1. SECAB INSTITUTE OF ENGINEERING & TECH.,BIJAPUR
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING
GEODAC
PRESENTED BY: UNDER THE GUIDENCE OF:
ROKAD MO. TAUSIF MR. ASLAM K.
2. Introduction
Requirements for Data Assurance
Overview
Enforcement Model Example
Architecture
Implementation
Experiments with sample policies in GEODAC
Conclusion
References
3. Transforming of Software products
Advances in cloud computing
Software-as-a-service (SaaS)
Challenges of providing support
Policy modeling and enforcement framework
4. Privacy Requirements
Data Migration Requirements
Data Confidentiality Requirements
Data Availability Requirements
Appropriate for Use Requirements
5. The service provider publishes its data
assurance capabilities for each service on
individual data object types that are involved
in the service
Two aspects of data assurance policies are
considered: data object identification and
policy configuration
9. WS-Data Assurance Policy Repository
State Machine-Based Policy Repository
All the messages that belong to the same
policy execution instance are routed to the
same policy execution engine
If child enforcement models of a policy
execution instance are involved
11. WS-DataAssurancePolicy enforcement
framework in Microsoft .NET environment
The service modules, i.e., WS-
DataAssurancePolicy Repository, Policy
Management Service, and Data Policy
Tracking Service
12. A client application invokes the application
service
Data Mining Service’s methods, such as
CustomerDataStore-Initialization,
CustomerDataImport, CustomerDataExport,
etc.
13. The GEODAC framework for identifying,
capturing, and enforcing data assurance
policies
Policies to protect persistent data stored in
service provider environments
14. S. Bajaj et al., “Web Services Policy 1.2 - Framework (WS-
Policy),” http://www.w3.org/Submission/WS-Policy, Apr.
2006.
J. Li et al., “A Policy Framework for Data Management in
Services,” Proc. Fourth Int’l Workshop Dependability Aspects
on Data Warehousing and Mining Applications, Mar. 2009.
E. Damiani et al., “Selective Data Encryption in Outsourced
Dynamic Environments,” Electronic Notes in Theoretical
Computer Science, vol. 168, pp. 127-142, 2007.