SlideShare a Scribd company logo
1 of 30
Global Academy Of Technology
Department of CSE
10CS85 - A Decentralized Cloud Firewall
Framework with Resources Provisioning
Cost Optimization
GUIDE – Dr. LATHA C A ALOK KUMAR(1GA12CS007)
Professor G. AISHWARYA(1GA12CS024)
GAURAV KUMAR MISHRA(1GA12CS025)
KULKARNI KEDAR RAVINDRA(1GA12CS042)
Index
• Objective
• Introduction
• Proposed System
• Architecture
• System requirement
• System Design
• Implementation
• Testing
• Conclusion
• Bibliography
2
Objective
• To optimize resources provisioning cost, while satisfying QoS
requirement at the same time.
• To establish a firewall to protect the cloud resources from the
attacks.
Introduction
• Cloud computing is a new flexible approach for providing higher
computational power in shared medium.
• It provides the distributed model based on self-evaluating techniques to
improve the processing capabilities of the system with lesser managerial
concerns.
• It is made up of client, application, platform, servers and infrastructures.
• we propose a decentralized cloud firewall framework.
• Firewalls are the first line when defending against malicious traffic.
• The cloud firewall is offered by Cloud Service Providers (CSP) and placed
at access points between cloud data center and the Internet.
Proposed System
• In proposed system, the system propose a decentralized cloud
firewall framework for individual cloud customers.
• We introduce novel queuing theory based model M/Geo/1 or
M/Geo/m for performance analysis of the proposed cloud
firewall.
• The system establish a mathematical model according to cloud
firewall rule matching discipline and derive that system
service times follow geometric distribution.
ADVANTAGES
• Resources are dynamically allocated to optimize the
provisioning cost, and guarantee QoS requirement specified by
customers at the same time.
• The simulation results claim that geometric distribution is
more suitable for firewall system modeling.
• It give a deep insight into tradeoff among optimal resources
provisioning cost.
• The system formulate the resources provisioning cost.
Architecture
System Requirements
SOFTWARE REQUIREMENTS:
• O/S : Windows XP / 7 / 8
• Language : Java.
• IDE : Eclipse
• Data Base : MySql
System Requirements
HARDWARE REQUIREMENTS:
• System : Pentium IV 2.4 GHz and above
• Hard Disk : 160 GB
• Monitor : 15 VGA color
• Mouse : Standard mouse
• Keyboard : 110 keys enhanced
• Ram : 2GB
Activity Diagram
System Design
Use Case Diagram
Implementation
Cloud Gateway
• In general computer usage, login is the procedure used to get access to an
operating system or application,
• The user ID can be freely known and is visible when entered at a keyboard
or other input device.
• The password must be kept secret (and is not displayed as it is entered).
• The Users and admin has login using this panel If the client is a user, they
go users further more Action, if the person is admin.
• They go the Admin login panel for proceed their Action
Implementation
• Cloud Gateway
Implementation
Registration and Login User
• If new User need the Cloud Service.
• That users should register in site to use our service , registered users can
then enter the site by logging on.
• Who’s doesn’t have register in cloud they doesn’t use the cloud
services. And their request has denied from the cloud Server.
Implementation
• Registration and Login User
Implementation
Admin Cloud Control System
• System Admin Monitor the user s Action register user action if
untrusted means, their permission’s are denied, that user id has removed
from server.
• Control the user Action.
• If user request the firewall. System admin has provide firewall for
secure cloud service.
• So they monitor Firewall cloud user and all users.
Implementation
• Admin Cloud Control System
Implementation
Activate Firewall Authentication
• If the User need Cloud Storage , they should have Firewall.
• Because maximum of the user request has DDOS or Edos attack or Botnet
signature in their file.
• This virus signature File affect the cloud service in server level. And total it
collapse the and attack is launch in server level.
• To Avoid these Attacks and prevent the cloud by way the Activate firewall.
• So here the user id and password we Request the firewall to the System admin.
Admin has Activate the Firewall for request User’s and proceed the cloud Storage.
Implementation
• Activate Firewall Authentication
Implementation
File Transfer in Real Cloud
• The User enter The Cloud storage Service using Their Cloud Id and
Password.
• But The User Store their Detail in real Cloud They must have Activate
Firewall.
• After Verify The Firewall Id And Then we upload The Our files and Data
in Real Cloud.
• The Users Doesn’t have Firewall Activation their Cloud service Has
Denied.
• Because The file Maybe attached in Virus signature.
Implementation
• File Transfer in Real Cloud
Testing
• Test Case ID: 2
• Description: Manual Testing on User Registration
• Modules: Registration and Login User
• Prepared By: Gaurav Kumar Mishra
• Date Prepared: 26/04/2016
• Reviewed / Updated: G. Aishwarya
• Date Reviewed: 27/04/2016
• Tested By: Kedar Ravindra Kulkarni
• Date Tested: 27/04/2016
• Step Description: If new User, Registration should be done
• Expected Results: User should enter all his/her details and
successfully register. Once registration is done, one new row should be
created in user table.
• Actual Result: Pass
Testing Result
Testing Result
Testing
• Test Case ID:10
• Description: Manual Testing on User Login Module
• Modules: Registration and Login User
• Prepared By: Gaurav Kumar Mishra
• Date Prepared: 26/04/2016
• Reviewed / Updated: Kedar Ravindra Kulkarni, Alok Kumar
• Date Reviewed: 27/04/2016
• Tested By: Alok Kumar
• Date Tested: 27/04/2016
• Step Description: Admin view the user details
• Expected Results: Admin should be able to view the user details and
firewall details.
• Actual Result: Pass
Testing Result
Conclusion
• We propose a Cloud Trust framework, where several firewall
running in parallel to guarantee QoS requirement.
• As resources are dynamically allocated in Cloud Trust, we
investigate how to optimize the resources provisioning cost.
• We establish novel queuing theory based model for
performance analysis of the proposed Cloud Trust, where
firewall service times are modeled to follow geometric
distribution.
• Extensive simulations confirm that M/Geo/1 reflects the
Cloud Trust real system better than traditional Model.
Bibliography
• Z. Xiao and Y. Xiao, “Security and privacy in cloud computing,”IEEE Commun.
Surveys Tuts., vol. 15, no. 2, pp. 843–859, May 2013.
• C. Hoff. (2008). Cloud computing security: From ddos attack (dis-tributed denial
of servie) to edos (economic denial of sustainabil-ity) [Online]. Available:
http://www.rationalsurvivability.com/blog/?p=66.
• T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, “Hey, you, get off of my
cloud: Exploring information leakage in third-party compute clouds,” in Proc. 16th
ACM Conf. Comput. Commun. Secu-rity , 2009, pp. 199–212.
• K. Salah, K. Elbadawi, and R. Boutaba, “Performance modeling and analysis of
network firewalls,” IEEE Trans. Netw. Serv. Man-age. , vol. 9, no. 1, pp. 12–21,
Mar. 2012
Bibliography
• Z. Xiao and Y. Xiao, “Security and privacy in cloud computing,”IEEE Commun.
Surveys Tuts., vol. 15, no. 2, pp. 843–859, May 2013.
• C. Hoff. (2008). Cloud computing security: From ddos attack (dis-tributed denial
of servie) to edos (economic denial of sustainabil-ity) [Online]. Available:
http://www.rationalsurvivability.com/blog/?p=66.
• T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, “Hey, you, get off of my
cloud: Exploring information leakage in third-party compute clouds,” in Proc. 16th
ACM Conf. Comput. Commun. Secu-rity , 2009, pp. 199–212.
• K. Salah, K. Elbadawi, and R. Boutaba, “Performance modeling and analysis of
network firewalls,” IEEE Trans. Netw. Serv. Man-age. , vol. 9, no. 1, pp. 12–21,
Mar. 2012

More Related Content

What's hot

IRJET- Framework for Dynamic Resource Allocation and Scheduling for Cloud
IRJET- Framework for Dynamic Resource Allocation and Scheduling for CloudIRJET- Framework for Dynamic Resource Allocation and Scheduling for Cloud
IRJET- Framework for Dynamic Resource Allocation and Scheduling for CloudIRJET Journal
 
Maintaining Data Integrity for Shared Data in Cloud
Maintaining Data Integrity for Shared Data in Cloud Maintaining Data Integrity for Shared Data in Cloud
Maintaining Data Integrity for Shared Data in Cloud IJERA Editor
 
Ensuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloudEnsuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloudSathya Moorthy
 
Secure Data Storage and Forwarding in Cloud Using AES and HMAC
Secure Data Storage and Forwarding in Cloud Using AES and HMACSecure Data Storage and Forwarding in Cloud Using AES and HMAC
Secure Data Storage and Forwarding in Cloud Using AES and HMACIRJET Journal
 
Ensuring Distributed Accountability for Data Sharing in the Cloud
Ensuring Distributed Accountability for Data Sharing in the CloudEnsuring Distributed Accountability for Data Sharing in the Cloud
Ensuring Distributed Accountability for Data Sharing in the CloudSwapnil Salunke
 
Ensuring Distributed Accountability in the Cloud
Ensuring Distributed Accountability in the CloudEnsuring Distributed Accountability in the Cloud
Ensuring Distributed Accountability in the CloudSuraj Mehta
 
Ensuring distributed accountability
Ensuring distributed accountabilityEnsuring distributed accountability
Ensuring distributed accountabilitySunkaraHariNarayana
 
Analysis of quality of service in cloud storage systems
Analysis of quality of service in cloud storage systemsAnalysis of quality of service in cloud storage systems
Analysis of quality of service in cloud storage systemsijfcstjournal
 
Authorized Duplicate Check Scheme
Authorized Duplicate Check SchemeAuthorized Duplicate Check Scheme
Authorized Duplicate Check SchemeIRJET Journal
 
Data sharing with accountability in cloud
Data sharing with accountability in cloudData sharing with accountability in cloud
Data sharing with accountability in cloudSusheenthiran Sujith
 
200308 Active Directory Security
200308 Active Directory Security200308 Active Directory Security
200308 Active Directory SecurityArmando Leon
 
Oruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloudOruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloudNexgen Technology
 
CS8791 Cloud Computing - Question Bank
CS8791 Cloud Computing - Question BankCS8791 Cloud Computing - Question Bank
CS8791 Cloud Computing - Question Bankpkaviya
 
Distributed system
Distributed systemDistributed system
Distributed systemchirag patil
 
An Analysis Of Cloud ReliabilityApproaches Based on Cloud Components And Reli...
An Analysis Of Cloud ReliabilityApproaches Based on Cloud Components And Reli...An Analysis Of Cloud ReliabilityApproaches Based on Cloud Components And Reli...
An Analysis Of Cloud ReliabilityApproaches Based on Cloud Components And Reli...ijafrc
 
Secure Access to Outsourced Databases
Secure Access to Outsourced DatabasesSecure Access to Outsourced Databases
Secure Access to Outsourced DatabasesIOSR Journals
 

What's hot (20)

IRJET- Framework for Dynamic Resource Allocation and Scheduling for Cloud
IRJET- Framework for Dynamic Resource Allocation and Scheduling for CloudIRJET- Framework for Dynamic Resource Allocation and Scheduling for Cloud
IRJET- Framework for Dynamic Resource Allocation and Scheduling for Cloud
 
Maintaining Data Integrity for Shared Data in Cloud
Maintaining Data Integrity for Shared Data in Cloud Maintaining Data Integrity for Shared Data in Cloud
Maintaining Data Integrity for Shared Data in Cloud
 
Ensuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloudEnsuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloud
 
Secure Data Storage and Forwarding in Cloud Using AES and HMAC
Secure Data Storage and Forwarding in Cloud Using AES and HMACSecure Data Storage and Forwarding in Cloud Using AES and HMAC
Secure Data Storage and Forwarding in Cloud Using AES and HMAC
 
Ensuring Distributed Accountability for Data Sharing in the Cloud
Ensuring Distributed Accountability for Data Sharing in the CloudEnsuring Distributed Accountability for Data Sharing in the Cloud
Ensuring Distributed Accountability for Data Sharing in the Cloud
 
Ensuring Distributed Accountability in the Cloud
Ensuring Distributed Accountability in the CloudEnsuring Distributed Accountability in the Cloud
Ensuring Distributed Accountability in the Cloud
 
Ensuring distributed accountability
Ensuring distributed accountabilityEnsuring distributed accountability
Ensuring distributed accountability
 
Analysis of quality of service in cloud storage systems
Analysis of quality of service in cloud storage systemsAnalysis of quality of service in cloud storage systems
Analysis of quality of service in cloud storage systems
 
Authorized Duplicate Check Scheme
Authorized Duplicate Check SchemeAuthorized Duplicate Check Scheme
Authorized Duplicate Check Scheme
 
Data sharing with accountability in cloud
Data sharing with accountability in cloudData sharing with accountability in cloud
Data sharing with accountability in cloud
 
Azure security
Azure  securityAzure  security
Azure security
 
Oruta
OrutaOruta
Oruta
 
Final review presentation
Final review presentationFinal review presentation
Final review presentation
 
200308 Active Directory Security
200308 Active Directory Security200308 Active Directory Security
200308 Active Directory Security
 
Oruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloudOruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloud
 
CS8791 Cloud Computing - Question Bank
CS8791 Cloud Computing - Question BankCS8791 Cloud Computing - Question Bank
CS8791 Cloud Computing - Question Bank
 
Distributed system
Distributed systemDistributed system
Distributed system
 
I017554954
I017554954I017554954
I017554954
 
An Analysis Of Cloud ReliabilityApproaches Based on Cloud Components And Reli...
An Analysis Of Cloud ReliabilityApproaches Based on Cloud Components And Reli...An Analysis Of Cloud ReliabilityApproaches Based on Cloud Components And Reli...
An Analysis Of Cloud ReliabilityApproaches Based on Cloud Components And Reli...
 
Secure Access to Outsourced Databases
Secure Access to Outsourced DatabasesSecure Access to Outsourced Databases
Secure Access to Outsourced Databases
 

Viewers also liked

Key aggregate cryptosystem for scalable data sharing in cloud
Key aggregate cryptosystem for scalable data sharing in cloudKey aggregate cryptosystem for scalable data sharing in cloud
Key aggregate cryptosystem for scalable data sharing in cloudMeka Subramanyam
 
KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE) FOR GROUP DATA SHARING VIA CLOUD ...
 KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE) FOR GROUP DATA SHARING VIA CLOUD ... KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE) FOR GROUP DATA SHARING VIA CLOUD ...
KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE) FOR GROUP DATA SHARING VIA CLOUD ...Nexgen Technology
 
IEEE 2015-2016-NETWORKING PROJECTS, CLOUD COMPUTING PROJECTS, NETWORK SECURIT...
IEEE 2015-2016-NETWORKING PROJECTS, CLOUD COMPUTING PROJECTS, NETWORK SECURIT...IEEE 2015-2016-NETWORKING PROJECTS, CLOUD COMPUTING PROJECTS, NETWORK SECURIT...
IEEE 2015-2016-NETWORKING PROJECTS, CLOUD COMPUTING PROJECTS, NETWORK SECURIT...Irissolution
 
Optimization of Resource Provisioning Cost in Cloud Computing
Optimization of Resource Provisioning Cost in Cloud ComputingOptimization of Resource Provisioning Cost in Cloud Computing
Optimization of Resource Provisioning Cost in Cloud ComputingAswin Kalarickal
 
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUDKEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUDNaseem nisar
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...CloudTechnologies
 

Viewers also liked (6)

Key aggregate cryptosystem for scalable data sharing in cloud
Key aggregate cryptosystem for scalable data sharing in cloudKey aggregate cryptosystem for scalable data sharing in cloud
Key aggregate cryptosystem for scalable data sharing in cloud
 
KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE) FOR GROUP DATA SHARING VIA CLOUD ...
 KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE) FOR GROUP DATA SHARING VIA CLOUD ... KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE) FOR GROUP DATA SHARING VIA CLOUD ...
KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE) FOR GROUP DATA SHARING VIA CLOUD ...
 
IEEE 2015-2016-NETWORKING PROJECTS, CLOUD COMPUTING PROJECTS, NETWORK SECURIT...
IEEE 2015-2016-NETWORKING PROJECTS, CLOUD COMPUTING PROJECTS, NETWORK SECURIT...IEEE 2015-2016-NETWORKING PROJECTS, CLOUD COMPUTING PROJECTS, NETWORK SECURIT...
IEEE 2015-2016-NETWORKING PROJECTS, CLOUD COMPUTING PROJECTS, NETWORK SECURIT...
 
Optimization of Resource Provisioning Cost in Cloud Computing
Optimization of Resource Provisioning Cost in Cloud ComputingOptimization of Resource Provisioning Cost in Cloud Computing
Optimization of Resource Provisioning Cost in Cloud Computing
 
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUDKEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
 

Similar to Decentralized cloud firewall framework with resources provisioning cost optimization

Cloud computing-security-from-single-to-multiple-140211071429-phpapp01
Cloud computing-security-from-single-to-multiple-140211071429-phpapp01Cloud computing-security-from-single-to-multiple-140211071429-phpapp01
Cloud computing-security-from-single-to-multiple-140211071429-phpapp01Shivananda Rai
 
Associated IoT Technologies.pptx
Associated IoT Technologies.pptxAssociated IoT Technologies.pptx
Associated IoT Technologies.pptxtaruian
 
Cloud Computing & Business Intelligence
Cloud Computing & Business IntelligenceCloud Computing & Business Intelligence
Cloud Computing & Business IntelligenceSudip Chatterjee
 
Unit-I Introduction to Cloud Computing.pptx
Unit-I Introduction to Cloud Computing.pptxUnit-I Introduction to Cloud Computing.pptx
Unit-I Introduction to Cloud Computing.pptxgarkhot123
 
Cloud computing and data security
Cloud computing and data securityCloud computing and data security
Cloud computing and data securityMohammed Fazuluddin
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing securitymaheralgamdi
 
CLOUD COMPUTING.ppt
CLOUD COMPUTING.pptCLOUD COMPUTING.ppt
CLOUD COMPUTING.pptDss
 
Integrity for join queries
Integrity for join queriesIntegrity for join queries
Integrity for join queriesPapitha Velumani
 
Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud Girish Chandra
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Akash Mahajan
 
Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentInsuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentEditor IJCATR
 
cloudintro-lec018.1.ppt
cloudintro-lec018.1.pptcloudintro-lec018.1.ppt
cloudintro-lec018.1.pptgunvinit931
 
An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...
An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...
An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...cscpconf
 
Cloud and Virtualization Security
Cloud and Virtualization SecurityCloud and Virtualization Security
Cloud and Virtualization SecurityRubal Sagwal
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud ComputingFalgun Rathod
 
Chapeter 2 introduction to cloud computing
Chapeter 2   introduction to cloud computingChapeter 2   introduction to cloud computing
Chapeter 2 introduction to cloud computingeShikshak
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storageShakas Technologies
 

Similar to Decentralized cloud firewall framework with resources provisioning cost optimization (20)

Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing-security-from-single-to-multiple-140211071429-phpapp01
Cloud computing-security-from-single-to-multiple-140211071429-phpapp01Cloud computing-security-from-single-to-multiple-140211071429-phpapp01
Cloud computing-security-from-single-to-multiple-140211071429-phpapp01
 
Brad stack - Digital Health and Well-Being Festival
Brad stack - Digital Health and Well-Being Festival Brad stack - Digital Health and Well-Being Festival
Brad stack - Digital Health and Well-Being Festival
 
Associated IoT Technologies.pptx
Associated IoT Technologies.pptxAssociated IoT Technologies.pptx
Associated IoT Technologies.pptx
 
Cloud Computing & Business Intelligence
Cloud Computing & Business IntelligenceCloud Computing & Business Intelligence
Cloud Computing & Business Intelligence
 
Unit-I Introduction to Cloud Computing.pptx
Unit-I Introduction to Cloud Computing.pptxUnit-I Introduction to Cloud Computing.pptx
Unit-I Introduction to Cloud Computing.pptx
 
Cloud computing and data security
Cloud computing and data securityCloud computing and data security
Cloud computing and data security
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 
CLOUD COMPUTING.ppt
CLOUD COMPUTING.pptCLOUD COMPUTING.ppt
CLOUD COMPUTING.ppt
 
Integrity for join queries
Integrity for join queriesIntegrity for join queries
Integrity for join queries
 
Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014
 
Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentInsuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud Environment
 
cloudintro-lec018.1.ppt
cloudintro-lec018.1.pptcloudintro-lec018.1.ppt
cloudintro-lec018.1.ppt
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...
An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...
An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...
 
Cloud and Virtualization Security
Cloud and Virtualization SecurityCloud and Virtualization Security
Cloud and Virtualization Security
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 
Chapeter 2 introduction to cloud computing
Chapeter 2   introduction to cloud computingChapeter 2   introduction to cloud computing
Chapeter 2 introduction to cloud computing
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storage
 

Recently uploaded

VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...SUHANI PANDEY
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Standamitlee9823
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringmulugeta48
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfRagavanV2
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLManishPatel169454
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 

Recently uploaded (20)

VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 

Decentralized cloud firewall framework with resources provisioning cost optimization

  • 1. Global Academy Of Technology Department of CSE 10CS85 - A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Optimization GUIDE – Dr. LATHA C A ALOK KUMAR(1GA12CS007) Professor G. AISHWARYA(1GA12CS024) GAURAV KUMAR MISHRA(1GA12CS025) KULKARNI KEDAR RAVINDRA(1GA12CS042)
  • 2. Index • Objective • Introduction • Proposed System • Architecture • System requirement • System Design • Implementation • Testing • Conclusion • Bibliography 2
  • 3. Objective • To optimize resources provisioning cost, while satisfying QoS requirement at the same time. • To establish a firewall to protect the cloud resources from the attacks.
  • 4. Introduction • Cloud computing is a new flexible approach for providing higher computational power in shared medium. • It provides the distributed model based on self-evaluating techniques to improve the processing capabilities of the system with lesser managerial concerns. • It is made up of client, application, platform, servers and infrastructures. • we propose a decentralized cloud firewall framework. • Firewalls are the first line when defending against malicious traffic. • The cloud firewall is offered by Cloud Service Providers (CSP) and placed at access points between cloud data center and the Internet.
  • 5. Proposed System • In proposed system, the system propose a decentralized cloud firewall framework for individual cloud customers. • We introduce novel queuing theory based model M/Geo/1 or M/Geo/m for performance analysis of the proposed cloud firewall. • The system establish a mathematical model according to cloud firewall rule matching discipline and derive that system service times follow geometric distribution.
  • 6. ADVANTAGES • Resources are dynamically allocated to optimize the provisioning cost, and guarantee QoS requirement specified by customers at the same time. • The simulation results claim that geometric distribution is more suitable for firewall system modeling. • It give a deep insight into tradeoff among optimal resources provisioning cost. • The system formulate the resources provisioning cost.
  • 8. System Requirements SOFTWARE REQUIREMENTS: • O/S : Windows XP / 7 / 8 • Language : Java. • IDE : Eclipse • Data Base : MySql
  • 9. System Requirements HARDWARE REQUIREMENTS: • System : Pentium IV 2.4 GHz and above • Hard Disk : 160 GB • Monitor : 15 VGA color • Mouse : Standard mouse • Keyboard : 110 keys enhanced • Ram : 2GB
  • 13. Implementation Cloud Gateway • In general computer usage, login is the procedure used to get access to an operating system or application, • The user ID can be freely known and is visible when entered at a keyboard or other input device. • The password must be kept secret (and is not displayed as it is entered). • The Users and admin has login using this panel If the client is a user, they go users further more Action, if the person is admin. • They go the Admin login panel for proceed their Action
  • 15. Implementation Registration and Login User • If new User need the Cloud Service. • That users should register in site to use our service , registered users can then enter the site by logging on. • Who’s doesn’t have register in cloud they doesn’t use the cloud services. And their request has denied from the cloud Server.
  • 17. Implementation Admin Cloud Control System • System Admin Monitor the user s Action register user action if untrusted means, their permission’s are denied, that user id has removed from server. • Control the user Action. • If user request the firewall. System admin has provide firewall for secure cloud service. • So they monitor Firewall cloud user and all users.
  • 19. Implementation Activate Firewall Authentication • If the User need Cloud Storage , they should have Firewall. • Because maximum of the user request has DDOS or Edos attack or Botnet signature in their file. • This virus signature File affect the cloud service in server level. And total it collapse the and attack is launch in server level. • To Avoid these Attacks and prevent the cloud by way the Activate firewall. • So here the user id and password we Request the firewall to the System admin. Admin has Activate the Firewall for request User’s and proceed the cloud Storage.
  • 21. Implementation File Transfer in Real Cloud • The User enter The Cloud storage Service using Their Cloud Id and Password. • But The User Store their Detail in real Cloud They must have Activate Firewall. • After Verify The Firewall Id And Then we upload The Our files and Data in Real Cloud. • The Users Doesn’t have Firewall Activation their Cloud service Has Denied. • Because The file Maybe attached in Virus signature.
  • 23. Testing • Test Case ID: 2 • Description: Manual Testing on User Registration • Modules: Registration and Login User • Prepared By: Gaurav Kumar Mishra • Date Prepared: 26/04/2016 • Reviewed / Updated: G. Aishwarya • Date Reviewed: 27/04/2016 • Tested By: Kedar Ravindra Kulkarni • Date Tested: 27/04/2016 • Step Description: If new User, Registration should be done • Expected Results: User should enter all his/her details and successfully register. Once registration is done, one new row should be created in user table. • Actual Result: Pass
  • 26. Testing • Test Case ID:10 • Description: Manual Testing on User Login Module • Modules: Registration and Login User • Prepared By: Gaurav Kumar Mishra • Date Prepared: 26/04/2016 • Reviewed / Updated: Kedar Ravindra Kulkarni, Alok Kumar • Date Reviewed: 27/04/2016 • Tested By: Alok Kumar • Date Tested: 27/04/2016 • Step Description: Admin view the user details • Expected Results: Admin should be able to view the user details and firewall details. • Actual Result: Pass
  • 28. Conclusion • We propose a Cloud Trust framework, where several firewall running in parallel to guarantee QoS requirement. • As resources are dynamically allocated in Cloud Trust, we investigate how to optimize the resources provisioning cost. • We establish novel queuing theory based model for performance analysis of the proposed Cloud Trust, where firewall service times are modeled to follow geometric distribution. • Extensive simulations confirm that M/Geo/1 reflects the Cloud Trust real system better than traditional Model.
  • 29. Bibliography • Z. Xiao and Y. Xiao, “Security and privacy in cloud computing,”IEEE Commun. Surveys Tuts., vol. 15, no. 2, pp. 843–859, May 2013. • C. Hoff. (2008). Cloud computing security: From ddos attack (dis-tributed denial of servie) to edos (economic denial of sustainabil-ity) [Online]. Available: http://www.rationalsurvivability.com/blog/?p=66. • T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, “Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds,” in Proc. 16th ACM Conf. Comput. Commun. Secu-rity , 2009, pp. 199–212. • K. Salah, K. Elbadawi, and R. Boutaba, “Performance modeling and analysis of network firewalls,” IEEE Trans. Netw. Serv. Man-age. , vol. 9, no. 1, pp. 12–21, Mar. 2012
  • 30. Bibliography • Z. Xiao and Y. Xiao, “Security and privacy in cloud computing,”IEEE Commun. Surveys Tuts., vol. 15, no. 2, pp. 843–859, May 2013. • C. Hoff. (2008). Cloud computing security: From ddos attack (dis-tributed denial of servie) to edos (economic denial of sustainabil-ity) [Online]. Available: http://www.rationalsurvivability.com/blog/?p=66. • T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, “Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds,” in Proc. 16th ACM Conf. Comput. Commun. Secu-rity , 2009, pp. 199–212. • K. Salah, K. Elbadawi, and R. Boutaba, “Performance modeling and analysis of network firewalls,” IEEE Trans. Netw. Serv. Man-age. , vol. 9, no. 1, pp. 12–21, Mar. 2012