SlideShare a Scribd company logo
1 of 10
MMBcloud-tree: Authenticated Index for Verifiable Cloud
Service Selection
Abstract:
Cloud brokers have been recently introduced as an additional computational layer
to facilitate cloud selection and service management tasks for cloud consumers.
However, existing brokerage schemes on cloud service selection typically assume
that brokers are completely trusted, and do not provide any guarantee over the
correctness of the service recommendations. It is then possible for a compromised
or dishonest broker to easily take advantage of the limited capabilities of the clients
and provide incorrect or incomplete responses. To address this problem, we
propose an innovative Cloud Service Selection Verification (CSSV) scheme and
index structures (MMBcloud-tree) to enable cloud clients to detect misbehavior of
the cloud brokers during the service selection process. We demonstrate correctness
and efficiency of our approaches both theoretically and empirically.
[
Flow Diagram:
Existing System
Cloud brokers have been recently introduced as an additional computational layer
to facilitate cloud selection and service management tasks for cloud consumers.
However, existing brokerage schemes on cloud service selection typically assume
that brokers are completely trusted, and do not provide any guarantee over the
correctness of the service recommendations. It is then possible for a compromised
or dishonest broker to easily take advantage of the limited capabilities of the clients
and provide incorrect or incomplete responses. To address this problem.
Proposed System:
we propose an innovative Cloud Service Selection Verification (CSSV) scheme
and index structures (MMBcloud-tree) to enable cloud clients to detect
misbehavior of the cloud brokers during the service selection process. We
demonstrate correctness and efficiency of our approaches both theoretically and
empirically. proposed a new performance measuring method for Infrastructure-as-
Service offerings, taking into account the type of services running in a virtual
machine. presented a framework for monitoring cloud performance based on
customers’ feedback. Li and Wang in addition proposed a probability method to
evaluate the subjective trustworthiness of the service component as well as the
whole composite service from a series of ratings given by customers.
The range tree-based method proposed in needs to build and embed a Merkle hash
tree for each node, and. this process is also recursively invoked for the nodes of the
embedded Merkle hash tree, which makes index contruction, querying and
verification extremely time consuming; the VB-tree in is not efficient for queries
on non-key properties because it will generate large size proof messages to cover
the nodes in-between the query ranges but do not contain the query results. X`Han
et al. described a recommendation system in cloud computing suitable for design-
time decisions as it statically provided a ranking of available cloud providers. Li et
al. developed systematic comparator CloudCmp to help customers choose a cloud
that meets their needs through measuring and comparing the elastic computing,
persistent storage and networking services
Algorithm:
verification algorithms.:
It is worth noting that, the novelty of our approaches not only lies in a new set of
verification algorithms specific to the cloud service selection, but also gives
efficient solutions (compared with the state-of-the-art) to the problem of
authenticating multidimensional queries.
RSA signing algorithm:
RSA is an algorithm used by modern computers to encrypt and decrypt messages.
It is an asymmetric cryptographic algorithm. Asymmetric means that there are two
different keys. This is also called public key cryptography, because one of them
can be given to everyone. The other key must be kept private. It is based on the
fact that finding the factors of an integer is hard (the factoring problem).
Modules:
The system is proposed to have the following modules along with
functional requirements.
 Cloud service selection,
 Brokerage system
 Verification
 Merkle Hash Tree
Register
In This Module New User Register The Information In The Order Of The
List For Client Purpose
Login
In This Module User Can Login By Using His/Her Name And Key
Cloud service selection,
It is worth noting that, the novelty of our approaches not only lies in a new set of
verification algorithms specific to the cloud service selection, but also gives
efficient solutions (compared with the state-of-the-art) to the problem of
authenticating multidimensional queries. The reason to choose Price as the
indexing field is two-fold. First, given that most cloud providers employ a pay-per-
use business model, Price is one of the most commonly occurred criteria in cloud
service selection queries. First, cloud service selection typically allows cloud users
to specify multiple service requirement is always desirable to have efficient cloud
service selection and verification so that the cloud end users would not feel delay
of services. Our novel index structure is the core component of our Cloud Service
Selection Verification (CSSV) scheme, which employs the idea of “separation of
duties” to ensure strong security guarantees. we propose the Cloud Service
Selection Verification (CSSV) scheme which is a comprehensive solution that is
capable of guaranteeing all the three security requirements (i.e., authenticity,
satisfiability and completeness)
Brokerage system:
In a cloud brokerage system, one of the most fundamental tasks is to provide high-
quality selection services for clients. That is, a broker provides clients with a list of
recommended CSPs that meet the clients’ needs. With the aid of cloud brokers,
clients no longer need to collect, search or compare CSPs’ services and capabilities
Precisely, we introduce a trusted collector in the cloud brokerage system that
separates the task of CSP information collection from the service selection. The
collector does not directly interact with the cloud clients and is only in charge of
gathering information from the CSPs, and hence it can be more devoted into
adopting sophisticated defenses to filter out problematic data and building an
authenticated database of CSPs’ profiles.
Verification
More seriously, due to the lack of supervision and verification of brokers’
actions, malicious brokers could even recommend malicious CSPs which
collect and sell clients’ private resources, monitor clients’ hosts during cloud
service provisioning, causing major financial and confidentiality losses to the
clients. we propose innovative authenticated index structures and verification
protocols to allow clients to verify the completeness and authenticity of
brokers’ answers. This problem is related to that of authentication of query
results for outsourced databases. selection and verification so that the cloud
end users would not feel delay of services, but existing few works , although
support authentication of multi-dimensional query results, are time
consuming, resulting that they could not meet the demands of today’s real-
time cloud service recommendations.
Merkle Hash Tree :
this process is also recursively invoked for the nodes of the embedded Merkle hash
tree, which makes index contruction, querying and verification extremely time
consuming; the VB-tree in is not efficient for queries on non-key properties
because it will generate large size proof messages to cover the nodes in-between
the query ranges but do not contain the query results. The leaf nodes in the Merkle
hash tree contain the hash values of the original data items. Each internal node
contains the hash value of the concatenation of the hash values of its two children
nodes. The hash value of the root of the tree is published for verification. If there is
any change to the original data values, one would not be.
SYSTEM SPECIFICATION
Hardware Requirements:
 System : Pentium IV 2.4 GHz.
 Hard Disk : 40 GB.
 Floppy Drive : 1.44 Mb.
 Monitor : 14’ Colour Monitor.
 Mouse : Optical Mouse.
 Ram : 512 Mb.
Software Requirements:
 Operating system : Windows 7 Ultimate.
 Coding Language : ASP.Net with C#
 Front-End : Visual Studio 2012 Professional.
 Data Base : SQL Server 2008.
Mmb authenticated index for verifiable
Mmb authenticated index for verifiable

More Related Content

What's hot

Towards secure and dependable storage service in cloud
Towards secure and dependable storage service in cloudTowards secure and dependable storage service in cloud
Towards secure and dependable storage service in cloudsibidlegend
 
Towards secure & dependable storage services in cloud computing
Towards secure & dependable storage services in cloud computingTowards secure & dependable storage services in cloud computing
Towards secure & dependable storage services in cloud computingRahid Abdul Kalam
 
IRJET - Confidential Image De-Duplication in Cloud Storage
IRJET - Confidential Image De-Duplication in Cloud StorageIRJET - Confidential Image De-Duplication in Cloud Storage
IRJET - Confidential Image De-Duplication in Cloud StorageIRJET Journal
 
Grds conferences icst and icbelsh (10)
Grds conferences icst and icbelsh (10)Grds conferences icst and icbelsh (10)
Grds conferences icst and icbelsh (10)Global R & D Services
 
Efficient Implementation of Proof of Retrievability (OPOR) In Cloud Computing...
Efficient Implementation of Proof of Retrievability (OPOR) In Cloud Computing...Efficient Implementation of Proof of Retrievability (OPOR) In Cloud Computing...
Efficient Implementation of Proof of Retrievability (OPOR) In Cloud Computing...IJERA Editor
 
PRShare: a framework for privacy-preserving, interorganizational data sharing.
PRShare: a framework for privacy-preserving, interorganizational data sharing.PRShare: a framework for privacy-preserving, interorganizational data sharing.
PRShare: a framework for privacy-preserving, interorganizational data sharing.Lihi Idan
 
Azure applications performance checklist
Azure applications performance checklistAzure applications performance checklist
Azure applications performance checklistSalim M Bhonhariya
 
Ieee projects-2014-java-cloud-computing
Ieee projects-2014-java-cloud-computingIeee projects-2014-java-cloud-computing
Ieee projects-2014-java-cloud-computingSBGC
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Ieeepro techno solutions 2014 ieee java project - deadline based resource p...
Ieeepro techno solutions   2014 ieee java project - deadline based resource p...Ieeepro techno solutions   2014 ieee java project - deadline based resource p...
Ieeepro techno solutions 2014 ieee java project - deadline based resource p...hemanthbbc
 
Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...IGEEKS TECHNOLOGIES
 
cloud computing preservity
cloud computing preservitycloud computing preservity
cloud computing preservitychennuruvishnu
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storageIEEEFINALYEARPROJECTS
 
the client assignment problem for continuous distributed interactive applicat...
the client assignment problem for continuous distributed interactive applicat...the client assignment problem for continuous distributed interactive applicat...
the client assignment problem for continuous distributed interactive applicat...swathi78
 
IEEE Projects 2013 For ME Cse @ Seabirds ( Trichy, Thanjavur, Perambalur, Di...
IEEE Projects 2013 For ME Cse @  Seabirds ( Trichy, Thanjavur, Perambalur, Di...IEEE Projects 2013 For ME Cse @  Seabirds ( Trichy, Thanjavur, Perambalur, Di...
IEEE Projects 2013 For ME Cse @ Seabirds ( Trichy, Thanjavur, Perambalur, Di...SBGC
 
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...IJSRD
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357IJMER
 

What's hot (18)

Towards secure and dependable storage service in cloud
Towards secure and dependable storage service in cloudTowards secure and dependable storage service in cloud
Towards secure and dependable storage service in cloud
 
Towards secure & dependable storage services in cloud computing
Towards secure & dependable storage services in cloud computingTowards secure & dependable storage services in cloud computing
Towards secure & dependable storage services in cloud computing
 
IRJET - Confidential Image De-Duplication in Cloud Storage
IRJET - Confidential Image De-Duplication in Cloud StorageIRJET - Confidential Image De-Duplication in Cloud Storage
IRJET - Confidential Image De-Duplication in Cloud Storage
 
Grds conferences icst and icbelsh (10)
Grds conferences icst and icbelsh (10)Grds conferences icst and icbelsh (10)
Grds conferences icst and icbelsh (10)
 
Mca titles
Mca titlesMca titles
Mca titles
 
Efficient Implementation of Proof of Retrievability (OPOR) In Cloud Computing...
Efficient Implementation of Proof of Retrievability (OPOR) In Cloud Computing...Efficient Implementation of Proof of Retrievability (OPOR) In Cloud Computing...
Efficient Implementation of Proof of Retrievability (OPOR) In Cloud Computing...
 
PRShare: a framework for privacy-preserving, interorganizational data sharing.
PRShare: a framework for privacy-preserving, interorganizational data sharing.PRShare: a framework for privacy-preserving, interorganizational data sharing.
PRShare: a framework for privacy-preserving, interorganizational data sharing.
 
Azure applications performance checklist
Azure applications performance checklistAzure applications performance checklist
Azure applications performance checklist
 
Ieee projects-2014-java-cloud-computing
Ieee projects-2014-java-cloud-computingIeee projects-2014-java-cloud-computing
Ieee projects-2014-java-cloud-computing
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Ieeepro techno solutions 2014 ieee java project - deadline based resource p...
Ieeepro techno solutions   2014 ieee java project - deadline based resource p...Ieeepro techno solutions   2014 ieee java project - deadline based resource p...
Ieeepro techno solutions 2014 ieee java project - deadline based resource p...
 
Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...
 
cloud computing preservity
cloud computing preservitycloud computing preservity
cloud computing preservity
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storage
 
the client assignment problem for continuous distributed interactive applicat...
the client assignment problem for continuous distributed interactive applicat...the client assignment problem for continuous distributed interactive applicat...
the client assignment problem for continuous distributed interactive applicat...
 
IEEE Projects 2013 For ME Cse @ Seabirds ( Trichy, Thanjavur, Perambalur, Di...
IEEE Projects 2013 For ME Cse @  Seabirds ( Trichy, Thanjavur, Perambalur, Di...IEEE Projects 2013 For ME Cse @  Seabirds ( Trichy, Thanjavur, Perambalur, Di...
IEEE Projects 2013 For ME Cse @ Seabirds ( Trichy, Thanjavur, Perambalur, Di...
 
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357
 

Similar to Mmb authenticated index for verifiable

Service operator aware trust scheme for resource
Service operator aware trust scheme for resourceService operator aware trust scheme for resource
Service operator aware trust scheme for resourcejayaramb
 
Combining efficiency, fidelity, and flexibility in resource information services
Combining efficiency, fidelity, and flexibility in resource information servicesCombining efficiency, fidelity, and flexibility in resource information services
Combining efficiency, fidelity, and flexibility in resource information servicesCloudTechnologies
 
.Net projects 2011 by core ieeeprojects.com
.Net projects 2011 by core ieeeprojects.com .Net projects 2011 by core ieeeprojects.com
.Net projects 2011 by core ieeeprojects.com msudan92
 
Profit Maximization for Service Providers using Hybrid Pricing in Cloud Compu...
Profit Maximization for Service Providers using Hybrid Pricing in Cloud Compu...Profit Maximization for Service Providers using Hybrid Pricing in Cloud Compu...
Profit Maximization for Service Providers using Hybrid Pricing in Cloud Compu...Editor IJCATR
 
Priority Based Prediction Mechanism for Ranking Providers in Federated Cloud ...
Priority Based Prediction Mechanism for Ranking Providers in Federated Cloud ...Priority Based Prediction Mechanism for Ranking Providers in Federated Cloud ...
Priority Based Prediction Mechanism for Ranking Providers in Federated Cloud ...IJERA Editor
 
A FRAMEWORK FOR SOFTWARE-AS-A-SERVICE SELECTION AND PROVISIONING
A FRAMEWORK FOR SOFTWARE-AS-A-SERVICE SELECTION AND PROVISIONINGA FRAMEWORK FOR SOFTWARE-AS-A-SERVICE SELECTION AND PROVISIONING
A FRAMEWORK FOR SOFTWARE-AS-A-SERVICE SELECTION AND PROVISIONINGIJCNCJournal
 
Machine Learning Applications in Grid Computing
Machine Learning Applications in Grid ComputingMachine Learning Applications in Grid Computing
Machine Learning Applications in Grid Computingbutest
 
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...ijiert bestjournal
 
IEEE 2015 - 2016 | Combining Efficiency, Fidelity, and Flexibility in Resource...
IEEE 2015 - 2016 | Combining Efficiency, Fidelity, and Flexibility in Resource...IEEE 2015 - 2016 | Combining Efficiency, Fidelity, and Flexibility in Resource...
IEEE 2015 - 2016 | Combining Efficiency, Fidelity, and Flexibility in Resource...1crore projects
 
A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specif...
A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specif...A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specif...
A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specif...Prasadu Peddi
 
A Cloud Service Selection Model Based on User-Specified Quality of Service Level
A Cloud Service Selection Model Based on User-Specified Quality of Service LevelA Cloud Service Selection Model Based on User-Specified Quality of Service Level
A Cloud Service Selection Model Based on User-Specified Quality of Service Levelcsandit
 
A cloud service selection model based
A cloud service selection model basedA cloud service selection model based
A cloud service selection model basedcsandit
 
Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...IJECEIAES
 
consistency as a service auditing cloud consistency
 consistency as a service auditing cloud consistency consistency as a service auditing cloud consistency
consistency as a service auditing cloud consistencyswathi78
 
IEEE Cloud computing 2016 Title and Abstract
IEEE Cloud computing 2016 Title and AbstractIEEE Cloud computing 2016 Title and Abstract
IEEE Cloud computing 2016 Title and Abstracttsysglobalsolutions
 
Stochastic modeling and quality evaluation of infrastructure as-a-service clouds
Stochastic modeling and quality evaluation of infrastructure as-a-service cloudsStochastic modeling and quality evaluation of infrastructure as-a-service clouds
Stochastic modeling and quality evaluation of infrastructure as-a-service cloudsieeepondy
 
Dynamic Service Level Agreement Verification in Cloud Computing
Dynamic Service Level Agreement Verification in Cloud Computing Dynamic Service Level Agreement Verification in Cloud Computing
Dynamic Service Level Agreement Verification in Cloud Computing IJCSIS Research Publications
 

Similar to Mmb authenticated index for verifiable (20)

Service operator aware trust scheme for resource
Service operator aware trust scheme for resourceService operator aware trust scheme for resource
Service operator aware trust scheme for resource
 
Combining efficiency, fidelity, and flexibility in resource information services
Combining efficiency, fidelity, and flexibility in resource information servicesCombining efficiency, fidelity, and flexibility in resource information services
Combining efficiency, fidelity, and flexibility in resource information services
 
.Net projects 2011 by core ieeeprojects.com
.Net projects 2011 by core ieeeprojects.com .Net projects 2011 by core ieeeprojects.com
.Net projects 2011 by core ieeeprojects.com
 
Profit Maximization for Service Providers using Hybrid Pricing in Cloud Compu...
Profit Maximization for Service Providers using Hybrid Pricing in Cloud Compu...Profit Maximization for Service Providers using Hybrid Pricing in Cloud Compu...
Profit Maximization for Service Providers using Hybrid Pricing in Cloud Compu...
 
Priority Based Prediction Mechanism for Ranking Providers in Federated Cloud ...
Priority Based Prediction Mechanism for Ranking Providers in Federated Cloud ...Priority Based Prediction Mechanism for Ranking Providers in Federated Cloud ...
Priority Based Prediction Mechanism for Ranking Providers in Federated Cloud ...
 
20150113
2015011320150113
20150113
 
A FRAMEWORK FOR SOFTWARE-AS-A-SERVICE SELECTION AND PROVISIONING
A FRAMEWORK FOR SOFTWARE-AS-A-SERVICE SELECTION AND PROVISIONINGA FRAMEWORK FOR SOFTWARE-AS-A-SERVICE SELECTION AND PROVISIONING
A FRAMEWORK FOR SOFTWARE-AS-A-SERVICE SELECTION AND PROVISIONING
 
F1034047
F1034047F1034047
F1034047
 
Machine Learning Applications in Grid Computing
Machine Learning Applications in Grid ComputingMachine Learning Applications in Grid Computing
Machine Learning Applications in Grid Computing
 
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
 
Cloud Computing Architecture
Cloud Computing ArchitectureCloud Computing Architecture
Cloud Computing Architecture
 
IEEE 2015 - 2016 | Combining Efficiency, Fidelity, and Flexibility in Resource...
IEEE 2015 - 2016 | Combining Efficiency, Fidelity, and Flexibility in Resource...IEEE 2015 - 2016 | Combining Efficiency, Fidelity, and Flexibility in Resource...
IEEE 2015 - 2016 | Combining Efficiency, Fidelity, and Flexibility in Resource...
 
A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specif...
A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specif...A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specif...
A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specif...
 
A Cloud Service Selection Model Based on User-Specified Quality of Service Level
A Cloud Service Selection Model Based on User-Specified Quality of Service LevelA Cloud Service Selection Model Based on User-Specified Quality of Service Level
A Cloud Service Selection Model Based on User-Specified Quality of Service Level
 
A cloud service selection model based
A cloud service selection model basedA cloud service selection model based
A cloud service selection model based
 
Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...
 
consistency as a service auditing cloud consistency
 consistency as a service auditing cloud consistency consistency as a service auditing cloud consistency
consistency as a service auditing cloud consistency
 
IEEE Cloud computing 2016 Title and Abstract
IEEE Cloud computing 2016 Title and AbstractIEEE Cloud computing 2016 Title and Abstract
IEEE Cloud computing 2016 Title and Abstract
 
Stochastic modeling and quality evaluation of infrastructure as-a-service clouds
Stochastic modeling and quality evaluation of infrastructure as-a-service cloudsStochastic modeling and quality evaluation of infrastructure as-a-service clouds
Stochastic modeling and quality evaluation of infrastructure as-a-service clouds
 
Dynamic Service Level Agreement Verification in Cloud Computing
Dynamic Service Level Agreement Verification in Cloud Computing Dynamic Service Level Agreement Verification in Cloud Computing
Dynamic Service Level Agreement Verification in Cloud Computing
 

Recently uploaded

Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 

Recently uploaded (20)

Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 

Mmb authenticated index for verifiable

  • 1. MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection Abstract: Cloud brokers have been recently introduced as an additional computational layer to facilitate cloud selection and service management tasks for cloud consumers. However, existing brokerage schemes on cloud service selection typically assume that brokers are completely trusted, and do not provide any guarantee over the correctness of the service recommendations. It is then possible for a compromised or dishonest broker to easily take advantage of the limited capabilities of the clients and provide incorrect or incomplete responses. To address this problem, we propose an innovative Cloud Service Selection Verification (CSSV) scheme and index structures (MMBcloud-tree) to enable cloud clients to detect misbehavior of the cloud brokers during the service selection process. We demonstrate correctness and efficiency of our approaches both theoretically and empirically.
  • 3. Existing System Cloud brokers have been recently introduced as an additional computational layer to facilitate cloud selection and service management tasks for cloud consumers. However, existing brokerage schemes on cloud service selection typically assume that brokers are completely trusted, and do not provide any guarantee over the correctness of the service recommendations. It is then possible for a compromised or dishonest broker to easily take advantage of the limited capabilities of the clients and provide incorrect or incomplete responses. To address this problem. Proposed System: we propose an innovative Cloud Service Selection Verification (CSSV) scheme and index structures (MMBcloud-tree) to enable cloud clients to detect misbehavior of the cloud brokers during the service selection process. We demonstrate correctness and efficiency of our approaches both theoretically and empirically. proposed a new performance measuring method for Infrastructure-as- Service offerings, taking into account the type of services running in a virtual machine. presented a framework for monitoring cloud performance based on customers’ feedback. Li and Wang in addition proposed a probability method to evaluate the subjective trustworthiness of the service component as well as the whole composite service from a series of ratings given by customers. The range tree-based method proposed in needs to build and embed a Merkle hash tree for each node, and. this process is also recursively invoked for the nodes of the embedded Merkle hash tree, which makes index contruction, querying and verification extremely time consuming; the VB-tree in is not efficient for queries
  • 4. on non-key properties because it will generate large size proof messages to cover the nodes in-between the query ranges but do not contain the query results. X`Han et al. described a recommendation system in cloud computing suitable for design- time decisions as it statically provided a ranking of available cloud providers. Li et al. developed systematic comparator CloudCmp to help customers choose a cloud that meets their needs through measuring and comparing the elastic computing, persistent storage and networking services Algorithm: verification algorithms.: It is worth noting that, the novelty of our approaches not only lies in a new set of verification algorithms specific to the cloud service selection, but also gives efficient solutions (compared with the state-of-the-art) to the problem of authenticating multidimensional queries. RSA signing algorithm: RSA is an algorithm used by modern computers to encrypt and decrypt messages. It is an asymmetric cryptographic algorithm. Asymmetric means that there are two different keys. This is also called public key cryptography, because one of them can be given to everyone. The other key must be kept private. It is based on the fact that finding the factors of an integer is hard (the factoring problem).
  • 5. Modules: The system is proposed to have the following modules along with functional requirements.  Cloud service selection,  Brokerage system  Verification  Merkle Hash Tree Register In This Module New User Register The Information In The Order Of The List For Client Purpose Login In This Module User Can Login By Using His/Her Name And Key Cloud service selection, It is worth noting that, the novelty of our approaches not only lies in a new set of verification algorithms specific to the cloud service selection, but also gives efficient solutions (compared with the state-of-the-art) to the problem of authenticating multidimensional queries. The reason to choose Price as the
  • 6. indexing field is two-fold. First, given that most cloud providers employ a pay-per- use business model, Price is one of the most commonly occurred criteria in cloud service selection queries. First, cloud service selection typically allows cloud users to specify multiple service requirement is always desirable to have efficient cloud service selection and verification so that the cloud end users would not feel delay of services. Our novel index structure is the core component of our Cloud Service Selection Verification (CSSV) scheme, which employs the idea of “separation of duties” to ensure strong security guarantees. we propose the Cloud Service Selection Verification (CSSV) scheme which is a comprehensive solution that is capable of guaranteeing all the three security requirements (i.e., authenticity, satisfiability and completeness) Brokerage system: In a cloud brokerage system, one of the most fundamental tasks is to provide high- quality selection services for clients. That is, a broker provides clients with a list of recommended CSPs that meet the clients’ needs. With the aid of cloud brokers, clients no longer need to collect, search or compare CSPs’ services and capabilities Precisely, we introduce a trusted collector in the cloud brokerage system that separates the task of CSP information collection from the service selection. The collector does not directly interact with the cloud clients and is only in charge of gathering information from the CSPs, and hence it can be more devoted into adopting sophisticated defenses to filter out problematic data and building an authenticated database of CSPs’ profiles. Verification More seriously, due to the lack of supervision and verification of brokers’ actions, malicious brokers could even recommend malicious CSPs which
  • 7. collect and sell clients’ private resources, monitor clients’ hosts during cloud service provisioning, causing major financial and confidentiality losses to the clients. we propose innovative authenticated index structures and verification protocols to allow clients to verify the completeness and authenticity of brokers’ answers. This problem is related to that of authentication of query results for outsourced databases. selection and verification so that the cloud end users would not feel delay of services, but existing few works , although support authentication of multi-dimensional query results, are time consuming, resulting that they could not meet the demands of today’s real- time cloud service recommendations. Merkle Hash Tree : this process is also recursively invoked for the nodes of the embedded Merkle hash tree, which makes index contruction, querying and verification extremely time consuming; the VB-tree in is not efficient for queries on non-key properties because it will generate large size proof messages to cover the nodes in-between the query ranges but do not contain the query results. The leaf nodes in the Merkle hash tree contain the hash values of the original data items. Each internal node contains the hash value of the concatenation of the hash values of its two children nodes. The hash value of the root of the tree is published for verification. If there is any change to the original data values, one would not be.
  • 8. SYSTEM SPECIFICATION Hardware Requirements:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 14’ Colour Monitor.  Mouse : Optical Mouse.  Ram : 512 Mb. Software Requirements:  Operating system : Windows 7 Ultimate.  Coding Language : ASP.Net with C#  Front-End : Visual Studio 2012 Professional.  Data Base : SQL Server 2008.