SlideShare a Scribd company logo
1 of 15
SECAB INSTITUTE OF ENGINEERING & TECH.,BIJAPUR
     DEPARTMENT OF COMPUTER SCIENCE ENGINEERING




                  GEODAC

    PRESENTED BY:                 UNDER THE GUIDENCE OF:
    ROKAD MO. TAUSIF              MR. ASLAM K.
   Introduction
   Requirements for Data Assurance
   Overview
   Enforcement Model Example
   Architecture
   Implementation
   Experiments with sample policies in GEODAC
   Conclusion
   References
   Transforming of Software products

   Advances in cloud computing

   Software-as-a-service (SaaS)

   Challenges of providing support

   Policy modeling and enforcement framework
   Privacy Requirements

   Data Migration Requirements

   Data Confidentiality Requirements

   Data Availability Requirements

   Appropriate for Use Requirements
   The service provider publishes its data
    assurance capabilities for each service on
    individual data object types that are involved
    in the service

   Two aspects of data assurance policies are
    considered: data object identification and
    policy configuration
The GEODAC framework for data assurance policy
        specification and enforcement.
   Data Retention

   Data Migration
State Machine Based Data Retention Policy
   WS-Data Assurance Policy Repository

   State Machine-Based Policy Repository

   All the messages that belong to the same
    policy execution instance are routed to the
    same policy execution engine

    If child enforcement models of a policy
    execution instance are involved
Architecture for policy execution and management.
   WS-DataAssurancePolicy enforcement
    framework in Microsoft .NET environment

   The service modules, i.e., WS-
    DataAssurancePolicy Repository, Policy
    Management Service, and Data Policy
    Tracking Service
   A client application invokes the application
    service



   Data Mining Service’s methods, such as
    CustomerDataStore-Initialization,
    CustomerDataImport, CustomerDataExport,
    etc.
   The GEODAC framework for identifying,
    capturing, and enforcing data assurance
    policies

   Policies to protect persistent data stored in
    service provider environments
   S. Bajaj et al., “Web Services Policy 1.2 - Framework (WS-
    Policy),” http://www.w3.org/Submission/WS-Policy, Apr.
    2006.

   J. Li et al., “A Policy Framework for Data Management in
    Services,” Proc. Fourth Int’l Workshop Dependability Aspects
    on Data Warehousing and Mining Applications, Mar. 2009.

   E. Damiani et al., “Selective Data Encryption in Outsourced
    Dynamic Environments,” Electronic Notes in Theoretical
    Computer Science, vol. 168, pp. 127-142, 2007.
Thank
 You….

More Related Content

What's hot

Ensuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloudEnsuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloud
roopini gada
 
DTC PA SOA and Leaders in Information Exchange
DTC PA SOA and Leaders in Information ExchangeDTC PA SOA and Leaders in Information Exchange
DTC PA SOA and Leaders in Information Exchange
Maggie Fawley
 
DTC MD Solutions Without Boundaries
DTC MD Solutions Without BoundariesDTC MD Solutions Without Boundaries
DTC MD Solutions Without Boundaries
Maggie Fawley
 
Ogsa ogsi service elements and layered model
Ogsa ogsi service elements and layered modelOgsa ogsi service elements and layered model
Ogsa ogsi service elements and layered model
Pooja Dixit
 
A Description Framework for Digital Public Services
A Description Framework for Digital Public ServicesA Description Framework for Digital Public Services
A Description Framework for Digital Public Services
Yannis Charalabidis
 

What's hot (13)

Ensuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloudEnsuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloud
 
PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVOC...
PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVOC...PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVOC...
PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVOC...
 
ATMOSPHERE Objectives of the Project (ICT Week Brasilia - Brazil)
ATMOSPHERE Objectives of the Project (ICT Week Brasilia - Brazil)ATMOSPHERE Objectives of the Project (ICT Week Brasilia - Brazil)
ATMOSPHERE Objectives of the Project (ICT Week Brasilia - Brazil)
 
DAPSI - Open Call #1 - Webinar #1
DAPSI - Open Call #1 - Webinar #1DAPSI - Open Call #1 - Webinar #1
DAPSI - Open Call #1 - Webinar #1
 
5
55
5
 
DTC PA SOA and Leaders in Information Exchange
DTC PA SOA and Leaders in Information ExchangeDTC PA SOA and Leaders in Information Exchange
DTC PA SOA and Leaders in Information Exchange
 
DTC MD Solutions Without Boundaries
DTC MD Solutions Without BoundariesDTC MD Solutions Without Boundaries
DTC MD Solutions Without Boundaries
 
Pistoia Alliance conference April 2016: Big Data: Eric Little
Pistoia Alliance conference April 2016: Big Data: Eric LittlePistoia Alliance conference April 2016: Big Data: Eric Little
Pistoia Alliance conference April 2016: Big Data: Eric Little
 
Ogsa ogsi service elements and layered model
Ogsa ogsi service elements and layered modelOgsa ogsi service elements and layered model
Ogsa ogsi service elements and layered model
 
Ogsi standards
Ogsi standardsOgsi standards
Ogsi standards
 
A Description Framework for Digital Public Services
A Description Framework for Digital Public ServicesA Description Framework for Digital Public Services
A Description Framework for Digital Public Services
 
phr
phrphr
phr
 
DIRISA for Open Data and Open Science/Anwar Vahed
DIRISA for Open Data and Open Science/Anwar VahedDIRISA for Open Data and Open Science/Anwar Vahed
DIRISA for Open Data and Open Science/Anwar Vahed
 

Viewers also liked

The Future Continuous Tense
The Future Continuous TenseThe Future Continuous Tense
The Future Continuous Tense
Romanychch
 
SAP_MobileGuide 2013
SAP_MobileGuide 2013SAP_MobileGuide 2013
SAP_MobileGuide 2013
Jann Yip
 

Viewers also liked (13)

Deccan Arcade 2
Deccan Arcade 2Deccan Arcade 2
Deccan Arcade 2
 
Halal Food Industries Oct.2016
Halal Food Industries Oct.2016Halal Food Industries Oct.2016
Halal Food Industries Oct.2016
 
tecnología de información e innovacion
tecnología de información e innovaciontecnología de información e innovacion
tecnología de información e innovacion
 
O caligrama
O caligramaO caligrama
O caligrama
 
Smart CTO Service
Smart CTO ServiceSmart CTO Service
Smart CTO Service
 
Recursos Educativos Digitais, Literacia e Desenvolvimento Profissional Docente
Recursos Educativos Digitais, Literacia e Desenvolvimento Profissional DocenteRecursos Educativos Digitais, Literacia e Desenvolvimento Profissional Docente
Recursos Educativos Digitais, Literacia e Desenvolvimento Profissional Docente
 
Qi aceav final
Qi aceav finalQi aceav final
Qi aceav final
 
A aprendizagem em rede no ensino superior online
A aprendizagem em rede no ensino superior onlineA aprendizagem em rede no ensino superior online
A aprendizagem em rede no ensino superior online
 
904 practica 3
904 practica 3904 practica 3
904 practica 3
 
Shakespeare's sonnets
Shakespeare's sonnetsShakespeare's sonnets
Shakespeare's sonnets
 
329
329329
329
 
The Future Continuous Tense
The Future Continuous TenseThe Future Continuous Tense
The Future Continuous Tense
 
SAP_MobileGuide 2013
SAP_MobileGuide 2013SAP_MobileGuide 2013
SAP_MobileGuide 2013
 

Similar to Geodac ppt

t2_4-architecting-data-for-integration-and-longevity
t2_4-architecting-data-for-integration-and-longevityt2_4-architecting-data-for-integration-and-longevity
t2_4-architecting-data-for-integration-and-longevity
Jonathan Hamilton Solórzano
 
Transforming the Data into Virtual Set Up Segmented usage and Adoption
Transforming the Data into Virtual Set Up Segmented usage and AdoptionTransforming the Data into Virtual Set Up Segmented usage and Adoption
Transforming the Data into Virtual Set Up Segmented usage and Adoption
ijtsrd
 
IBM Offers ISVs a Fast Track for Virtual Appliance Deployment on New IBM Pure...
IBM Offers ISVs a Fast Track for Virtual Appliance Deployment on New IBM Pure...IBM Offers ISVs a Fast Track for Virtual Appliance Deployment on New IBM Pure...
IBM Offers ISVs a Fast Track for Virtual Appliance Deployment on New IBM Pure...
benzfire
 
.Net projects 2011 by core ieeeprojects.com
.Net projects 2011 by core ieeeprojects.com .Net projects 2011 by core ieeeprojects.com
.Net projects 2011 by core ieeeprojects.com
msudan92
 
Priority Based Prediction Mechanism for Ranking Providers in Federated Cloud ...
Priority Based Prediction Mechanism for Ranking Providers in Federated Cloud ...Priority Based Prediction Mechanism for Ranking Providers in Federated Cloud ...
Priority Based Prediction Mechanism for Ranking Providers in Federated Cloud ...
IJERA Editor
 

Similar to Geodac ppt (20)

360º Degree Requirement Elicitation Framework for Cloud Service Providers
360º Degree Requirement Elicitation Framework for Cloud Service Providers360º Degree Requirement Elicitation Framework for Cloud Service Providers
360º Degree Requirement Elicitation Framework for Cloud Service Providers
 
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS)
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS) AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS)
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS)
 
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE (DBAAS)
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE (DBAAS)AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE (DBAAS)
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE (DBAAS)
 
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS)
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS) AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS)
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS)
 
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS)
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS) AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS)
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS)
 
Security in Semantic Web Services
Security in Semantic Web ServicesSecurity in Semantic Web Services
Security in Semantic Web Services
 
t2_4-architecting-data-for-integration-and-longevity
t2_4-architecting-data-for-integration-and-longevityt2_4-architecting-data-for-integration-and-longevity
t2_4-architecting-data-for-integration-and-longevity
 
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and SolutionsSecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
 
SOA Security Model For EAI
SOA Security Model For EAISOA Security Model For EAI
SOA Security Model For EAI
 
Transforming the Data into Virtual Set Up Segmented usage and Adoption
Transforming the Data into Virtual Set Up Segmented usage and AdoptionTransforming the Data into Virtual Set Up Segmented usage and Adoption
Transforming the Data into Virtual Set Up Segmented usage and Adoption
 
A proficient 5 c approach to boost the security in the saas model's technical...
A proficient 5 c approach to boost the security in the saas model's technical...A proficient 5 c approach to boost the security in the saas model's technical...
A proficient 5 c approach to boost the security in the saas model's technical...
 
privacy-enhanced web service composition
privacy-enhanced web service compositionprivacy-enhanced web service composition
privacy-enhanced web service composition
 
Evaluation of a Framework for Integrated Web Services
Evaluation of a Framework for Integrated Web ServicesEvaluation of a Framework for Integrated Web Services
Evaluation of a Framework for Integrated Web Services
 
A Journey to Enterprise Agility: Migrating 15 Atlassian Instances to Data Center
A Journey to Enterprise Agility: Migrating 15 Atlassian Instances to Data CenterA Journey to Enterprise Agility: Migrating 15 Atlassian Instances to Data Center
A Journey to Enterprise Agility: Migrating 15 Atlassian Instances to Data Center
 
A Generic Model for Student Data Analytic Web Service (SDAWS)
A Generic Model for Student Data Analytic Web Service (SDAWS)A Generic Model for Student Data Analytic Web Service (SDAWS)
A Generic Model for Student Data Analytic Web Service (SDAWS)
 
IBM Offers ISVs a Fast Track for Virtual Appliance Deployment on New IBM Pure...
IBM Offers ISVs a Fast Track for Virtual Appliance Deployment on New IBM Pure...IBM Offers ISVs a Fast Track for Virtual Appliance Deployment on New IBM Pure...
IBM Offers ISVs a Fast Track for Virtual Appliance Deployment on New IBM Pure...
 
.Net projects 2011 by core ieeeprojects.com
.Net projects 2011 by core ieeeprojects.com .Net projects 2011 by core ieeeprojects.com
.Net projects 2011 by core ieeeprojects.com
 
Review_2013
Review_2013Review_2013
Review_2013
 
Priority Based Prediction Mechanism for Ranking Providers in Federated Cloud ...
Priority Based Prediction Mechanism for Ranking Providers in Federated Cloud ...Priority Based Prediction Mechanism for Ranking Providers in Federated Cloud ...
Priority Based Prediction Mechanism for Ranking Providers in Federated Cloud ...
 
Cloud Use Cases And Standards
Cloud Use Cases And StandardsCloud Use Cases And Standards
Cloud Use Cases And Standards
 

Geodac ppt

  • 1. SECAB INSTITUTE OF ENGINEERING & TECH.,BIJAPUR DEPARTMENT OF COMPUTER SCIENCE ENGINEERING GEODAC PRESENTED BY: UNDER THE GUIDENCE OF: ROKAD MO. TAUSIF MR. ASLAM K.
  • 2. Introduction  Requirements for Data Assurance  Overview  Enforcement Model Example  Architecture  Implementation  Experiments with sample policies in GEODAC  Conclusion  References
  • 3. Transforming of Software products  Advances in cloud computing  Software-as-a-service (SaaS)  Challenges of providing support  Policy modeling and enforcement framework
  • 4. Privacy Requirements  Data Migration Requirements  Data Confidentiality Requirements  Data Availability Requirements  Appropriate for Use Requirements
  • 5. The service provider publishes its data assurance capabilities for each service on individual data object types that are involved in the service  Two aspects of data assurance policies are considered: data object identification and policy configuration
  • 6. The GEODAC framework for data assurance policy specification and enforcement.
  • 7. Data Retention  Data Migration
  • 8. State Machine Based Data Retention Policy
  • 9. WS-Data Assurance Policy Repository  State Machine-Based Policy Repository  All the messages that belong to the same policy execution instance are routed to the same policy execution engine  If child enforcement models of a policy execution instance are involved
  • 10. Architecture for policy execution and management.
  • 11. WS-DataAssurancePolicy enforcement framework in Microsoft .NET environment  The service modules, i.e., WS- DataAssurancePolicy Repository, Policy Management Service, and Data Policy Tracking Service
  • 12. A client application invokes the application service  Data Mining Service’s methods, such as CustomerDataStore-Initialization, CustomerDataImport, CustomerDataExport, etc.
  • 13. The GEODAC framework for identifying, capturing, and enforcing data assurance policies  Policies to protect persistent data stored in service provider environments
  • 14. S. Bajaj et al., “Web Services Policy 1.2 - Framework (WS- Policy),” http://www.w3.org/Submission/WS-Policy, Apr. 2006.  J. Li et al., “A Policy Framework for Data Management in Services,” Proc. Fourth Int’l Workshop Dependability Aspects on Data Warehousing and Mining Applications, Mar. 2009.  E. Damiani et al., “Selective Data Encryption in Outsourced Dynamic Environments,” Electronic Notes in Theoretical Computer Science, vol. 168, pp. 127-142, 2007.