduplication System
IRJET - A Secure Access Policies based on Data Deduplication System
 
H1803035056
H1803035056H1803035056
H1803035056
 
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageBio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
 
An efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environmentAn efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environment
 
Mn3422372248
Mn3422372248Mn3422372248
Mn3422372248
 
Imperative Induced Innovation - Patrick W. Dowd, Ph. D
Imperative Induced Innovation - Patrick W. Dowd, Ph. DImperative Induced Innovation - Patrick W. Dowd, Ph. D
Imperative Induced Innovation - Patrick W. Dowd, Ph. D
 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
 
Ijarcet vol-2-issue-3-951-956
Ijarcet vol-2-issue-3-951-956Ijarcet vol-2-issue-3-951-956
Ijarcet vol-2-issue-3-951-956
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
An Efficient PDP Scheme for Distributed Cloud Storage
An Efficient PDP Scheme for Distributed Cloud StorageAn Efficient PDP Scheme for Distributed Cloud Storage
An Efficient PDP Scheme for Distributed Cloud Storage
 
An4201262267
An4201262267An4201262267
An4201262267
 
Improved deduplication with keys and chunks in HDFS storage providers
Improved deduplication with keys and chunks in HDFS storage providersImproved deduplication with keys and chunks in HDFS storage providers
Improved deduplication with keys and chunks in HDFS storage providers
 
A NEW FRAMEWORK FOR SECURING PERSONAL DATA USING THE MULTI-CLOUD
A NEW FRAMEWORK FOR SECURING PERSONAL DATA USING THE MULTI-CLOUDA NEW FRAMEWORK FOR SECURING PERSONAL DATA USING THE MULTI-CLOUD
A NEW FRAMEWORK FOR SECURING PERSONAL DATA USING THE MULTI-CLOUD
 
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
 
Dynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudDynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for Cloud
 
L018137479
L018137479L018137479
L018137479
 
Authenticated Key Exchange Protocols for Parallel Network File Systems
Authenticated Key Exchange Protocols for Parallel Network File SystemsAuthenticated Key Exchange Protocols for Parallel Network File Systems
Authenticated Key Exchange Protocols for Parallel Network File Systems
 

Kürzlich hochgeladen

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Kürzlich hochgeladen (20)

Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 

Presentation on cloud computing security issues using HADOOP and HDFS ARCHITECTURE

  • 1. TECHNICAL SEMINAR REPORT ON SECURITY ISSUES FOR CLOUD COMPUTING Presented by E.PUSHPA PRIYADARSHINI COLLEGE OF ENGINEERING & TECHNOLOGY [Affiliated to Jawaharlal Nehru technological university, Ananthapur] Kanupartipadu, Nellore-524004 2012-2013
  • 2. Overview 1. Introduction 2. Security Issues 3. Third Party Secure Data Publication Applied to CLOUD 4. Encrypted Data Storage for Cloud 5. Secure Query Processing with Hadoop 5.1 Overview of Hadoop 5.2 Inadequacies of Hadoop i)No facility to handle encrypted sensitive ii)Semantic Web Data Management
  • 3. iii)No fine-grained access control iv)No strong authentication 5.3 System Design i)Jena ii)Pellet iii)Pig Latin iv)Mahout, Hama v)Pre-processing 5.3.3 Query Execution and Optimization 5.4 Integrate SUN XACML Implementation into HDFS 5.5 Strong Authentication 6. Conclusion 7. References
  • 4. ABSTRACT  We discuss security issues for cloud computing and present a layered framework for secure clouds and then focus on two of the layers, i.e., the storage layer and the data layer.  we discuss a scheme for secure third party publications of documents in a cloud. Next, we will converse secure federated query processing with map Reduce and Hadoop, and discuss the use of secure co-processors for cloud computing.  Finally, the we discuss XACML implementation for Hadoop and discuss their beliefs that building trusted applications from untrusted components will be a major aspect of secure cloud computing.
  • 5. INTRODUCTION There is a critical need to securely store, manage,share and analyze massive amounts of complex data to determine patterns and trends  Because of the critical nature of the applications, it is important that clouds be secure Google has now introduced the MapReduce framework for processing large amounts of data on commodity hardware Apache’s Hadoop distributed file system (HDFS) is emerging as a superior software component for cloud computing combined with integrated parts such as MapReduce
  • 6. Due to the extensive complexity of the cloud, we contend that it will be difficult to provide a holistic solution to securing the cloud Our cloud system will: (a)support efficient storageof encrypted sensitive data, (b) store, manage and query massive amounts of data, (c) support fine-grained access control and (d) support strong authentication
  • 7. 2.SECURITY ISSUES  There are numerous security issues for cloud computing as it encompasses many technologies including networks, databases, operating systems Data security involves encrypting the data as well as ensuring that appropriate policies are enforced for data sharing We describe ways of efficiently storing the data in foreign machines Querying encrypted data, as much of the data on the cloud may be encrypted
  • 8. Data mining techniques may be applicable to malware detection in clouds  We are using Hadoop distributed file system for virtualization at the storage level and applying security for Hadoop which includes an XACML implementation  Resource allocation and memory management algorithms We are investigating secure federated query processing on clouds over Hadoop
  • 9. 3.THIRD PARTY SECURE DATAPUBLICATION APPLIED TO CLOUD ►We have developed techniques for third party publication of data in a secure manner ►security policy is specified depending on user roles and credentials Figure : Access control framework
  • 10. ►Users must possess the credentials to access XML documents ►For example, a professor has access to all of the details of students while a secretary only has access to administrative information ►If access is granted to the root, it does not necessarily mean access is granted to all the children ►When the subject requests a document, the publisher will apply the policies relevant to the subject and give portions of the documents to the subject. ►Owner will encrypt various combinations of documents and policies with his/her private key
  • 11. ►Using Merkle signature and the encryption techniques, the subject can verify the authenticity and completeness of the document ►In the cloud environment, the third party publisher is the machine that stored the sensitive data in the cloud
  • 12. 4.ENCRYPTED DATA STORAGE FOR CLOUD ►Data in the cloud will be placed anywhere ►We are using secure co-processor as part of the cloud infrastructure to enable efficient encrypted storage of sensitive data. ► Open Cirrus provides limited access based on their economic model ►Open Cirrus doesnot provide the hardware support we need (e.g., secure co-processors).
  • 13. ►By embedding a secure co-processor (SCP)into the cloud infrastructure, the system can handle encrypted data efficiently ►SCP is a tamper resistant hardware capable of limited general-purpose computation ►Secure coprocessor is tamper-resistant, one could be tempted to run the entire sensitive data storage server on the secure coprocessor. ►Due to the tamper-resistant shell, secure co-processors have usually limited memory .
  • 14. ►Another issue is that the software running on the SCP must be totally trusted and verified ►Framework will facilitate (a)secure data storage and (b) assured information sharing ►We have conducted research on querying encrypted data as well as secure multipart computation (SMC) ►One drawback of SMC is the high computation costs
  • 15. 5.SECURE QUERY PROCESSING WITH HADOOP 5.1 Overview of Hadoop A major part of our system is HDFS which is a distributed Java-based file system with the capacity to handle a large number of nodes storing petabytes of data HDFS architecture is based on the Master- Slave approach
  • 16. 5.3 SYSTEM DESIGN We are using several software tools that are available to help us in the process i)Jena: Jena is a framework which is widely used for solving SPARQL queries over RDF data ii)Pellet: We use Pellet to reason at various stages. We do real-time query reasoning using pellet libraries (Pellet) coupled with Hadoop’s map-reduce functionalities iii)Pig Latin: Pig Latin is a scripting language which runs on top of Hadoop.
  • 17.  It comes with many built-in functions, but we can also create our own user-defined functions to do special- purpose processing. iv)Mahout, Hama: These are open source data mining and machine learning packages that already augment Hadoop. Our approach consists of processing SPARQL queries securely over Hadoop. SPARQL is a query language used to query RDF data v)Pre-processing: Generally, RDF data is in XML format In order to execute a SPARQL query, we propose some data pre-processing steps and store the pre-processed data into HDFS.
  • 18. 5.3.3 Query Execution and Optimization We are developing a SPARQL query execution and optimization module for Hadoop. As our storage strategy is based on predicate splits First, we will look at the predicates present in the query.  Second, rather than looking at all of the input files, we will look at a subset of the input files that are matched with predicates. Third, SPARQL queries generally have many joins in them and all of these joins may not be possible to perform in a single Hadoop job.
  • 19. 5.4 Integrate SUN XACML Implementation into HDFS  Current Hadoop implementations enforce a very coarse- grained access control policy that permits or denies a principal access to essentially all system resources as a group without distinguishing amongst resources.  For example, users who are granted access to the Namenode may execute any program on any client machine, and all client machines have read and write access to all files stored on all clients  We are enforcing more flexible and fine-grained access control policies on Hadoop by designing an In- lined Reference Monitor implementation of Sun XACML.
  • 20. Untrusted processes in the framework access securityrelevant resources by submitting a request to the resource’s Policy Enforcement Point (PEP)  PEP reformulates the request as a policy query and submits it to a Policy Decision Point (PDP) IRM has advantage that the policy can be enforced without modifying the operating system
  • 21. 5.5 Strong Authentication ♦Open source community is actively working to integrate kerberos protocols with hadoop ♦On top of the proposed Kerboros protocol, for some assured information applications, there may be a need for adding simple authentication protocols to authenticate with secure co-processors ♦We can add a simple public key infrastructure to our system so that users can independently authenticate with secure coprocessors to retrieve secret keys used for encrypting sensitive data
  • 22. 6.Conclusion The main goal is to securely store and manage data that is not controlled by the owner of the data It will be difficult to achieve end-to-end security. However, the challenge we have is to ensure more secure operations even if some parts of the cloud fail Building trust applications from untrusted components will be a major aspect with respect to cloud security
  • 23. 7. References W3C. (n.d.). SPARQL. Retrieved from http://www. w3.org/TR/rdf-sparql-query Bertino, E. (2002). Access Control for XML Documents. Data & Knowledge Engineering, 43(3). Bertino, E. (2004). Selective and Authentic Third Party Distribution of XML Documents. IEEE Transactions on Knowledge and Data Engineering, 16(10). doi:10.1109/TKDE.2004.63 DeVries, B. W., Gupta, G., Hamlen, K. W., Moore, S., & Sridhar, M. (2009). ActionScript Bytecode Verification with Co-Logic Programming. In Proceedings of the ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS). Gates, F., Natkovich, O., Chopra, S., Kamath, S. M.,