SlideShare a Scribd company logo
1 of 21
BALANCING
PERFORMANCE,
ACCURACY, AND
PRECISION FOR SECURE
CLOUD TRANSACTIONS
PRESENTED BY
ABSTRACT
 In this paper, we highlight the criticality of the
problem.
 We then define the notion of trusted
transactions when dealing with proofs of
authorization.
 Accordingly, we propose several increasingly
stringent levels of policy consistency
constraints, and present different enforcement
approaches to guarantee the trustworthiness of
transactions executing on cloud servers.
Contd…
 We propose a Two-Phase Validation Commit
protocol as a solution, which is a modified
version of the basic Two-Phase Validation
Commit protocols.
 We finally analyze the different approaches
presented using both analytical evaluation of
the overheads and simulations to guide the
decision makers to which approach to use.
EXISTING SYSTEM
 To provide scalability and elasticity, cloud
services often make heavy use of replication to
ensure consistent performance and availability.
 As a result, many cloud services rely on the
notion of eventual consistency when
propagating data throughout the system.
Contd…
 This consistency model is a
variant of weak consistency that
allows data to be inconsistent
among some replicas during the
update process, but ensures
that updates will eventually be
propagated to all replicas.
DISADVANTAGES OF EXISTING
SYSTEM
 consistency problems can arise as transactional
database systems are deployed in cloud
environments.
 Use policy-based authorization systems to
protect sensitive resources.
 The system may suffer from policy
inconsistencies during policy updates.
 It is possible for external factors to cause user
credential inconsistencies over the lifetime of a
transaction
PROPOSED SYSTEM
 We formalize the concept of trusted
transactions.
 We define several different levels of policy
consistency constraints and corresponding
enforcement approaches that guarantee the
trustworthiness of transactions executing on
cloud servers.
 We propose a Two-Phase Validation Commit
(2PVC) protocol that ensures that a transaction
is safe by checking policy, credential, and data
consistency during transaction execution.
 We carry out an experimental evaluation of our
proposed approaches
ADVANTAGES OF PROPOSED SYSTEM
 Identifies transactions that are both trusted and
conform to the ACID properties of distributed
database systems.
 Guarantee the trustworthiness of transactions
executing on cloud servers.
 A transaction is safe by checking policy,
credential, and data consistency during
transaction execution .
 Most suitable in various situations.
SYSTEM ARCHITECTURE
HARDWARE
REQUIREMENTS
 System : Pentium IV 2.4 GHz.
 Hard Disk : 40 GB.
 Floppy Drive : 1.44 Mb.
 Monitor : 15 VGA Colour.
 Mouse : Logitech.
 Ram : 512 Mb.
SOFTWARE REQUIREMENTS
 Operating system : Windows XP/7.
 Coding Language : ASP.net, C#.net
 Tool : Visual Studio 2010
 Database : SQL SERVER 2008
MODULES:
 Server Module.
 Cloud User Module.
 Transaction Manager.
 Certificate Authorities.
Server Model
 In this Module, We design a cloud
infrastructure consisting of a set of servers,
where each server is responsible for hosting a
subset of all data items belonging to a specific
application domain.
Cloud User Module
 In this Module, Users interact with the system by
submitting queries or update requests
encapsulated in ACID transactions.
 Since transactions are executed over time, the
state information of the credentials and the
policies enforced by different servers are subject
to changes at any time instance, therefore it
becomes important to introduce precise definitions
for the different consistency levels that could be
achieved within a transaction’s lifetime. These
consistency models strengthen the trusted
transaction definition by defining the environment
in which policy versions are consistent relative to
the rest of the system.
Transaction Manager
 A transaction is submitted to a Transaction
Manager(TM) that coordinates its execution.
Multiple TMs could be invoked as the system
workload increases for load balancing, but each
transaction is handled by only one TM.
 A common characteristic of most of our proposed
approaches to achieve trusted transactions is the
need for policy consistency validation at the end
of a transaction. That is, in order for a trusted
transaction to commit, its TM has to enforce either
view or global consistency among the servers
participating in the transaction.
Certificate Authorities
 We use the set of all credentials, which are
issued by the Certificate Authorities (CAs)
within the system. We assume that each CA
offers an online method that allows any server
to check the current status of credentials that it
has issued.
REFERENCES
 Marian K. Iskander, Tucker Trainor,
Dave W. Wilkinson, Adam J. Lee,
and Panos K. Chrysanthis,
“Balancing Performance,
Accuracy, and Precision for
Secure Cloud Transactions”, VOL.
25, NO. 2, FEBRUARY 2014.

More Related Content

Similar to FINAL REVIEW.pptx

Ieeepro techno solutions ieee java project - balancing performance,accuracy ...
Ieeepro techno solutions  ieee java project - balancing performance,accuracy ...Ieeepro techno solutions  ieee java project - balancing performance,accuracy ...
Ieeepro techno solutions ieee java project - balancing performance,accuracy ...hemanthbbc
 
Ieeepro techno solutions ieee dotnet project - balancing performance,accurac...
Ieeepro techno solutions  ieee dotnet project - balancing performance,accurac...Ieeepro techno solutions  ieee dotnet project - balancing performance,accurac...
Ieeepro techno solutions ieee dotnet project - balancing performance,accurac...ASAITHAMBIRAJAA
 
Ieeepro techno solutions ieee java project - balancing performance,accuracy ...
Ieeepro techno solutions  ieee java project - balancing performance,accuracy ...Ieeepro techno solutions  ieee java project - balancing performance,accuracy ...
Ieeepro techno solutions ieee java project - balancing performance,accuracy ...hemanthbbc
 
Balancing performance, accuracy
Balancing performance, accuracyBalancing performance, accuracy
Balancing performance, accuracyshakas007
 
Balancing performance, accuracy, and precision for secure cloud transactions
Balancing performance, accuracy, and precision for secure cloud transactionsBalancing performance, accuracy, and precision for secure cloud transactions
Balancing performance, accuracy, and precision for secure cloud transactionsieeepondy
 
Secure Computing IEEE 2014 Projects
Secure Computing IEEE 2014 ProjectsSecure Computing IEEE 2014 Projects
Secure Computing IEEE 2014 ProjectsVijay Karan
 
Secure computing-ieee-2014-projects
Secure computing-ieee-2014-projectsSecure computing-ieee-2014-projects
Secure computing-ieee-2014-projectsVijay Karan
 
Service operator aware trust scheme for resource
Service operator aware trust scheme for resourceService operator aware trust scheme for resource
Service operator aware trust scheme for resourcejayaramb
 
Why Coordination And Transactions Are Key To Building An Operational Soa
Why Coordination And Transactions Are Key To Building An Operational SoaWhy Coordination And Transactions Are Key To Building An Operational Soa
Why Coordination And Transactions Are Key To Building An Operational SoaDavid Linthicum
 
Providing user security guarantees
Providing user security guaranteesProviding user security guarantees
Providing user security guaranteesKamal Spring
 
Providing user security guarantees
Providing user security guaranteesProviding user security guarantees
Providing user security guaranteesKamal Spring
 
Kerberos Security in Distributed Systems
Kerberos Security in Distributed SystemsKerberos Security in Distributed Systems
Kerberos Security in Distributed SystemsIRJET Journal
 
consistency as a service auditing cloud consistency
 consistency as a service auditing cloud consistency consistency as a service auditing cloud consistency
consistency as a service auditing cloud consistencyswathi78
 
Uunit 5-xml&web security
Uunit 5-xml&web securityUunit 5-xml&web security
Uunit 5-xml&web securityssuser3a47cb
 
Consistency As A Service:Auditing Cloud Consistency
Consistency As A Service:Auditing Cloud ConsistencyConsistency As A Service:Auditing Cloud Consistency
Consistency As A Service:Auditing Cloud ConsistencyLakshmiPriya UdayaKumar
 
IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Clou...
IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Clou...IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Clou...
IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Clou...IRJET Journal
 
Strongly DisagreeDisagreeNeutralAgreeStrongly AgreeI t.docx
Strongly DisagreeDisagreeNeutralAgreeStrongly AgreeI t.docxStrongly DisagreeDisagreeNeutralAgreeStrongly AgreeI t.docx
Strongly DisagreeDisagreeNeutralAgreeStrongly AgreeI t.docxcpatriciarpatricia
 
Microservices Security landscape
Microservices Security landscapeMicroservices Security landscape
Microservices Security landscapeSagara Gunathunga
 

Similar to FINAL REVIEW.pptx (20)

Ieeepro techno solutions ieee java project - balancing performance,accuracy ...
Ieeepro techno solutions  ieee java project - balancing performance,accuracy ...Ieeepro techno solutions  ieee java project - balancing performance,accuracy ...
Ieeepro techno solutions ieee java project - balancing performance,accuracy ...
 
Ieeepro techno solutions ieee dotnet project - balancing performance,accurac...
Ieeepro techno solutions  ieee dotnet project - balancing performance,accurac...Ieeepro techno solutions  ieee dotnet project - balancing performance,accurac...
Ieeepro techno solutions ieee dotnet project - balancing performance,accurac...
 
Ieeepro techno solutions ieee java project - balancing performance,accuracy ...
Ieeepro techno solutions  ieee java project - balancing performance,accuracy ...Ieeepro techno solutions  ieee java project - balancing performance,accuracy ...
Ieeepro techno solutions ieee java project - balancing performance,accuracy ...
 
Balancing performance, accuracy
Balancing performance, accuracyBalancing performance, accuracy
Balancing performance, accuracy
 
Balancing performance, accuracy, and precision for secure cloud transactions
Balancing performance, accuracy, and precision for secure cloud transactionsBalancing performance, accuracy, and precision for secure cloud transactions
Balancing performance, accuracy, and precision for secure cloud transactions
 
Secure Computing IEEE 2014 Projects
Secure Computing IEEE 2014 ProjectsSecure Computing IEEE 2014 Projects
Secure Computing IEEE 2014 Projects
 
Secure computing-ieee-2014-projects
Secure computing-ieee-2014-projectsSecure computing-ieee-2014-projects
Secure computing-ieee-2014-projects
 
Service operator aware trust scheme for resource
Service operator aware trust scheme for resourceService operator aware trust scheme for resource
Service operator aware trust scheme for resource
 
Why Coordination And Transactions Are Key To Building An Operational Soa
Why Coordination And Transactions Are Key To Building An Operational SoaWhy Coordination And Transactions Are Key To Building An Operational Soa
Why Coordination And Transactions Are Key To Building An Operational Soa
 
Providing user security guarantees
Providing user security guaranteesProviding user security guarantees
Providing user security guarantees
 
Providing user security guarantees
Providing user security guaranteesProviding user security guarantees
Providing user security guarantees
 
Kerberos Security in Distributed Systems
Kerberos Security in Distributed SystemsKerberos Security in Distributed Systems
Kerberos Security in Distributed Systems
 
consistency as a service auditing cloud consistency
 consistency as a service auditing cloud consistency consistency as a service auditing cloud consistency
consistency as a service auditing cloud consistency
 
Uunit 5-xml&web security
Uunit 5-xml&web securityUunit 5-xml&web security
Uunit 5-xml&web security
 
Cloud Computing Architecture
Cloud Computing ArchitectureCloud Computing Architecture
Cloud Computing Architecture
 
Cloud monitoring overview
Cloud monitoring overviewCloud monitoring overview
Cloud monitoring overview
 
Consistency As A Service:Auditing Cloud Consistency
Consistency As A Service:Auditing Cloud ConsistencyConsistency As A Service:Auditing Cloud Consistency
Consistency As A Service:Auditing Cloud Consistency
 
IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Clou...
IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Clou...IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Clou...
IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Clou...
 
Strongly DisagreeDisagreeNeutralAgreeStrongly AgreeI t.docx
Strongly DisagreeDisagreeNeutralAgreeStrongly AgreeI t.docxStrongly DisagreeDisagreeNeutralAgreeStrongly AgreeI t.docx
Strongly DisagreeDisagreeNeutralAgreeStrongly AgreeI t.docx
 
Microservices Security landscape
Microservices Security landscapeMicroservices Security landscape
Microservices Security landscape
 

Recently uploaded

Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 

Recently uploaded (20)

Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 

FINAL REVIEW.pptx

  • 1. BALANCING PERFORMANCE, ACCURACY, AND PRECISION FOR SECURE CLOUD TRANSACTIONS PRESENTED BY
  • 2. ABSTRACT  In this paper, we highlight the criticality of the problem.  We then define the notion of trusted transactions when dealing with proofs of authorization.  Accordingly, we propose several increasingly stringent levels of policy consistency constraints, and present different enforcement approaches to guarantee the trustworthiness of transactions executing on cloud servers.
  • 3. Contd…  We propose a Two-Phase Validation Commit protocol as a solution, which is a modified version of the basic Two-Phase Validation Commit protocols.  We finally analyze the different approaches presented using both analytical evaluation of the overheads and simulations to guide the decision makers to which approach to use.
  • 4. EXISTING SYSTEM  To provide scalability and elasticity, cloud services often make heavy use of replication to ensure consistent performance and availability.  As a result, many cloud services rely on the notion of eventual consistency when propagating data throughout the system.
  • 5. Contd…  This consistency model is a variant of weak consistency that allows data to be inconsistent among some replicas during the update process, but ensures that updates will eventually be propagated to all replicas.
  • 6. DISADVANTAGES OF EXISTING SYSTEM  consistency problems can arise as transactional database systems are deployed in cloud environments.  Use policy-based authorization systems to protect sensitive resources.  The system may suffer from policy inconsistencies during policy updates.  It is possible for external factors to cause user credential inconsistencies over the lifetime of a transaction
  • 7. PROPOSED SYSTEM  We formalize the concept of trusted transactions.  We define several different levels of policy consistency constraints and corresponding enforcement approaches that guarantee the trustworthiness of transactions executing on cloud servers.
  • 8.  We propose a Two-Phase Validation Commit (2PVC) protocol that ensures that a transaction is safe by checking policy, credential, and data consistency during transaction execution.  We carry out an experimental evaluation of our proposed approaches
  • 9. ADVANTAGES OF PROPOSED SYSTEM  Identifies transactions that are both trusted and conform to the ACID properties of distributed database systems.  Guarantee the trustworthiness of transactions executing on cloud servers.  A transaction is safe by checking policy, credential, and data consistency during transaction execution .  Most suitable in various situations.
  • 11. HARDWARE REQUIREMENTS  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 512 Mb.
  • 12. SOFTWARE REQUIREMENTS  Operating system : Windows XP/7.  Coding Language : ASP.net, C#.net  Tool : Visual Studio 2010  Database : SQL SERVER 2008
  • 13. MODULES:  Server Module.  Cloud User Module.  Transaction Manager.  Certificate Authorities.
  • 14. Server Model  In this Module, We design a cloud infrastructure consisting of a set of servers, where each server is responsible for hosting a subset of all data items belonging to a specific application domain.
  • 15. Cloud User Module  In this Module, Users interact with the system by submitting queries or update requests encapsulated in ACID transactions.  Since transactions are executed over time, the state information of the credentials and the policies enforced by different servers are subject to changes at any time instance, therefore it becomes important to introduce precise definitions for the different consistency levels that could be achieved within a transaction’s lifetime. These consistency models strengthen the trusted transaction definition by defining the environment in which policy versions are consistent relative to the rest of the system.
  • 16. Transaction Manager  A transaction is submitted to a Transaction Manager(TM) that coordinates its execution. Multiple TMs could be invoked as the system workload increases for load balancing, but each transaction is handled by only one TM.  A common characteristic of most of our proposed approaches to achieve trusted transactions is the need for policy consistency validation at the end of a transaction. That is, in order for a trusted transaction to commit, its TM has to enforce either view or global consistency among the servers participating in the transaction.
  • 17. Certificate Authorities  We use the set of all credentials, which are issued by the Certificate Authorities (CAs) within the system. We assume that each CA offers an online method that allows any server to check the current status of credentials that it has issued.
  • 18.
  • 19.
  • 20.
  • 21. REFERENCES  Marian K. Iskander, Tucker Trainor, Dave W. Wilkinson, Adam J. Lee, and Panos K. Chrysanthis, “Balancing Performance, Accuracy, and Precision for Secure Cloud Transactions”, VOL. 25, NO. 2, FEBRUARY 2014.