SlideShare a Scribd company logo
TECHNICAL SEMINAR REPORT
                         ON
SECURITY ISSUES FOR CLOUD COMPUTING



                      Presented by
                       E.PUSHPA




  PRIYADARSHINI COLLEGE OF ENGINEERING &
               TECHNOLOGY
 [Affiliated to Jawaharlal Nehru technological university,
                       Ananthapur]
                  Kanupartipadu, Nellore-524004
                          2012-2013
Overview
1. Introduction
2. Security Issues
3. Third Party Secure Data Publication Applied to
   CLOUD
4. Encrypted Data Storage for Cloud
5. Secure Query Processing with Hadoop
    5.1 Overview of Hadoop
    5.2 Inadequacies of Hadoop
         i)No facility to handle encrypted
         sensitive
         ii)Semantic Web Data Management
iii)No fine-grained access control
     iv)No strong authentication
  5.3 System Design
     i)Jena
    ii)Pellet
   iii)Pig Latin
   iv)Mahout, Hama
   v)Pre-processing

        5.3.3 Query Execution and Optimization

 5.4 Integrate SUN XACML Implementation into HDFS
  5.5 Strong Authentication
6. Conclusion
7. References
ABSTRACT

   We discuss security issues for cloud computing and
    present a layered framework for secure clouds and
    then focus on two of the layers, i.e., the storage
    layer and the data layer.
   we discuss a scheme for secure third party
    publications of documents in a cloud. Next, we will
    converse secure federated query processing with
    map Reduce and Hadoop, and discuss the use of
    secure co-processors for cloud computing.
    Finally, the we discuss XACML implementation for
    Hadoop and discuss their beliefs that building
    trusted applications from untrusted components
    will be a major aspect of secure cloud computing.
INTRODUCTION

There is a critical need to securely store,
manage,share and analyze massive amounts of
complex data to determine patterns and trends
 Because of the critical nature of the
applications, it is important that clouds be secure

Google has now introduced the MapReduce
framework for processing large amounts of data on
commodity hardware

Apache’s Hadoop distributed file system
(HDFS) is emerging as a superior software
component for cloud computing combined with
integrated parts such as MapReduce
Due to the extensive complexity of the
cloud, we contend that it will be difficult to
provide a holistic solution to securing the
cloud

Our cloud system will:
(a)support efficient storageof encrypted sensitive
   data,
(b) store, manage and query massive amounts of
   data,
(c) support fine-grained access control and
(d) support strong authentication
2.SECURITY ISSUES

 There are numerous security issues for cloud
computing as it encompasses many technologies
including networks, databases, operating systems
Data security involves encrypting the data as
well as ensuring that appropriate policies are
enforced for data sharing

We describe ways of efficiently storing the data
in foreign machines

Querying encrypted data, as much of the data on
the cloud may be encrypted
Data mining techniques may be applicable to
malware detection in clouds

 We are using Hadoop distributed file system for
virtualization at the storage level and applying security
for Hadoop which includes an XACML implementation

 Resource allocation and memory management
algorithms


We are investigating secure federated query
processing on clouds over Hadoop
3.THIRD PARTY SECURE DATAPUBLICATION
             APPLIED TO CLOUD

►We have developed techniques for third party publication
of data in a secure manner

►security policy is specified depending on user roles and
credentials


Figure : Access control framework
►Users must possess the credentials to access XML
documents
►For example, a professor has access to all of the details of
students while a secretary only has access to administrative
information

►If access is granted to the root, it does not necessarily
mean access is granted to all the children

►When the subject requests a document, the publisher
will apply the policies relevant to the subject and give
portions of the documents to the subject.

►Owner will encrypt various combinations of documents
and policies with his/her private key
►Using Merkle signature and the encryption techniques,
the subject can verify the authenticity and completeness
of the document

►In the cloud environment,
the third party publisher is the
machine that stored the
sensitive data in the cloud
4.ENCRYPTED DATA
        STORAGE FOR CLOUD

►Data in the cloud will be placed anywhere

►We are using secure co-processor as part of the cloud
infrastructure to enable efficient encrypted storage of
sensitive data.

► Open Cirrus provides limited access based on their
economic model

►Open Cirrus doesnot provide the hardware support
we need (e.g., secure co-processors).
►By embedding a secure co-processor (SCP)into the cloud
infrastructure, the system can handle encrypted data
efficiently

►SCP is a tamper resistant hardware capable of limited
general-purpose computation

►Secure coprocessor is tamper-resistant, one could be
tempted to run the entire sensitive data storage server on
the secure coprocessor.

►Due to the tamper-resistant shell, secure co-processors
have usually limited memory .
►Another issue is that the software running on the SCP
must be totally trusted and verified

►Framework will facilitate
(a)secure data storage and
(b) assured information
sharing

►We have conducted
research on querying
encrypted data as well as
secure multipart
computation (SMC)

►One drawback of SMC is the high computation costs
5.SECURE QUERY PROCESSING
              WITH HADOOP
                  5.1 Overview of Hadoop

A major part of our system is HDFS which is a
distributed Java-based file system with the capacity to
handle a large number of nodes storing petabytes of data

HDFS architecture
is based on the
Master- Slave
approach
5.3 SYSTEM DESIGN

We are using several software tools that are available
to help us in the process
i)Jena: Jena is a framework which is widely used
for solving SPARQL queries over RDF data
ii)Pellet: We use Pellet to reason at various stages.
We do real-time query reasoning using pellet libraries
(Pellet) coupled with Hadoop’s map-reduce functionalities

iii)Pig Latin: Pig Latin is a scripting language which
runs on top of Hadoop.
 It comes with many built-in functions, but we can also
 create our own user-defined functions to do special-
 purpose processing.

iv)Mahout, Hama: These are open source data mining
and machine learning packages that already augment
Hadoop.
    Our approach consists of processing SPARQL queries
securely over Hadoop. SPARQL is a query language used to
query RDF data


v)Pre-processing: Generally, RDF data is in XML format
In order to execute a SPARQL query, we propose some data
pre-processing steps and store the pre-processed data into
HDFS.
5.3.3 Query Execution and
                       Optimization

We are developing a SPARQL query execution and
optimization module for Hadoop.
As our storage strategy is based on predicate splits

First, we will look at the predicates present in the query.

 Second, rather than looking at all of the input files, we
will look at a subset of the input files that are matched with
predicates.

Third, SPARQL queries generally have many joins in them
and all of these joins may not be possible to perform in a
single Hadoop job.
5.4 Integrate SUN XACML
                  Implementation into HDFS

 Current Hadoop implementations enforce a very coarse-
grained access control policy that permits or denies a
principal access to essentially all system resources as a
group without distinguishing amongst resources.

 For example, users who are granted access to the
Namenode may execute any program on any client
machine, and all client machines have read and write
access to all files stored on all clients

 We are enforcing more flexible and fine-grained
access control policies on Hadoop by designing an In-
lined Reference Monitor implementation of Sun
XACML.
Untrusted processes in the framework access
securityrelevant resources by submitting a request to the
resource’s Policy Enforcement Point (PEP)

 PEP reformulates the
request as a policy query
and submits it to a
Policy Decision Point
(PDP)

IRM has advantage
that the policy can be
enforced without
modifying the
operating system
5.5 Strong Authentication

♦Open source community is actively working to integrate
kerberos protocols with hadoop

♦On top of the proposed Kerboros protocol, for some
assured information applications, there may be a need
for adding simple authentication protocols to
authenticate with secure co-processors

♦We can add a simple public key infrastructure to our
system so that users can independently authenticate with
secure coprocessors to retrieve secret keys used for
encrypting sensitive data
6.Conclusion

The main goal is to securely store and manage data that
is not controlled by the owner of the data


It will be difficult to achieve end-to-end security.
However, the challenge we have is to ensure more secure
operations even if some parts of the cloud fail


Building trust applications from untrusted components
will be a major aspect with respect to cloud security
7. References

W3C. (n.d.). SPARQL. Retrieved from http://www. w3.org/TR/rdf-sparql-query
Bertino, E. (2002). Access Control for XML Documents.
Data & Knowledge Engineering, 43(3).
Bertino, E. (2004).
Selective and Authentic Third Party Distribution of XML Documents. IEEE
Transactions on Knowledge and Data Engineering,
16(10). doi:10.1109/TKDE.2004.63
DeVries, B. W., Gupta, G., Hamlen, K. W., Moore, S.,
& Sridhar, M. (2009).
ActionScript Bytecode Verification
with Co-Logic Programming. In Proceedings
of the ACM SIGPLAN Workshop on Programming
Languages and Analysis for Security (PLAS).
Gates, F., Natkovich, O., Chopra, S., Kamath, S. M.,
THANK YOU

More Related Content

What's hot

Security Issues in Cloud Computing
Security Issues in Cloud ComputingSecurity Issues in Cloud Computing
Security Issues in Cloud Computing
Jyotika Pandey
 
Data Confidentiality in Cloud Computing
Data Confidentiality in Cloud ComputingData Confidentiality in Cloud Computing
Data Confidentiality in Cloud Computing
Ritesh Dwivedi
 
Cloud computing and data security
Cloud computing and data securityCloud computing and data security
Cloud computing and data security
Mohammed Fazuluddin
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environments
ijfcstjournal
 
Data storage security in cloud computing
Data storage security in cloud computingData storage security in cloud computing
Data storage security in cloud computing
Sonali Jain
 
Data security using rsa
Data security using rsaData security using rsa
Data security using rsa
LAKSHMI TEJA SAYABARAPU
 
Cloud Computing Security Organization Assessments Service Categories Responsi...
Cloud Computing Security Organization Assessments Service Categories Responsi...Cloud Computing Security Organization Assessments Service Categories Responsi...
Cloud Computing Security Organization Assessments Service Categories Responsi...
SlideTeam
 
On technical security issues in cloud computing
On technical security issues in cloud computingOn technical security issues in cloud computing
On technical security issues in cloud computing
sashi799
 
Cloud Security Issues 1.04.10
Cloud Security  Issues 1.04.10Cloud Security  Issues 1.04.10
Cloud Security Issues 1.04.10
Rugby7277
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
Dheeraj Negi
 
PhD Projects in Cloud Computing Security Research Topics
PhD Projects in Cloud Computing Security Research TopicsPhD Projects in Cloud Computing Security Research Topics
PhD Projects in Cloud Computing Security Research Topics
PhD Services
 
Ryan_Holt_MS_Thesis_Project_Presentation
Ryan_Holt_MS_Thesis_Project_PresentationRyan_Holt_MS_Thesis_Project_Presentation
Ryan_Holt_MS_Thesis_Project_PresentationRyan Holt
 
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
SOME SECURITY CHALLENGES  IN CLOUD COMPUTINGSOME SECURITY CHALLENGES  IN CLOUD COMPUTING
SOME SECURITY CHALLENGES IN CLOUD COMPUTINGHoang Nguyen
 
Cloud computing & Security presentation
Cloud computing & Security presentationCloud computing & Security presentation
Cloud computing & Security presentationParveen Yadav
 
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTINGDATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
ijsptm
 
Cloud Encryption
Cloud EncryptionCloud Encryption
Cloud Encryption
RituparnaNag
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computing
veena venugopal
 
Cloud computing and its security issues
Cloud computing and its security issuesCloud computing and its security issues
Cloud computing and its security issues
Jyoti Srivastava
 
Cloud security
Cloud security Cloud security
Cloud security
Mohamed Shalash
 

What's hot (20)

Security Issues in Cloud Computing
Security Issues in Cloud ComputingSecurity Issues in Cloud Computing
Security Issues in Cloud Computing
 
Data Confidentiality in Cloud Computing
Data Confidentiality in Cloud ComputingData Confidentiality in Cloud Computing
Data Confidentiality in Cloud Computing
 
Cloud computing and data security
Cloud computing and data securityCloud computing and data security
Cloud computing and data security
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environments
 
Data storage security in cloud computing
Data storage security in cloud computingData storage security in cloud computing
Data storage security in cloud computing
 
Data security using rsa
Data security using rsaData security using rsa
Data security using rsa
 
Cloud Computing Security Organization Assessments Service Categories Responsi...
Cloud Computing Security Organization Assessments Service Categories Responsi...Cloud Computing Security Organization Assessments Service Categories Responsi...
Cloud Computing Security Organization Assessments Service Categories Responsi...
 
On technical security issues in cloud computing
On technical security issues in cloud computingOn technical security issues in cloud computing
On technical security issues in cloud computing
 
Cloud Security Issues 1.04.10
Cloud Security  Issues 1.04.10Cloud Security  Issues 1.04.10
Cloud Security Issues 1.04.10
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
PhD Projects in Cloud Computing Security Research Topics
PhD Projects in Cloud Computing Security Research TopicsPhD Projects in Cloud Computing Security Research Topics
PhD Projects in Cloud Computing Security Research Topics
 
Ryan_Holt_MS_Thesis_Project_Presentation
Ryan_Holt_MS_Thesis_Project_PresentationRyan_Holt_MS_Thesis_Project_Presentation
Ryan_Holt_MS_Thesis_Project_Presentation
 
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
SOME SECURITY CHALLENGES  IN CLOUD COMPUTINGSOME SECURITY CHALLENGES  IN CLOUD COMPUTING
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computing
 
Cloud computing & Security presentation
Cloud computing & Security presentationCloud computing & Security presentation
Cloud computing & Security presentation
 
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTINGDATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
 
Cloud Encryption
Cloud EncryptionCloud Encryption
Cloud Encryption
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computing
 
Cloud computing and its security issues
Cloud computing and its security issuesCloud computing and its security issues
Cloud computing and its security issues
 
Cloud security
Cloud security Cloud security
Cloud security
 

Viewers also liked

Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
Venkatesh Chary
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computingPrince Chandu
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
Ninh Nguyen
 
Cloud Computing Security Issues in Infrastructure as a Service”
Cloud Computing Security Issues in Infrastructure as a Service”Cloud Computing Security Issues in Infrastructure as a Service”
Cloud Computing Security Issues in Infrastructure as a Service”Vivek Maurya
 
Cloud computing-security-issues
Cloud computing-security-issuesCloud computing-security-issues
Cloud computing-security-issues
Aleem Mohammed
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
Falgun Rathod
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computing
ronak patel
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
Vladimir Jirasek
 
Scaling People, Not Just Systems, to Take On Big Data Challenges
Scaling People, Not Just Systems, to Take On Big Data ChallengesScaling People, Not Just Systems, to Take On Big Data Challenges
Scaling People, Not Just Systems, to Take On Big Data Challenges
Matthew Vaughn
 
Defending Applications In the Cloud: Architecting Layered Security Solutions ...
Defending Applications In the Cloud: Architecting Layered Security Solutions ...Defending Applications In the Cloud: Architecting Layered Security Solutions ...
Defending Applications In the Cloud: Architecting Layered Security Solutions ...
EC-Council
 
A Reference Architecture for a Federated Cloud for Research
A Reference Architecture for a Federated Cloud for ResearchA Reference Architecture for a Federated Cloud for Research
A Reference Architecture for a Federated Cloud for Research
Research Data Alliance
 
Data Security Essentials for Cloud Computing - JavaOne 2013
Data Security Essentials for Cloud Computing - JavaOne 2013Data Security Essentials for Cloud Computing - JavaOne 2013
Data Security Essentials for Cloud Computing - JavaOne 2013
javagroup2006
 
Encrypted Databases for Untrusted Cloud
Encrypted Databases for Untrusted CloudEncrypted Databases for Untrusted Cloud
Encrypted Databases for Untrusted Cloud
n|u - The Open Security Community
 
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Web image re ranking using query-spe...
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Web image re ranking using query-spe...2014 IEEE DOTNET CLOUD COMPUTING PROJECT Web image re ranking using query-spe...
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Web image re ranking using query-spe...
IEEEFINALSEMSTUDENTPROJECTS
 
Cloud computing legal issues
Cloud computing legal issuesCloud computing legal issues
Cloud computing legal issues
Adv Prashant Mali
 
Mona secure multi owner data sharing for dynamic groups in the cloud-ppt
Mona secure multi owner data sharing for dynamic groups in the cloud-pptMona secure multi owner data sharing for dynamic groups in the cloud-ppt
Mona secure multi owner data sharing for dynamic groups in the cloud-ppt
Krushna Panda
 
IT Security As A Service
IT Security As A ServiceIT Security As A Service
IT Security As A Service
Michael Davis
 
Cloud Computing Legal Issues
Cloud Computing Legal IssuesCloud Computing Legal Issues
Cloud Computing Legal Issues
Ikuo Takahashi
 
Sgx @ centre & vista
Sgx @ centre & vistaSgx @ centre & vista
Sgx @ centre & vistaSim Shawn
 

Viewers also liked (20)

Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Cloud Computing Security Issues in Infrastructure as a Service”
Cloud Computing Security Issues in Infrastructure as a Service”Cloud Computing Security Issues in Infrastructure as a Service”
Cloud Computing Security Issues in Infrastructure as a Service”
 
Cloud computing-security-issues
Cloud computing-security-issuesCloud computing-security-issues
Cloud computing-security-issues
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computing
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
 
Scaling People, Not Just Systems, to Take On Big Data Challenges
Scaling People, Not Just Systems, to Take On Big Data ChallengesScaling People, Not Just Systems, to Take On Big Data Challenges
Scaling People, Not Just Systems, to Take On Big Data Challenges
 
Defending Applications In the Cloud: Architecting Layered Security Solutions ...
Defending Applications In the Cloud: Architecting Layered Security Solutions ...Defending Applications In the Cloud: Architecting Layered Security Solutions ...
Defending Applications In the Cloud: Architecting Layered Security Solutions ...
 
A Reference Architecture for a Federated Cloud for Research
A Reference Architecture for a Federated Cloud for ResearchA Reference Architecture for a Federated Cloud for Research
A Reference Architecture for a Federated Cloud for Research
 
Data Security Essentials for Cloud Computing - JavaOne 2013
Data Security Essentials for Cloud Computing - JavaOne 2013Data Security Essentials for Cloud Computing - JavaOne 2013
Data Security Essentials for Cloud Computing - JavaOne 2013
 
Encrypted Databases for Untrusted Cloud
Encrypted Databases for Untrusted CloudEncrypted Databases for Untrusted Cloud
Encrypted Databases for Untrusted Cloud
 
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Web image re ranking using query-spe...
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Web image re ranking using query-spe...2014 IEEE DOTNET CLOUD COMPUTING PROJECT Web image re ranking using query-spe...
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Web image re ranking using query-spe...
 
Cloud computing legal issues
Cloud computing legal issuesCloud computing legal issues
Cloud computing legal issues
 
Synopsis_kamlesh
Synopsis_kamleshSynopsis_kamlesh
Synopsis_kamlesh
 
Mona secure multi owner data sharing for dynamic groups in the cloud-ppt
Mona secure multi owner data sharing for dynamic groups in the cloud-pptMona secure multi owner data sharing for dynamic groups in the cloud-ppt
Mona secure multi owner data sharing for dynamic groups in the cloud-ppt
 
IT Security As A Service
IT Security As A ServiceIT Security As A Service
IT Security As A Service
 
Cloud Computing Legal Issues
Cloud Computing Legal IssuesCloud Computing Legal Issues
Cloud Computing Legal Issues
 
Sgx @ centre & vista
Sgx @ centre & vistaSgx @ centre & vista
Sgx @ centre & vista
 

Similar to Presentation on cloud computing security issues using HADOOP and HDFS ARCHITECTURE

IRJET- Secured Hadoop Environment
IRJET- Secured Hadoop EnvironmentIRJET- Secured Hadoop Environment
IRJET- Secured Hadoop Environment
IRJET Journal
 
Improving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using HadoopImproving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using Hadoop
IJERA Editor
 
Privacy Preserving Data Analytics using Cryptographic Technique for Large Dat...
Privacy Preserving Data Analytics using Cryptographic Technique for Large Dat...Privacy Preserving Data Analytics using Cryptographic Technique for Large Dat...
Privacy Preserving Data Analytics using Cryptographic Technique for Large Dat...
IRJET Journal
 
IRJET - A Secure Access Policies based on Data Deduplication System
IRJET - A Secure Access Policies based on Data Deduplication SystemIRJET - A Secure Access Policies based on Data Deduplication System
IRJET - A Secure Access Policies based on Data Deduplication System
IRJET Journal
 
H1803035056
H1803035056H1803035056
H1803035056
IOSR Journals
 
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageBio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
IJERA Editor
 
An efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environmentAn efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environment
eSAT Journals
 
Mn3422372248
Mn3422372248Mn3422372248
Mn3422372248
IJERA Editor
 
Imperative Induced Innovation - Patrick W. Dowd, Ph. D
Imperative Induced Innovation - Patrick W. Dowd, Ph. DImperative Induced Innovation - Patrick W. Dowd, Ph. D
Imperative Induced Innovation - Patrick W. Dowd, Ph. D
scoopnewsgroup
 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Editor IJMTER
 
Ijarcet vol-2-issue-3-951-956
Ijarcet vol-2-issue-3-951-956Ijarcet vol-2-issue-3-951-956
Ijarcet vol-2-issue-3-951-956Editor IJARCET
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
An Efficient PDP Scheme for Distributed Cloud Storage
An Efficient PDP Scheme for Distributed Cloud StorageAn Efficient PDP Scheme for Distributed Cloud Storage
An Efficient PDP Scheme for Distributed Cloud Storage
IJMER
 
An4201262267
An4201262267An4201262267
An4201262267
IJERA Editor
 
Improved deduplication with keys and chunks in HDFS storage providers
Improved deduplication with keys and chunks in HDFS storage providersImproved deduplication with keys and chunks in HDFS storage providers
Improved deduplication with keys and chunks in HDFS storage providers
IRJET Journal
 
A New Framework for Securing Personal Data Using the Multi-Cloud
A New Framework for Securing Personal Data Using the Multi-CloudA New Framework for Securing Personal Data Using the Multi-Cloud
A New Framework for Securing Personal Data Using the Multi-Cloud
ClaraZara1
 
A New Framework for Securing Personal Data Using the Multi-Cloud
A New Framework for Securing Personal Data Using the Multi-CloudA New Framework for Securing Personal Data Using the Multi-Cloud
A New Framework for Securing Personal Data Using the Multi-Cloud
ClaraZara1
 
A NEW FRAMEWORK FOR SECURING PERSONAL DATA USING THE MULTI-CLOUD
A NEW FRAMEWORK FOR SECURING PERSONAL DATA USING THE MULTI-CLOUDA NEW FRAMEWORK FOR SECURING PERSONAL DATA USING THE MULTI-CLOUD
A NEW FRAMEWORK FOR SECURING PERSONAL DATA USING THE MULTI-CLOUD
ijsptm
 
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
IJMER
 
Dynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudDynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for Cloud
AM Publications
 

Similar to Presentation on cloud computing security issues using HADOOP and HDFS ARCHITECTURE (20)

IRJET- Secured Hadoop Environment
IRJET- Secured Hadoop EnvironmentIRJET- Secured Hadoop Environment
IRJET- Secured Hadoop Environment
 
Improving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using HadoopImproving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using Hadoop
 
Privacy Preserving Data Analytics using Cryptographic Technique for Large Dat...
Privacy Preserving Data Analytics using Cryptographic Technique for Large Dat...Privacy Preserving Data Analytics using Cryptographic Technique for Large Dat...
Privacy Preserving Data Analytics using Cryptographic Technique for Large Dat...
 
IRJET - A Secure Access Policies based on Data Deduplication System
IRJET - A Secure Access Policies based on Data Deduplication SystemIRJET - A Secure Access Policies based on Data Deduplication System
IRJET - A Secure Access Policies based on Data Deduplication System
 
H1803035056
H1803035056H1803035056
H1803035056
 
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageBio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
 
An efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environmentAn efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environment
 
Mn3422372248
Mn3422372248Mn3422372248
Mn3422372248
 
Imperative Induced Innovation - Patrick W. Dowd, Ph. D
Imperative Induced Innovation - Patrick W. Dowd, Ph. DImperative Induced Innovation - Patrick W. Dowd, Ph. D
Imperative Induced Innovation - Patrick W. Dowd, Ph. D
 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
 
Ijarcet vol-2-issue-3-951-956
Ijarcet vol-2-issue-3-951-956Ijarcet vol-2-issue-3-951-956
Ijarcet vol-2-issue-3-951-956
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
An Efficient PDP Scheme for Distributed Cloud Storage
An Efficient PDP Scheme for Distributed Cloud StorageAn Efficient PDP Scheme for Distributed Cloud Storage
An Efficient PDP Scheme for Distributed Cloud Storage
 
An4201262267
An4201262267An4201262267
An4201262267
 
Improved deduplication with keys and chunks in HDFS storage providers
Improved deduplication with keys and chunks in HDFS storage providersImproved deduplication with keys and chunks in HDFS storage providers
Improved deduplication with keys and chunks in HDFS storage providers
 
A New Framework for Securing Personal Data Using the Multi-Cloud
A New Framework for Securing Personal Data Using the Multi-CloudA New Framework for Securing Personal Data Using the Multi-Cloud
A New Framework for Securing Personal Data Using the Multi-Cloud
 
A New Framework for Securing Personal Data Using the Multi-Cloud
A New Framework for Securing Personal Data Using the Multi-CloudA New Framework for Securing Personal Data Using the Multi-Cloud
A New Framework for Securing Personal Data Using the Multi-Cloud
 
A NEW FRAMEWORK FOR SECURING PERSONAL DATA USING THE MULTI-CLOUD
A NEW FRAMEWORK FOR SECURING PERSONAL DATA USING THE MULTI-CLOUDA NEW FRAMEWORK FOR SECURING PERSONAL DATA USING THE MULTI-CLOUD
A NEW FRAMEWORK FOR SECURING PERSONAL DATA USING THE MULTI-CLOUD
 
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
 
Dynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudDynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for Cloud
 

Recently uploaded

678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 

Recently uploaded (20)

678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 

Presentation on cloud computing security issues using HADOOP and HDFS ARCHITECTURE

  • 1. TECHNICAL SEMINAR REPORT ON SECURITY ISSUES FOR CLOUD COMPUTING Presented by E.PUSHPA PRIYADARSHINI COLLEGE OF ENGINEERING & TECHNOLOGY [Affiliated to Jawaharlal Nehru technological university, Ananthapur] Kanupartipadu, Nellore-524004 2012-2013
  • 2. Overview 1. Introduction 2. Security Issues 3. Third Party Secure Data Publication Applied to CLOUD 4. Encrypted Data Storage for Cloud 5. Secure Query Processing with Hadoop 5.1 Overview of Hadoop 5.2 Inadequacies of Hadoop i)No facility to handle encrypted sensitive ii)Semantic Web Data Management
  • 3. iii)No fine-grained access control iv)No strong authentication 5.3 System Design i)Jena ii)Pellet iii)Pig Latin iv)Mahout, Hama v)Pre-processing 5.3.3 Query Execution and Optimization 5.4 Integrate SUN XACML Implementation into HDFS 5.5 Strong Authentication 6. Conclusion 7. References
  • 4. ABSTRACT  We discuss security issues for cloud computing and present a layered framework for secure clouds and then focus on two of the layers, i.e., the storage layer and the data layer.  we discuss a scheme for secure third party publications of documents in a cloud. Next, we will converse secure federated query processing with map Reduce and Hadoop, and discuss the use of secure co-processors for cloud computing.  Finally, the we discuss XACML implementation for Hadoop and discuss their beliefs that building trusted applications from untrusted components will be a major aspect of secure cloud computing.
  • 5. INTRODUCTION There is a critical need to securely store, manage,share and analyze massive amounts of complex data to determine patterns and trends  Because of the critical nature of the applications, it is important that clouds be secure Google has now introduced the MapReduce framework for processing large amounts of data on commodity hardware Apache’s Hadoop distributed file system (HDFS) is emerging as a superior software component for cloud computing combined with integrated parts such as MapReduce
  • 6. Due to the extensive complexity of the cloud, we contend that it will be difficult to provide a holistic solution to securing the cloud Our cloud system will: (a)support efficient storageof encrypted sensitive data, (b) store, manage and query massive amounts of data, (c) support fine-grained access control and (d) support strong authentication
  • 7. 2.SECURITY ISSUES  There are numerous security issues for cloud computing as it encompasses many technologies including networks, databases, operating systems Data security involves encrypting the data as well as ensuring that appropriate policies are enforced for data sharing We describe ways of efficiently storing the data in foreign machines Querying encrypted data, as much of the data on the cloud may be encrypted
  • 8. Data mining techniques may be applicable to malware detection in clouds  We are using Hadoop distributed file system for virtualization at the storage level and applying security for Hadoop which includes an XACML implementation  Resource allocation and memory management algorithms We are investigating secure federated query processing on clouds over Hadoop
  • 9. 3.THIRD PARTY SECURE DATAPUBLICATION APPLIED TO CLOUD ►We have developed techniques for third party publication of data in a secure manner ►security policy is specified depending on user roles and credentials Figure : Access control framework
  • 10. ►Users must possess the credentials to access XML documents ►For example, a professor has access to all of the details of students while a secretary only has access to administrative information ►If access is granted to the root, it does not necessarily mean access is granted to all the children ►When the subject requests a document, the publisher will apply the policies relevant to the subject and give portions of the documents to the subject. ►Owner will encrypt various combinations of documents and policies with his/her private key
  • 11. ►Using Merkle signature and the encryption techniques, the subject can verify the authenticity and completeness of the document ►In the cloud environment, the third party publisher is the machine that stored the sensitive data in the cloud
  • 12. 4.ENCRYPTED DATA STORAGE FOR CLOUD ►Data in the cloud will be placed anywhere ►We are using secure co-processor as part of the cloud infrastructure to enable efficient encrypted storage of sensitive data. ► Open Cirrus provides limited access based on their economic model ►Open Cirrus doesnot provide the hardware support we need (e.g., secure co-processors).
  • 13. ►By embedding a secure co-processor (SCP)into the cloud infrastructure, the system can handle encrypted data efficiently ►SCP is a tamper resistant hardware capable of limited general-purpose computation ►Secure coprocessor is tamper-resistant, one could be tempted to run the entire sensitive data storage server on the secure coprocessor. ►Due to the tamper-resistant shell, secure co-processors have usually limited memory .
  • 14. ►Another issue is that the software running on the SCP must be totally trusted and verified ►Framework will facilitate (a)secure data storage and (b) assured information sharing ►We have conducted research on querying encrypted data as well as secure multipart computation (SMC) ►One drawback of SMC is the high computation costs
  • 15. 5.SECURE QUERY PROCESSING WITH HADOOP 5.1 Overview of Hadoop A major part of our system is HDFS which is a distributed Java-based file system with the capacity to handle a large number of nodes storing petabytes of data HDFS architecture is based on the Master- Slave approach
  • 16. 5.3 SYSTEM DESIGN We are using several software tools that are available to help us in the process i)Jena: Jena is a framework which is widely used for solving SPARQL queries over RDF data ii)Pellet: We use Pellet to reason at various stages. We do real-time query reasoning using pellet libraries (Pellet) coupled with Hadoop’s map-reduce functionalities iii)Pig Latin: Pig Latin is a scripting language which runs on top of Hadoop.
  • 17.  It comes with many built-in functions, but we can also create our own user-defined functions to do special- purpose processing. iv)Mahout, Hama: These are open source data mining and machine learning packages that already augment Hadoop. Our approach consists of processing SPARQL queries securely over Hadoop. SPARQL is a query language used to query RDF data v)Pre-processing: Generally, RDF data is in XML format In order to execute a SPARQL query, we propose some data pre-processing steps and store the pre-processed data into HDFS.
  • 18. 5.3.3 Query Execution and Optimization We are developing a SPARQL query execution and optimization module for Hadoop. As our storage strategy is based on predicate splits First, we will look at the predicates present in the query.  Second, rather than looking at all of the input files, we will look at a subset of the input files that are matched with predicates. Third, SPARQL queries generally have many joins in them and all of these joins may not be possible to perform in a single Hadoop job.
  • 19. 5.4 Integrate SUN XACML Implementation into HDFS  Current Hadoop implementations enforce a very coarse- grained access control policy that permits or denies a principal access to essentially all system resources as a group without distinguishing amongst resources.  For example, users who are granted access to the Namenode may execute any program on any client machine, and all client machines have read and write access to all files stored on all clients  We are enforcing more flexible and fine-grained access control policies on Hadoop by designing an In- lined Reference Monitor implementation of Sun XACML.
  • 20. Untrusted processes in the framework access securityrelevant resources by submitting a request to the resource’s Policy Enforcement Point (PEP)  PEP reformulates the request as a policy query and submits it to a Policy Decision Point (PDP) IRM has advantage that the policy can be enforced without modifying the operating system
  • 21. 5.5 Strong Authentication ♦Open source community is actively working to integrate kerberos protocols with hadoop ♦On top of the proposed Kerboros protocol, for some assured information applications, there may be a need for adding simple authentication protocols to authenticate with secure co-processors ♦We can add a simple public key infrastructure to our system so that users can independently authenticate with secure coprocessors to retrieve secret keys used for encrypting sensitive data
  • 22. 6.Conclusion The main goal is to securely store and manage data that is not controlled by the owner of the data It will be difficult to achieve end-to-end security. However, the challenge we have is to ensure more secure operations even if some parts of the cloud fail Building trust applications from untrusted components will be a major aspect with respect to cloud security
  • 23. 7. References W3C. (n.d.). SPARQL. Retrieved from http://www. w3.org/TR/rdf-sparql-query Bertino, E. (2002). Access Control for XML Documents. Data & Knowledge Engineering, 43(3). Bertino, E. (2004). Selective and Authentic Third Party Distribution of XML Documents. IEEE Transactions on Knowledge and Data Engineering, 16(10). doi:10.1109/TKDE.2004.63 DeVries, B. W., Gupta, G., Hamlen, K. W., Moore, S., & Sridhar, M. (2009). ActionScript Bytecode Verification with Co-Logic Programming. In Proceedings of the ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS). Gates, F., Natkovich, O., Chopra, S., Kamath, S. M.,