V02i05 516

Page 1

ISSN 2394-3777 (Print) ISSN 2394-3785 (Online) Available online at www.ijartet.com International Journal of Advanced Research Trends in Engineering and Technology (IJARTET) Vol. 2, Issue 5, May 2015

Policy Based Authorization in Cloud System Possible For Trusted Transaction Enforcement T.Rajalakshmi1, Mr.D.Stanley2 Student, Department of Computer Applications, Francis Xavier Engineering College, Tirunelveli, Tamilnadu, India 1 Asst.Prof, Department of Computer Applications, Francis Xavier Engineering College, Tirunelveli, Tamilnadu, India 2 Abstract: The Cloud Computing provides an economical and efficient solution for sharing group resource among cloud user. Unfortunately sharing data in multi owner manner while preserving data and identity privacy from an untreated cloud is still a challenging issue, due to the frequent change of the membership. The distributed transactional database systems deployed over cloud servers, entities cooperate to form proofs of authorizations that are justified by collections of certified credentials. These proofs and credentials may be evaluated and collected over extended time periods under the risk of having the underlying authorization policies or the user credentials being in inconsistent states. It becomes possible for policy-based authorization systems to make unsafe decisions that might threaten sensitive resources. In this paper, it defines the notion of trusted transactions when dealing with proofs of authorization and a secure multi owner data sharing scheme for dynamic groups in the cloud. By increasing the levels of policy consistency constraints, and present different enforcement approaches to guarantee the trustworthiness of transactions executing on cloud servers. The Two-Phase Validation Commit protocol is the solution; it is a modified version of the basic Two-Phase Validation protocols. It finally analyze the different approaches presented using both analytical evaluation of the overheads and simulations to guide the decision makers to which approach to use. Keywords: 2PVC, PVC, CSP, ACID I. INTRODUCTION The Cloud computing is recognized as an alternative to traditional information technology due to its intrinsic resource-sharing and low-maintenance characteristics. In cloud computing, the cloud service providers (CSPs), such as Amazon, are able to deliver various services to cloud users with the help of powerful datacenters. One of the most fundamental services offered by cloud providers is data storage. If the master moves a 2PVC from one 2PVC server to another, the source 2PVC server first does a minor compaction on that 2PVC. This compaction reduces recovery time by reducing the amount of uncompacted state in the 2PVC server’s commit log. After finishing this compaction, the 2PVC server stops serving the 2PVC. Before it actually unloads the 2PVC, the 2PVC server does another minor compaction to eliminate any remaining uncompacted state in the 2PVC server’s log that arrived while the first minor compaction was being performed. After this second minor compaction is complete, the 2PVC can be loaded on another 2PVC server without requiring any recovery of log entries. All process in 2PVC get recorded for the security purposes.

The performance does not increase linearly. For most benchmarks, there is a significant drop in per-server throughput when going from 1 to 50 agents. This drop is caused by imbalance in load in multiple server configurations, often due to other processes. • It formalizes the concept of trusted transaction. Trusted transaction means the transaction must be a safe transaction. • While transferring the data it must satisfy the ACID property. • It defines several different levels of policy consistency constraints and corresponding enforcement approaches that guarantee the trustworthiness of transactions executing on cloud servers. • A Two-Phase Validation Commit (2PVC) protocol that ensures that a transaction is safe by checking policy, credential, and data consistency during transaction execution. • SHA algorithm also used for trusted transaction along with 2PVC.

All Rights Reserved © 2015 IJARTET

7


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.