Cloud computing security policy framework for mitigating denial of service attack

677 views

Published on

It's all in the title.

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
677
On SlideShare
0
From Embeds
0
Number of Embeds
4
Actions
Shares
0
Downloads
44
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Cloud computing security policy framework for mitigating denial of service attack

  1. 1. Cloud Controller Security Policy Framework for Mitigating Denial of Service Attack Authors : Manjunath S N.S. Anup Bharadwaj Venkatesh Prabhu K Muneshwara M.S Department of CSE BMS Institute of Technology
  2. 2. Buzz of “Cloud Computing”
  3. 3. Computational Approach
  4. 4. Why Cloud Computing…!
  5. 5. Three main Features of Cloud Computing  Elastic  Economies of Scale  Pay as You Go
  6. 6. Security Issues in Cloud Computing
  7. 7. Flooding  Sending huge amount of non-sense requests to server
  8. 8. Crawling  Impersonate an authorized user
  9. 9. DoS Attack…
  10. 10. Step Towards The SolutionSecurity Management Framework
  11. 11. Objectives of Proposed System  To provide high-level security mechanisms  Detecting malicious access in Cloud Storage Systems  Implementing Security Management Framework
  12. 12. Proposed System  Cloud controller  Clients  Virtual machine  Cloud Infrastructure  Malicious process
  13. 13. Requirements  Software requirements  OS : Windows XP/Vista  Java, Sql, Servelets  Hardware requirements  Intel Pentium III Processor  LAN / Internet Connection to Server machine  TCP / IP networking between clients and server
  14. 14. Process Flow Diagram
  15. 15. Hardware Design
  16. 16. Software Design Portability Integrity Extensibility
  17. 17. System Implementation  Implementation requirements.  Selection of the platform (Operating System).  Selection of the programming language for development of the application.  Coding guideline to be followed.
  18. 18. Applications  Cloud Storage for Video Surveillance
  19. 19. Applications  Storing Medical Records in The Cloud
  20. 20.  High level security mechanisms for cloud storage services.  Detecting the malicious access in cloud storage systems.  Experimentation is economical.  Scaling is quick.  Provides security against DOS attacks.  The cloud resources are too expensive.  The installation process takes more time.  If the virtual machine goes down, entire system will shutdown.
  21. 21.  Security for data access management is achieved by mitigating denial of service attack incorporating Security policies on cloud.  We address this security problem in the proposed System by using cloud controller in a virtual machine where the data access management is controlled by blocking illegal data access on cloud.
  22. 22.  Detection of various types of Attacks  The limitations of our Security Management framework, with respect to the accuracy of the detection  Develop the Trust Management component of the security management framework  Study the impact management framework has on the Policy

×