ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

INTRUSION DETECTION ON CLOUD APPLICATIONS

Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.2, No. 9)

Publication Date:

Authors : ;

Page : 1-7

Keywords : Cloud Computing; Data Storage; DRCP; Framework; Intrusion Tolerance; OLSR; Reed- Solomon Encoding; Shamir Secret Sharing; SHIM; Security; Threshold Cryptography;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Cloud computing has grown from being a promising business concept to one of the fastest growing segments of the IT industry. So, cloud environment always remains vulnerable to attacks. The framework serves as an excellent platform for making cloud services intrusion tolerant. The feasibility of the framework has been tested by making cloud’s Infrastructure as a Service (IaaS) and Data Storage Service intrusion tolerant. The proposed framework has been validated by integrating Intrusion Tolerance via Threshold Cryptography (ITTC) mechanism in the simulated cloud’s IaaS. For this, the data centre authentication key is distributed among the hosts using Shamir Secret Sharing algorithm. Performance of the new simulated service model is measured using various performance metrics such as total execution time, intrusion detection time, recovery time, number of cloudlets etc. It involves, using proposed Cloud Intrusion Tolerance framework for securing cloud Data Storage. The correctness of user’s data is ensured by using erasure-correcting code in the file distribution preparation to provide redundancy parity vectors. Performance analysis using erasure-correcting code for securing data storage is also done. We are also implementing the different networks such as SHIM (System Health and Intrusion Monitoring) is used as an exemplary host-based IDS to validate our approach, DRCP (Dynamic Registration and Configuration Protocol) is an auto configuration protocol in mobile AdHoc networks, OLSR (Optimized Link State Routing) protocol is a proactive, table-driven routing protocol in MANETs.

Last modified: 2013-09-12 17:09:53