ASSURING INTEGRITY OF DATAFLOW PROCESSING IN CLOUD COMPUTING INFRASTRUCTURE

In cloud service provider will provides different types of service. In our project they are using Software as a Service (SaaS). In the cloud service provider will enables application will be shared via massive cloud infrastructure. In the type of sharing nature they will spread the infected code and then make the system more vulnerable then perform malicious attack in the service provider. In the project, they will perform intruder test and make the system is scalable and effective service integrity in the Software as a Service Provider (SaaS). In intruder test can provides the novel integrated attestation scheme provide stronger attacker in the pin point scheme in the previous models. In the Intruder test will automatically provides good results when will provide a better when compared to previous of malicious attack code. So, it is very effective for the cloud shares. In the type will provide secure to all type of files. In the model will provide effective result in the type of intruder test. So, they will share effective information in the Software as a Service Provider (SaaS). Therefore, any type of malicious attacker will not attack our files. So, the Intruder test will be used in the project.

[1]  Elaine Shi,et al.  Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems , 2005, SOSP '05.

[2]  Pradeep K. Khosla,et al.  SWATT: softWare-based attestation for embedded devices , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[3]  Jennifer Widom,et al.  STREAM: The Stanford Stream Data Manager , 2003, IEEE Data Eng. Bull..

[4]  Trent Jaeger,et al.  Design and Implementation of a TCG-based Integrity Measurement Architecture , 2004, USENIX Security Symposium.

[5]  Philip S. Yu,et al.  SPADE: the system s declarative stream processing engine , 2008, SIGMOD Conference.

[6]  Stefan Berger,et al.  TVDc: managing security in the trusted virtual datacenter , 2008, OPSR.

[7]  Ying Xing,et al.  The Design of the Borealis Stream Processing Engine , 2005, CIDR.

[8]  Tal Garfinkel,et al.  Terra: a virtual machine-based platform for trusted computing , 2003, SOSP '03.

[9]  Juan A. Garay,et al.  Software integrity protection using timed executable agents , 2006, ASIACCS '06.

[10]  Elaine Shi,et al.  BIND: a fine-grained attestation service for secure distributed systems , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[11]  Hovav Shacham,et al.  Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.

[12]  Wu-chang Feng,et al.  Fides: remote anomaly-based cheat detection using client emulation , 2009, CCS.

[13]  Thomas Hess,et al.  Software as a Service , 2008, Wirtschaftsinf..

[14]  Fabian Monrose,et al.  Distributed Execution with Remote Audit , 1999, NDSS.

[15]  Gustavo Alonso,et al.  Web Services: Concepts, Architectures and Applications , 2009 .