scholarly journals Security Issues of Web Services of Large Scale Distributed Database

Author(s):  
Dr. Manish Jivtode

Cloud computing is viewed as one of the most promising technologies in computing today. This is a new concept of large scale distributed computing. It provides an open platform for every user on the pay-per-use basis. Cloud computing provides number of interfaces and APIs to interact with the services provided to the users. With the development of web services distributed application, Security of data is another important subject in various layers of distributed computing. In this study, security of data that can be used during the access of distributed environment over various layers will be described.

2020 ◽  
pp. 395-409
Author(s):  
Neeraj Bhargava ◽  
Srinivas Kumar Palvadi ◽  
Abhishek Kumar ◽  
Pramod Singh Rathore

Distributed computing is a rising innovation that is in effect generally embraced all through the world because of its usability. Associations of various types can utilize it without pre-requirements, for example, IT infra-structure, specialized abilities, administrative over-burden, stockpiling limit, preparing force, and information recuperation or protection setup. It can be profited by all customers according to their requirements, desires and spending plan. In any case, distributed computing present's new sorts of security vulnerabilities that should be promotion dressed. Customary “PC forensics” manages location, acquisition and counteractive action of IT activated fakes and violations, however, it does not have the capacity to manage cybercrimes relating to distributed computing condition. In this article, the authors concentrate on legal sciences issues in distributed computing, survey restrictions of criminological group and present the hindrances looked amid evaluation. As the basis of the cloud computing and the implementation in the cloud environment is a great task to protect the user information without causing any security issue and the consistency in the data must be provided by the service provider. Distributed systems or the operations in the distributed environment will increase the usability of the resources as well as the capability of the data transmission and provide the information required in an effective manner without interrupting the security issues. But even though the clients from the different parts of the globe are focusing on the gaps in security in the Cloud computing and distributed environment. Here we are focusing on the business model that will increase the revenue of the firms which are concentrating on implementing the cloud computing and the distributed environment in their respective areas. Forensics in the customer management in the distributed environment will give the complete picture on the digital marketing, standards of data distribution and the security. In this article we focus on the security implementation and the raise of utilization of the distributed environments and the cloud data storage capabilities. This will more focus on the data security.


2019 ◽  
Vol 9 (1) ◽  
pp. 36-49
Author(s):  
Neeraj Bhargava ◽  
Srinivas Kumar Palvadi ◽  
Abhishek Kumar ◽  
Pramod Singh Rathore

Distributed computing is a rising innovation that is in effect generally embraced all through the world because of its usability. Associations of various types can utilize it without pre-requirements, for example, IT infra-structure, specialized abilities, administrative over-burden, stockpiling limit, preparing force, and information recuperation or protection setup. It can be profited by all customers according to their requirements, desires and spending plan. In any case, distributed computing present's new sorts of security vulnerabilities that should be promotion dressed. Customary “PC forensics” manages location, acquisition and counteractive action of IT activated fakes and violations, however, it does not have the capacity to manage cybercrimes relating to distributed computing condition. In this article, the authors concentrate on legal sciences issues in distributed computing, survey restrictions of criminological group and present the hindrances looked amid evaluation. As the basis of the cloud computing and the implementation in the cloud environment is a great task to protect the user information without causing any security issue and the consistency in the data must be provided by the service provider. Distributed systems or the operations in the distributed environment will increase the usability of the resources as well as the capability of the data transmission and provide the information required in an effective manner without interrupting the security issues. But even though the clients from the different parts of the globe are focusing on the gaps in security in the Cloud computing and distributed environment. Here we are focusing on the business model that will increase the revenue of the firms which are concentrating on implementing the cloud computing and the distributed environment in their respective areas. Forensics in the customer management in the distributed environment will give the complete picture on the digital marketing, standards of data distribution and the security. In this article we focus on the security implementation and the raise of utilization of the distributed environments and the cloud data storage capabilities. This will more focus on the data security.


2021 ◽  
Author(s):  
◽  
Kyle Chard

<p>The computational landscape is littered with islands of disjoint resource providers including commercial Clouds, private Clouds, national Grids, institutional Grids, clusters, and data centers. These providers are independent and isolated due to a lack of communication and coordination, they are also often proprietary without standardised interfaces, protocols, or execution environments. The lack of standardisation and global transparency has the effect of binding consumers to individual providers. With the increasing ubiquity of computation providers there is an opportunity to create federated architectures that span both Grid and Cloud computing providers effectively creating a global computing infrastructure. In order to realise this vision, secure and scalable mechanisms to coordinate resource access are required. This thesis proposes a generic meta-scheduling architecture to facilitate federated resource allocation in which users can provision resources from a range of heterogeneous (service) providers. Efficient resource allocation is difficult in large scale distributed environments due to the inherent lack of centralised control. In a Grid model, local resource managers govern access to a pool of resources within a single administrative domain but have only a local view of the Grid and are unable to collaborate when allocating jobs. Meta-schedulers act at a higher level able to submit jobs to multiple resource managers, however they are most often deployed on a per-client basis and are therefore concerned with only their allocations, essentially competing against one another. In a federated environment the widespread adoption of utility computing models seen in commercial Cloud providers has re-motivated the need for economically aware meta-schedulers. Economies provide a way to represent the different goals and strategies that exist in a competitive distributed environment. The use of economic allocation principles effectively creates an open service market that provides efficient allocation and incentives for participation. The major contributions of this thesis are the architecture and prototype implementation of the DRIVE meta-scheduler. DRIVE is a Virtual Organisation (VO) based distributed economic metascheduler in which members of the VO collaboratively allocate services or resources. Providers joining the VO contribute obligation services to the VO. These contributed services are in effect membership “dues” and are used in the running of the VOs operations – for example allocation, advertising, and general management. DRIVE is independent from a particular class of provider (Service, Grid, or Cloud) or specific economic protocol. This independence enables allocation in federated environments composed of heterogeneous providers in vastly different scenarios. Protocol independence facilitates the use of arbitrary protocols based on specific requirements and infrastructural availability. For instance, within a single organisation where internal trust exists, users can achieve maximum allocation performance by choosing a simple economic protocol. In a global utility Grid no such trust exists. The same meta-scheduler architecture can be used with a secure protocol which ensures the allocation is carried out fairly in the absence of trust. DRIVE establishes contracts between participants as the result of allocation. A contract describes individual requirements and obligations of each party. A unique two stage contract negotiation protocol is used to minimise the effect of allocation latency. In addition due to the co-op nature of the architecture and the use of secure privacy preserving protocols, DRIVE can be deployed in a distributed environment without requiring large scale dedicated resources. This thesis presents several other contributions related to meta-scheduling and open service markets. To overcome the perceived performance limitations of economic systems four high utilisation strategies have been developed and evaluated. Each strategy is shown to improve occupancy, utilisation and profit using synthetic workloads based on a production Grid trace. The gRAVI service wrapping toolkit is presented to address the difficulty web enabling existing applications. The gRAVI toolkit has been extended for this thesis such that it creates economically aware (DRIVE-enabled) services that can be transparently traded in a DRIVE market without requiring developer input. The final contribution of this thesis is the definition and architecture of a Social Cloud – a dynamic Cloud computing infrastructure composed of virtualised resources contributed by members of a Social network. The Social Cloud prototype is based on DRIVE and highlights the ease in which dynamic DRIVE markets can be created and used in different domains.</p>


Cloud computing is the on-request accessibility of computer system resources, specially data storage and computing power, without direct dynamic management by the client. In the simplest terms, cloud computing means storing and accessing data and programs over the Internet instead of your computer’s hard drive. Along the improvement of cloud computing, more and more applications are migrated into the cloud. A significant element of distributed computing is pay-more only as costs arise. Distributed computing gives strong computational capacity to the general public at diminished cost that empowers clients with least computational assets to redistribute their huge calculation outstanding burdens to the cloud, and monetarily appreciate the monstrous computational force, transmission capacity, stockpiling, and even reasonable programming that can be partaken in a compensation for each utilization way Tremendous bit of leeway is the essential objective that forestalls the wide scope of registering model for clients when their secret information are expended during the figuring procedure. Critical thinking is a system to arrive at the pragmatic objective of specific instruments that tackles the issues as well as shield from pernicious practices.. In this paper, we examine secure outsourcing for large-scale systems of linear equations, which are the most popular problems in various engineering disciplines. Linear programming is an operation research technique formulates private data by the customer for LP problem as a set of matrices and vectors, to develop a set of efficient privacypreserving problem transformation techniques, which allow customers to transform original LP problem into some arbitrary one while protecting sensitive input/output information. Identify that LP problem solving in Cloud component is efficient extra cost on cloud server. In this paper we are utilizing Homomorphic encryption system to increase the performance and time efficiency


2018 ◽  
Vol 7 (4.6) ◽  
pp. 13
Author(s):  
Mekala Sandhya ◽  
Ashish Ladda ◽  
Dr. Uma N Dulhare ◽  
. . ◽  
. .

In this generation of Internet, information and data are growing continuously. Even though various Internet services and applications. The amount of information is increasing rapidly. Hundred billions even trillions of web indexes exist. Such large data brings people a mass of information and more difficulty discovering useful knowledge in these huge amounts of data at the same time. Cloud computing can provide infrastructure for large data. Cloud computing has two significant characteristics of distributed computing i.e. scalability, high availability. The scalability can seamlessly extend to large-scale clusters. Availability says that cloud computing can bear node errors. Node failures will not affect the program to run correctly. Cloud computing with data mining does significant data processing through high-performance machine. Mass data storage and distributed computing provide a new method for mass data mining and become an effective solution to the distributed storage and efficient computing in data mining. 


2021 ◽  
Vol 10 (1) ◽  
pp. 13-17
Author(s):  
S. Ravichandran ◽  
J. Sathiamoorthy

Distributed computing has been imagined as the cutting edge engineering of IT Enterprise. It moves the application programming and information bases to the incorporated enormous server farms, where the administration of the information and administrations may not be completely dependable. There are various security issues for distributed computing as it envelops numerous innovations including networks, information bases, working frameworks, virtualization, asset planning, exchange the board, load adjusting, simultaneousness control and memory the executives. Putting away information in an outsider's cloud framework causes genuine worry over information secrecy. Hence, security issues for a large number of these frameworks and advancements are material to distributed computing. We propose a key worker encryption conspire and incorporate it with a decentralized deletion code with the end goal that a safe conveyed stockpiling key framework is defined respectively.


Author(s):  
Dina Mohsen Zoughbi ◽  
Nitul Dutta

Cloud computing is the most important technology at the present time, in terms of reducing applications costs and makes them more scalable and flexible. As the cloud currency is based on building virtualization technology, so it can secure a large-scale environment with limited security capacity such as the cloud. Where, Malicious activities lead the attackers to penetrate virtualization technologies that endanger the infrastructure, and then enabling attacker access to other virtual machines which running on the same vulnerable device. The proposed work in this paper is to review and discuss the attacks and intrusions that allow a malicious virtual machine (VM) to penetrate hypervisor, especially the technologies that malicious virtual machines work on, to steal more than their allocated quota from material resources, and the use of side channels to steal data and Passing buffer barriers between virtual machines. This paper is based on the Security Study of Cloud Hypervisors and classification of vulnerabilities, security issues, and possible solutions that virtual machines are exposed to. Therefore, we aim to provide researchers, academics, and industry with a better understanding of all attacks and defense mechanisms to protect cloud security. and work on building a new security architecture in a virtual technology based on hypervisor to protect and ensure the security of the cloud.


2020 ◽  
Vol 19 ◽  

The SHAPES project is an ambitious endeavor that gathers stakeholders from across Europe to create, deploy and pilot at large-scale a EU-standardized open platform incorporating and integrating a broad range of solutions, including technological, organizational, clinical, educational and societal, to enable the ageing population of Europe to remain healthy, active and productive, as well as to maintain a high quality of life and sense of wellbeing for the longest time possible. The research question of this design science research (DSR) is how to build and deploy health and care (H&C) services into a future society in such a way that citizens are able to use them safely in their everyday lives? We found that considerable work is needed to develop the required architecture in smart societies: information architecture, integrations architecture, target architecture, security architecture, and security issues. Service chains must be checked against the architectures to ensure no risks are present


Cloud computing has been viewed as the cutting edge engineering of Information Technology(IT). The Cloud worldview included preferences and its potential for decreasing expenses and time for an administration that favors towards security issues. Distributed computing is a total of data technology(IT) that offered to the client dependent on renting. Despite the fact that countless security issues are tended to, in any case some are not tended to and a few calculations are proposed for security issues. This paper shows an on the diverse Operating Systems of utilizing our refreshed H-HABE calculations and contrast and the different most normal encryption instruments. A near report made on a few encryption methods are utilized in the Different Operating Systems in the cloud. At long last, the real measurements like distinctive working framework issues present in distributed computing are examined.


Author(s):  
Rizwan Ur Rahman ◽  
Divya Rishi Sahu ◽  
Deepak Singh Tomar

Web services and Service oriented architecture are innovative phase of distributed computing, build on top of the distributed computing models. Web services are being used mostly for the integration business components. One of the key concerns in web services and service oriented architecture is implementation of adequate security. Security issues in SOA are still probing and in spite of an increase in web service research and development, many security challenges remain unanswered. This chapter introduces the vulnerabilities, threats associated with web services and addresses WS-Security standards and countermeasures. Web service protocol is designed to provide connectivity. Not any of these standards of web services contain any inbuilt security aspect of their own. Web Services are exposed to attack from common Internet protocols and in addition to new categories of attacks targeting Web Services in particular. Consequently, the aim of this chapter is to provide review of security mechanism in web services.


Sign in / Sign up

Export Citation Format

Share Document