Cloud Controller Security
Policy Framework for Mitigating
Denial of Service Attack
Authors :
Manjunath S
N.S. Anup Bharadw...
Buzz of “Cloud Computing”
Computational Approach
Why Cloud Computing…!
Three main Features of Cloud Computing
 Elastic
 Economies of Scale
 Pay as You Go
Security Issues in Cloud
Computing
Flooding
 Sending huge amount of non-sense
requests to server
Crawling
 Impersonate an authorized user
DoS Attack…
Step
Towards The
SolutionSecurity
Management
Framework
Objectives of
Proposed System
 To provide high-level security mechanisms
 Detecting malicious access in
Cloud Storage Sy...
Proposed System
 Cloud controller
 Clients
 Virtual machine
 Cloud Infrastructure
 Malicious process
Requirements
 Software requirements
 OS : Windows XP/Vista
 Java, Sql, Servelets
 Hardware requirements
 Intel Pentiu...
Process Flow Diagram
Hardware Design
Software Design
Portability Integrity Extensibility
System Implementation
 Implementation requirements.
 Selection of the platform (Operating System).
 Selection of the pr...
Applications
 Cloud Storage for Video Surveillance
Applications
 Storing Medical Records in The Cloud
 High level security
mechanisms for cloud
storage services.
 Detecting the malicious
access in cloud storage
systems.
 ...
 Security for data access management is achieved
by mitigating denial of service attack incorporating
Security policies o...
 Detection of various types of Attacks
 The limitations of our Security
Management framework, with respect to
the accura...
Cloud computing security policy framework for mitigating denial of service attack
Cloud computing security policy framework for mitigating denial of service attack
Cloud computing security policy framework for mitigating denial of service attack
Cloud computing security policy framework for mitigating denial of service attack
Cloud computing security policy framework for mitigating denial of service attack
Cloud computing security policy framework for mitigating denial of service attack
Upcoming SlideShare
Loading in …5
×

Cloud computing security policy framework for mitigating denial of service attack

708 views

Published on

It's all in the title.

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
708
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
46
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Cloud computing security policy framework for mitigating denial of service attack

  1. 1. Cloud Controller Security Policy Framework for Mitigating Denial of Service Attack Authors : Manjunath S N.S. Anup Bharadwaj Venkatesh Prabhu K Muneshwara M.S Department of CSE BMS Institute of Technology
  2. 2. Buzz of “Cloud Computing”
  3. 3. Computational Approach
  4. 4. Why Cloud Computing…!
  5. 5. Three main Features of Cloud Computing  Elastic  Economies of Scale  Pay as You Go
  6. 6. Security Issues in Cloud Computing
  7. 7. Flooding  Sending huge amount of non-sense requests to server
  8. 8. Crawling  Impersonate an authorized user
  9. 9. DoS Attack…
  10. 10. Step Towards The SolutionSecurity Management Framework
  11. 11. Objectives of Proposed System  To provide high-level security mechanisms  Detecting malicious access in Cloud Storage Systems  Implementing Security Management Framework
  12. 12. Proposed System  Cloud controller  Clients  Virtual machine  Cloud Infrastructure  Malicious process
  13. 13. Requirements  Software requirements  OS : Windows XP/Vista  Java, Sql, Servelets  Hardware requirements  Intel Pentium III Processor  LAN / Internet Connection to Server machine  TCP / IP networking between clients and server
  14. 14. Process Flow Diagram
  15. 15. Hardware Design
  16. 16. Software Design Portability Integrity Extensibility
  17. 17. System Implementation  Implementation requirements.  Selection of the platform (Operating System).  Selection of the programming language for development of the application.  Coding guideline to be followed.
  18. 18. Applications  Cloud Storage for Video Surveillance
  19. 19. Applications  Storing Medical Records in The Cloud
  20. 20.  High level security mechanisms for cloud storage services.  Detecting the malicious access in cloud storage systems.  Experimentation is economical.  Scaling is quick.  Provides security against DOS attacks.  The cloud resources are too expensive.  The installation process takes more time.  If the virtual machine goes down, entire system will shutdown.
  21. 21.  Security for data access management is achieved by mitigating denial of service attack incorporating Security policies on cloud.  We address this security problem in the proposed System by using cloud controller in a virtual machine where the data access management is controlled by blocking illegal data access on cloud.
  22. 22.  Detection of various types of Attacks  The limitations of our Security Management framework, with respect to the accuracy of the detection  Develop the Trust Management component of the security management framework  Study the impact management framework has on the Policy

×