Cloud computing is a new operation model providing utility services over a shared virtualized resources. It is visualized that in future, Cloud can offer everything as a service (EAAS). Cloud Service Provider (CSP) makes infrastructure, platform and software services available over the Internet with greater flexibility at a lower cost. Cloud computing paradigm enables users to access computing resources placed at a remote location. The users also need not necessarily own these physical infrastructures. As more and more service providers and users are getting added to the cloud environment, it has become an significant field attracting more attackers to perform malicious activities for financial gains. Several approaches of security are being considered in order to resolve these threats and provide protection for the resources so that the potential of cloud computing can be exploited to the maximum. Cloud forensics is an approach that attempts to investigate and analyze cloud security threats. It will ensure that attackers will be more cautious to avoid prosecution for their illegal actions. It acts as a deterrent, reducing network crime rate and improving security. The paper aims to provide a better awareness of cloud forensics, understand some of the proposed frameworks and identify the research gaps and challenges. The significance of this work is that it presents the state-of-the-art in cloud forensics, which will be very much useful for security practitioners and researchers.
{"title":"Cloud Forensics: State-of-the-Art and Research Challenges","authors":"A. K. Mishra, Priya Matta, E. Pilli, R. Joshi","doi":"10.1109/ISCOS.2012.32","DOIUrl":"https://doi.org/10.1109/ISCOS.2012.32","url":null,"abstract":"Cloud computing is a new operation model providing utility services over a shared virtualized resources. It is visualized that in future, Cloud can offer everything as a service (EAAS). Cloud Service Provider (CSP) makes infrastructure, platform and software services available over the Internet with greater flexibility at a lower cost. Cloud computing paradigm enables users to access computing resources placed at a remote location. The users also need not necessarily own these physical infrastructures. As more and more service providers and users are getting added to the cloud environment, it has become an significant field attracting more attackers to perform malicious activities for financial gains. Several approaches of security are being considered in order to resolve these threats and provide protection for the resources so that the potential of cloud computing can be exploited to the maximum. Cloud forensics is an approach that attempts to investigate and analyze cloud security threats. It will ensure that attackers will be more cautious to avoid prosecution for their illegal actions. It acts as a deterrent, reducing network crime rate and improving security. The paper aims to provide a better awareness of cloud forensics, understand some of the proposed frameworks and identify the research gaps and challenges. The significance of this work is that it presents the state-of-the-art in cloud forensics, which will be very much useful for security practitioners and researchers.","PeriodicalId":138078,"journal":{"name":"2012 International Symposium on Cloud and Services Computing","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126562392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Distributed systems have rapidly changed the face of Internet Technology. Web syndication is a competitive collaborative content delivery system over the cloud, which refers to making web feeds/ material available from a site to other people with a summary of the website's content including the recent updates. The relevance of web syndication has been remarkable in the fields of e-Governance, e-Commerce etc. It endows the ability of subscribing to a desired feed and obtain the contents using the highly scalable web syndication formats RSS (Rich Site Summary)[2] and Atom. Two common protocols used for web pub-sub architecture is the PubSubHubub (PUSH) and Atom, out of which the PubSubHubub[1] is the widely used and very popular. This paper proposes an improvised version of the PUSH named as Ex-PUSH protocol. The Ex-PUSH protocol implements a hybrid filtering technique of feeds and a Poll based Pull strategy for pulling of updates in addition to the existing Push strategy. In addition it includes a Publishers cache that gives two way benefit of trust reinforcement and building of a trust database (TDB) for future data mining. The sample survey shows that the protocol can decrease the total cost of network, save bandwidth and improve scalability.
分布式系统已经迅速改变了互联网技术的面貌。Web syndication是一种基于云的竞争性协作内容交付系统,它指的是将网站上的Web feed /材料提供给其他人,并提供该网站内容的摘要(包括最近的更新)。在电子政务、电子商务等领域,网络联合的相关性是显著的。它赋予订阅所需提要的能力,并使用高度可扩展的web联合格式RSS (Rich Site Summary)[2]和Atom获取内容。用于web发布-订阅架构的两个常见协议是PubSubHubub (PUSH)和Atom,其中PubSubHubub[1]是使用最广泛且非常流行的协议。本文提出了一个临时版本的PUSH协议,称为Ex-PUSH协议。除现有的Push策略外,Ex-PUSH协议还实现了提要的混合过滤技术和基于Poll的Pull策略,用于提取更新。此外,它还包括一个发布者缓存,它提供了增强信任和为未来的数据挖掘构建信任数据库(TDB)的双重好处。实例调查表明,该协议可以降低网络总成本,节省带宽,提高可扩展性。
{"title":"An Efficient Publish-subscribe Protocol for Collaborative Content Delivery - Ex-PUSH","authors":"S. Mallick, D. S. Kushwaha","doi":"10.1109/ISCOS.2012.27","DOIUrl":"https://doi.org/10.1109/ISCOS.2012.27","url":null,"abstract":"Distributed systems have rapidly changed the face of Internet Technology. Web syndication is a competitive collaborative content delivery system over the cloud, which refers to making web feeds/ material available from a site to other people with a summary of the website's content including the recent updates. The relevance of web syndication has been remarkable in the fields of e-Governance, e-Commerce etc. It endows the ability of subscribing to a desired feed and obtain the contents using the highly scalable web syndication formats RSS (Rich Site Summary)[2] and Atom. Two common protocols used for web pub-sub architecture is the PubSubHubub (PUSH) and Atom, out of which the PubSubHubub[1] is the widely used and very popular. This paper proposes an improvised version of the PUSH named as Ex-PUSH protocol. The Ex-PUSH protocol implements a hybrid filtering technique of feeds and a Poll based Pull strategy for pulling of updates in addition to the existing Push strategy. In addition it includes a Publishers cache that gives two way benefit of trust reinforcement and building of a trust database (TDB) for future data mining. The sample survey shows that the protocol can decrease the total cost of network, save bandwidth and improve scalability.","PeriodicalId":138078,"journal":{"name":"2012 International Symposium on Cloud and Services Computing","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127199641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cloud computing provides its users to enjoy the benefits of utility computing model. Security issues becomes more complicated in cloud as clients do not have physical possession of data, requiring additional security primitives at multiple levels. This work examines the overheads of security primitives in cloud and shows a cost-time trade off in presence of security techniques which is used to secure web applications in cloud. Experiments show that the additional security primitives require many fold computational resources as compared to traditional environment where these additional security primitives are not available. Importantly, it leads to poor response time as the additional security requires additional computation. In addition to this, it has been shown that large amount of additional resources are needed to equate the response time to the response time in traditional security or noncloud environments.
{"title":"Overhead Analysis of Security Primitives in Cloud","authors":"Gaurav Somani, Akash Agarwal, Shrutika Ladha","doi":"10.1109/ISCOS.2012.19","DOIUrl":"https://doi.org/10.1109/ISCOS.2012.19","url":null,"abstract":"Cloud computing provides its users to enjoy the benefits of utility computing model. Security issues becomes more complicated in cloud as clients do not have physical possession of data, requiring additional security primitives at multiple levels. This work examines the overheads of security primitives in cloud and shows a cost-time trade off in presence of security techniques which is used to secure web applications in cloud. Experiments show that the additional security primitives require many fold computational resources as compared to traditional environment where these additional security primitives are not available. Importantly, it leads to poor response time as the additional security requires additional computation. In addition to this, it has been shown that large amount of additional resources are needed to equate the response time to the response time in traditional security or noncloud environments.","PeriodicalId":138078,"journal":{"name":"2012 International Symposium on Cloud and Services Computing","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126280138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cloud computing is defined as a structured model that defines computing services, in which resources as well as data are retrieved from cloud service provider via internet through some well formed web-based tool and application. It provides the on demand services for various applications and infrastructure to the user. Cloud service providers are required to provide the service efficiently and effectively. For that, a cloud provider utilizes all the resource from the node. Thus, the node that are meant for creating a task in the cloud computing must be considered for efficient usage of the available resources. Resources have to be properly selected according to the properties of the task. By analyzing the present research on cloud computing, we have come to the most common and important issue of load balancing. Load balancing has always been a research subject whose objective is to ensure that all computing resources are distributed efficiently and fairly. As the numbers of users are increasing on the cloud, the load balancing has become the challenge for the cloud provider. Load balancing being subject of research, we have proposed an algorithm for load balancing which will work dynamically for optimal usage of resource utilization. We have compared our algorithm with various existing static load balancers as well as conventional dynamic load balancer also.
{"title":"HTV Dynamic Load Balancing Algorithm for Virtual Machine Instances in Cloud","authors":"J. Bhatia, T. Patel, H. Trivedi, V. Majmudar","doi":"10.1109/ISCOS.2012.25","DOIUrl":"https://doi.org/10.1109/ISCOS.2012.25","url":null,"abstract":"Cloud computing is defined as a structured model that defines computing services, in which resources as well as data are retrieved from cloud service provider via internet through some well formed web-based tool and application. It provides the on demand services for various applications and infrastructure to the user. Cloud service providers are required to provide the service efficiently and effectively. For that, a cloud provider utilizes all the resource from the node. Thus, the node that are meant for creating a task in the cloud computing must be considered for efficient usage of the available resources. Resources have to be properly selected according to the properties of the task. By analyzing the present research on cloud computing, we have come to the most common and important issue of load balancing. Load balancing has always been a research subject whose objective is to ensure that all computing resources are distributed efficiently and fairly. As the numbers of users are increasing on the cloud, the load balancing has become the challenge for the cloud provider. Load balancing being subject of research, we have proposed an algorithm for load balancing which will work dynamically for optimal usage of resource utilization. We have compared our algorithm with various existing static load balancers as well as conventional dynamic load balancer also.","PeriodicalId":138078,"journal":{"name":"2012 International Symposium on Cloud and Services Computing","volume":"18 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114127261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Transmission Control Protocol (TCP) has been the workhorse of the Internet ever since its inception. The success of the Internet, infact, can be partly attributed to the congestion control mechanisms implemented in TCP. Though the scale of the Internet and its usage increased exponentially in recent past, TCP has evolved to keep up with the changing network conditions and has proven to be scalable and robust. However, the performance of TCP in Data Center Networks has been a major concern recently because it leads to impairments such as TCP Incast, TCP Outcast, Queue build-up and Buffer pressure. With cloud computing becoming an important part of the foreseeable future, it has become extremely important to enhance the performance of TCP in Data Center Networks and overcome these impairments. In this paper, we describe the above mentioned impairments in brief and then compare the TCP variants proposed so far to ovecome these impairments in Data Center Networks. The advantages and shortcomings of every TCP variant are highlighted with respect to its efficacy and the deployment complexity. A few open issues related to TCP's performance in Data Center Networks are also discussed.
{"title":"TCP Variants for Data Center Networks: A Comparative Study","authors":"R. P. Tahiliani, M. Tahiliani, K. Sekaran","doi":"10.1109/ISCOS.2012.38","DOIUrl":"https://doi.org/10.1109/ISCOS.2012.38","url":null,"abstract":"Transmission Control Protocol (TCP) has been the workhorse of the Internet ever since its inception. The success of the Internet, infact, can be partly attributed to the congestion control mechanisms implemented in TCP. Though the scale of the Internet and its usage increased exponentially in recent past, TCP has evolved to keep up with the changing network conditions and has proven to be scalable and robust. However, the performance of TCP in Data Center Networks has been a major concern recently because it leads to impairments such as TCP Incast, TCP Outcast, Queue build-up and Buffer pressure. With cloud computing becoming an important part of the foreseeable future, it has become extremely important to enhance the performance of TCP in Data Center Networks and overcome these impairments. In this paper, we describe the above mentioned impairments in brief and then compare the TCP variants proposed so far to ovecome these impairments in Data Center Networks. The advantages and shortcomings of every TCP variant are highlighted with respect to its efficacy and the deployment complexity. A few open issues related to TCP's performance in Data Center Networks are also discussed.","PeriodicalId":138078,"journal":{"name":"2012 International Symposium on Cloud and Services Computing","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115391480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The Hadoop Distributed File System (HDFS) is a large data storage system which exhibits several features of a good distributed file system. In this paper we integrate Mat lab Distributed Computing Server (MDCS) with HDFS to build a scalable, efficient platform for scientific computations. We use an FTP server on top of HDFS for data transfer from the Mat lab system to HDFS. The motivation of using HDFS for storage with MDCS is to provide an efficient, fault-tolerant file system and also to utilize the resources efficiently by making each system serve as both data node for HDFS and worker for MDCS. We test the storage efficiency of HDFS and compare with normal file system for data transfer operations through MDCS.
{"title":"A Scalable Cloud Platform using Matlab Distributed Computing Server Integrated with HDFS","authors":"R. Dutta, B. Annappa","doi":"10.1109/ISCOS.2012.17","DOIUrl":"https://doi.org/10.1109/ISCOS.2012.17","url":null,"abstract":"The Hadoop Distributed File System (HDFS) is a large data storage system which exhibits several features of a good distributed file system. In this paper we integrate Mat lab Distributed Computing Server (MDCS) with HDFS to build a scalable, efficient platform for scientific computations. We use an FTP server on top of HDFS for data transfer from the Mat lab system to HDFS. The motivation of using HDFS for storage with MDCS is to provide an efficient, fault-tolerant file system and also to utilize the resources efficiently by making each system serve as both data node for HDFS and worker for MDCS. We test the storage efficiency of HDFS and compare with normal file system for data transfer operations through MDCS.","PeriodicalId":138078,"journal":{"name":"2012 International Symposium on Cloud and Services Computing","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122250554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
U. Prathap, Deepa Shenoy, K. Venugopal, L. Patnaik
Several Routing Protocols have been proposed and developed in the last few years for Wireless Sensor Networks (WSNs). Since there has been increasing interest in the development of Wireless Sensor Networks to specific applications, it is necessary to discuss routing techniques suitable to the application and segregate the Quality of Service (QOS) parameters specific to the application domain along with the QOS parameters of the general Wireless Sensor Networks. This paper analyses the chosen Wireless Sensor Networks Applications, their significant QOS needs, and Routing protocols which satisfy the QOS needs. Any other application which has the same QOS needs may use the routing protocol (or with minimum customization) which satisfy the QOS discussed in this paper. Any routing algorithm which satisfies the QOS parameters may be applied to the application domain.
{"title":"Wireless Sensor Networks Applications and Routing Protocols: Survey and Research Challenges","authors":"U. Prathap, Deepa Shenoy, K. Venugopal, L. Patnaik","doi":"10.1109/ISCOS.2012.21","DOIUrl":"https://doi.org/10.1109/ISCOS.2012.21","url":null,"abstract":"Several Routing Protocols have been proposed and developed in the last few years for Wireless Sensor Networks (WSNs). Since there has been increasing interest in the development of Wireless Sensor Networks to specific applications, it is necessary to discuss routing techniques suitable to the application and segregate the Quality of Service (QOS) parameters specific to the application domain along with the QOS parameters of the general Wireless Sensor Networks. This paper analyses the chosen Wireless Sensor Networks Applications, their significant QOS needs, and Routing protocols which satisfy the QOS needs. Any other application which has the same QOS needs may use the routing protocol (or with minimum customization) which satisfy the QOS discussed in this paper. Any routing algorithm which satisfies the QOS parameters may be applied to the application domain.","PeriodicalId":138078,"journal":{"name":"2012 International Symposium on Cloud and Services Computing","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123786432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Built on the fundamental concepts of grid, cluster & distributed computing and following the evolution from mainframe computers to client/server models, Cloud computing is a novel paradigm where computing resources are provisioned on demand. By outsourcing computing and storage requirements to Cloud, user enjoys numerous benefits, such as cost saving through pay for you use model, flexibility & scalability, to name a few. But, as the data stored on the cloud is not under the direct possession of the user, many new security challenges are to be addressed. Data integrity issue is one of them where client's data may be tampered by unauthorized entities, or sometimes by the cloud service provider, intentionally or accidentally. Proposed approaches for data integrity verification fall under two broad categories, first which makes use of Trusted Third Party Auditor (TTPA) and other which does not exercise TTPA. In this work, we make an exhaustive review of several recently proposed schemes which utilize TTPA.
{"title":"A Review of Approaches to Achieve Data Storage Correctness in Cloud Computing Using Trusted Third Party Auditor","authors":"H. Patel, D. Patel","doi":"10.1109/ISCOS.2012.39","DOIUrl":"https://doi.org/10.1109/ISCOS.2012.39","url":null,"abstract":"Built on the fundamental concepts of grid, cluster & distributed computing and following the evolution from mainframe computers to client/server models, Cloud computing is a novel paradigm where computing resources are provisioned on demand. By outsourcing computing and storage requirements to Cloud, user enjoys numerous benefits, such as cost saving through pay for you use model, flexibility & scalability, to name a few. But, as the data stored on the cloud is not under the direct possession of the user, many new security challenges are to be addressed. Data integrity issue is one of them where client's data may be tampered by unauthorized entities, or sometimes by the cloud service provider, intentionally or accidentally. Proposed approaches for data integrity verification fall under two broad categories, first which makes use of Trusted Third Party Auditor (TTPA) and other which does not exercise TTPA. In this work, we make an exhaustive review of several recently proposed schemes which utilize TTPA.","PeriodicalId":138078,"journal":{"name":"2012 International Symposium on Cloud and Services Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130178306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}