1 / 5

Cloud Intrusion and Autonomic Management in Autonomic Cloud Computing

Autonomic cloud emerge as a result of emerging four properties of autonomic computing in cloud that are self healing, self monitoring, self repairing and self optimization. We have defined a methodology to improve the security in cloud computing and also defined a methodology that can ensure the autonomic management in autonomic cloud computing. We have selected 1 of the 7 properties of the autonomic cloud computing that is autonomic management. Our main focus is on the security enhancement and avoidance of cloud intrusion in autonomic cloud computing. Bilal Hussain CH "Cloud Intrusion and Autonomic Management in Autonomic Cloud Computing" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-6 , October 2018, URL: https://www.ijtsrd.com/papers/ijtsrd18378.pdf Paper URL: http://www.ijtsrd.com/computer-science/artificial-intelligence/18378/cloud-intrusion-and-autonomic-management-in-autonomic-cloud-computing/bilal-hussain-ch<br>

Download Presentation

Cloud Intrusion and Autonomic Management in Autonomic Cloud Computing

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. International Journal of Trend in International Open Access Journal International Open Access Journal | www.ijtsrd.com International Journal of Trend in Scientific Research and Development (IJTSRD) Research and Development (IJTSRD) www.ijtsrd.com ISSN No: 2456 ISSN No: 2456 - 6470 | Volume - 2 | Issue – 6 | Sep | Sep – Oct 2018 Cloud Intrusion and Autonomic Autonomic Cloud Computing Intrusion and Autonomic Management in Management in Bilal Hussain CH Research Scholar, Department of Computer Science and University of Engineering & Technology, Lahore, Pakistan University of Engineering & Technology, Lahore, Pakistan Research Scholar, Department of Computer Science and Engineering, Engineering, ABSTRACT Autonomic cloud emerge as a result of emerging four properties of autonomic computing in self-healing, self-monitoring, self-repairing and self optimization. We have defined a methodology to improve the security in cloud computing and also defined a methodology that can ensure the autonomic management in autonomic cloud computi selected 1 of the 7 properties of the autonomic cloud computing that is autonomic management. Our main focus is on the security enhancement and avoidance of cloud intrusion in autonomic cloud computing. Keyword: Autonomic cloud intrusion, autonomic management. I. INTRODUCTION Autonomic computing refers to the term in which the system would be able to self-monitor, self self-optimize itself. Autonomic cloud computing are the systems that have the ability to adapt to the changes in their working environment and thus maintaining the service level agreement (SLA). maintaining the service level agreement (SLA). Autonomic cloud computing has the basic four properties self-healing, repairing and self-monitoring. There are about 6 basic fields in the autonomic cloud computing that are:- Application scheduler Energy efficient scheduler Security and attack detection Dynamic resource provisioning Cloud workflow Autonomic management Out of all these fields we have selected autonomic management for our research paper. Our proposed methodology is that we have redefined the structure in the cloud computing. We are introducing a layer in the structure of cloud computing. This layer or portion will have some necessary and vital importance by us has the library that has the routines of the various viruses, Trojans, worms and other hacking and intrusion tools. Our methodology has three basic phases; Detection phase:- In this phase the layer or the portion will detect that the incoming request that is requested by the user is either a virus, a worm, a hacking technique or a legitimate request. If the request if legitimate the system will allow the request and pass it to the next level. And if the request is not legitimate the request will be discarded. The routine of the incoming request is checked with the routines saved in the library of the layer or the routines saved in the library of the layer or the Autonomic cloud emerge as a result of emerging four properties of autonomic computing in cloud that are Autonomic cloud computing has the basic four healing, self self-optimization, self- repairing and self- 6 basic fields in the autonomic cloud We have defined a methodology to improve the security in cloud computing and also defined a methodology that can ensure the autonomic management in autonomic cloud computing. We have selected 1 of the 7 properties of the autonomic cloud computing that is autonomic management. Our main focus is on the security enhancement and avoidance of cloud intrusion in autonomic cloud computing. Energy efficient scheduler Security and attack detection Dynamic resource provisioning Out of all these fields we have selected autonomic management for our research paper. Autonomic cloud computing, computing, clou cloud Our proposed methodology is that we have redefined the structure in the cloud computing. We are introducing a layer in the structure of cloud computing. This layer or portion will have some necessary and vital importance. The layer introduced by us has the library that has the routines of the various viruses, Trojans, worms and other hacking Autonomic computing refers to the term in which the monitor, self -repair, and optimize itself. Autonomic cloud computing are the systems that have the ability to adapt themselves to the changes in their working environment and thus Our methodology has three basic phases;- In this phase the layer or the portion will detect that the incoming request that is requested by the user is hacking technique or a If the request if legitimate the system will allow the o the next level. And if the request is not legitimate the request will be discarded. The routine of the incoming request is checked with the @ IJTSRD | Available Online @ www.ijtsrd.com www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018 Page: 28

  2. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456 International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456 International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 portion. This way it is checked that the request is legitimate or not. Prioritization phase:- In this phase the request that is considered not legitimate and is considered a threat will be prioritize from the number 1 to 10. The number is assigned by the severity of the attack. The greater the effect of the attack the higher the number it will get. A back end algorithm will be written that will check the severity of the attack on the cloud system. It will senses the points where the attack is placed and after that a number is assigned to the attack and prioritizes it. Implementation phase:- In this phase the implementation to reduce and nullify the attack is done. In this phase first the experts are informed by the nature of the attack. After that our algorithm comes in to the action. Various activities are done a the nature and the severity of the attack that we will explain latter. Besides all this work the proceedings will be saved for the future use. And can be used as an evidence against the intruder or attacker. CLOUD COMPUTING ARCHITECTURE: The major providers of the cloud are providing their resources i.e. software as a service, infrastructure as a service and platform as a service to the customers and consumers over the internet. The major providers include Amazon, Google, yahoo, Microsoft. , yahoo, Microsoft. portion. This way it is checked that the request is The three main services are discussed below: Software as a service:- In this type of service the cloud provides the users ability to use the software that basically owned by the cloud. There are many instances of the software and the end users and consumers uses the instance of the software. The main example of the software as a service is salesforce.com Platform as a service:- In this type of the service the cloud provides the user’s ability to program their own software. The cloud provides the users the software to carry out their instructions and execute them. In this type the consumer can make the program according to the software provided by the cloud. For example some clouds give the users platform for the development of software only in C# or only in java or only in C or assembly. There are different platforms provided by different cloud companies. platforms provided by different cloud companies. The three main services are discussed below:- In this type of service the cloud provides the users to use the software that basically owned by the cloud. There are many instances of the software and the end users and consumers uses the instance of the In this phase the request that is considered not legitimate and is considered a threat will be prioritize The number is assigned by the severity of the attack. The main example of the software as a service is the higher the number it will get. A back end algorithm will be written that will check the severity of the attack on the this type of the service the cloud provides the user’s ability to program their own software. The cloud provides the users the software to carry out their instructions and execute them. In this type the consumer can make the program according to the are provided by the cloud. It will senses the points where the attack is placed and after that a number is assigned to the attack and In this phase the implementation to reduce and nullify For example some clouds give the users platform for the development of software only in C# or only in java or only in C or assembly. There are different In this phase first the experts are informed by the nature of the attack. After that our algorithm comes in to the action. Various activities are done according to the nature and the severity of the attack that we will explain latter. Besides all this work the proceedings will be saved for the future use. And can be used as an evidence against the intruder or attacker. CLOUD COMPUTING ARCHITECTURE:- major providers of the cloud are providing their software as a service, infrastructure as a service and platform as a service to the customers and consumers over the internet. The major providers Infrastructure as a service (IaaS): Infrastructure as a service provides the user ability to store and compute capabilities over the network. Different type of routers, switches hard drives, servers are pooled together and made available to the users so the users can use them on pay as you go services. This is the most expensive anddifficult type of service that is provided to users by the cloud. Explained view of our methodology: As in the introduction we have given you the idea that how our system works. Now we will e whole idea. service (IaaS):- Infrastructure as a service provides the user ability to store and compute capabilities over the network. Different type of routers, switches hard drives, servers are pooled together and made available to the users so pay as you go services. This difficult type of service that is provided to users by the cloud. Explained view of our methodology:- As in the introduction we have given you the idea that how our system works. Now we will elaborate the The services provided by the cloud are mainly platform as a service software as a service and a infrastructure as a service. The services provided by the cloud are mainly platform as a service software as a service and a @ IJTSRD | Available Online @ www.ijtsrd.com www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018 Page: 29

  3. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456 International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456 International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 Our defined methodology consists of three phases: Detection phase:- This is the first phase in which the request that is submitted by the user is checked whether the request is authorized and legal or not. For this we have designed a layer which has the routines of the viruses, worms, Trojans and other hacking tools. The routine of the request is checked by the routine saved in the library of the layer. The library of the layer will be enhanced with the more new routines of viruses worms and Trojans. In this phase after checking that the request is legal or not some steps are implemented. If the request is legal the system will pass the request and the desired functionality will be performed. And if the request is considered illegal the layer will pass the request to the next phase. Prioritization phase:- In this phase the request that is considered as illegal is given the number according to its severity. The severity of the attack is judged by the mechanism that we will define now. First the intensity of the attack is checked. The system will sense the places where the attacked has affected the cloud. The points where the attacks is placed are counted and the severity of the attack at each point is figured. After this, the attack will be given a number means it is prioritized. The attack will be prioritized with the suitable number for the numbers 1 to 10. 1being the lightest attack and the 10being the most severe attack. Implementation phase:- In this phase various steps are performed to nullify and to reduce the effect of the attack. In this phase the experts are reported about the attack. A report will be generated that will inform the experts about the nature of the attack. After the experts the main algorithms come in to the action. According to the priority number that is given to the attack various actions are performed. We will deal three types of cases in this phase. Case 1: In this attacks will be placed that have the priority number from 1 to 3. These types to attacks will be Our defined methodology consists of three phases:- considered mild. For such type of attacks the system will automatically heal itself and the ordinary working of the cloud will not be disturbed. considered mild. For such type of attacks the system will automatically heal itself and the ordinary working of the cloud will not be disturbed. The system will senses the points where the healing is required and the action is done without normal routine of the system. Case 2: In this more severe attacks are placed. The actions performed against this type of actions are more powerful and costly. The attacks with the severity from range of 4 to 7 are placed. In this case the portion of the cloud on which the attack has taken place will be placed in a black box. The normal execution of the working of the specific portion will be stopped for the specific period of time. The system will try to nullify the attack and to reduce the effect of the attack, until then the normal working of the cloud will be paused and the users wouldn’t be able to access the specific portion of the cloud. Case 3: In this phase most severe attacks will be placed. The attacks with the severity level o together in this phase. In this case the whole cloud will be forced to stop its normal execution until the attack is nullified The user cannot access the cloud during this time. And this is the worst condition for us. In all three cases first it is decided whether to track the intruder or attacker or not. An algorithm is also written for this step. If the user is in the cloud and your authorized user and is trying to access other user account or trying to damage the cloud the user will be tracked and the services will be revoked from the user and will be charged with the guilty. And if the attacker or intruder is not your user, for the time being we will not track him/her because it would be the costly procedure. And besides all functionalities all the proceedings will be saved for the future use and the routine of last placed attack will be placed in the library of the layer so that the this type of attack will never happen again. type of attack will never happen again. This is the first phase in which the request that is submitted by the user is checked whether the request is authorized and legal or not. For this we have d a layer which has the routines of the viruses, worms, Trojans and other hacking tools. The routine of the request is checked by the routine saved in the library of the layer. The library of the layer will be enhanced with the more new routines of viruses and The system will senses the points where the healing is required and the action is done without effecting the In this more severe attacks are placed. The actions performed against this type of actions are more In this phase after checking that the request is legal or not some steps are implemented. If the request is legal the system will pass the request and the desired functionality will be performed. And if the request is llegal the layer will pass the request to the The attacks with the severity from range of 4 to 7 are portion of the cloud on which the attack has taken place will be placed in a black box. The normal execution of the working of the specific portion will be stopped for the specific period of time. The system will try to nullify the attack and effect of the attack, until then the normal working of the cloud will be paused and the users wouldn’t be able to access the specific portion of the In this phase the request that is considered as illegal is given the number according to its severity. The severity of the attack is judged by the mechanism that First the intensity of the attack is checked. The system will sense the places where the attacked has affected the cloud. The points where the attacks is placed are counted and the severity of the attack at each point is attack will be given a number means it is prioritized. The attack will be prioritized with the suitable number for the numbers 1 to 10. In this phase most severe attacks will be placed. The attacks with the severity level of 7 to 10 are grouped In this case the whole cloud will be forced to stop its normal execution until the attack is nullified. The user cannot access the cloud during this time. And this is the worst condition for us. being the lightest attack and the 10being the most cases first it is decided whether to track are performed to nullify An algorithm is also written for this step. If the user is in the cloud and your authorized user and is trying to access other user account or trying to damage the will be tracked and the services will be revoked from the user and will be charged with the In this phase the experts are reported about the attack. A report will be generated that will inform the experts about the nature of the attack. After the experts the According to the priority number that is given to the And if the attacker or intruder is not your user, for the time being we will not track him/her because it would be the costly procedure. And besides all these functionalities all the proceedings will be saved for the future use and the routine of last placed attack will be placed in the library of the layer so that the this of cases in this phase. In this attacks will be placed that have the priority attacks will be @ IJTSRD | Available Online @ www.ijtsrd.com www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018 Page: 30

  4. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456 International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456 International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 Paragon for other techniques: Our methodology will be used as a paragon for the others models to enhance the security in the autonomic cloud. We have used workflow efficient algorithms which can be used in other schemes to enhancing the security. Conclusion:- We have defined a methodology for the autonomous cloud computing which has the three basic steps. In first step we are detecting that either the incoming request is a virus or some hacking tools trying to harm or hack the cloud. In the second phase we are prioritizing the at the number 1 to 10. 1being the mildest attack and 10being the most severe attack. In the last step we are applying our designed algorithms to enhance the security in the autonomous cloud computing. Future work:- In the future more layers can be intr methodology to enhance the security. We have defined our implementation in one layer and that layer does all the work. In the future more layers can be defined and each will do its separate work. Introducing more layers means introducing more security in the cloud. Besides that DaaS can be implemented in the autonomous cloud computing which stands for defense as a service. As we know we have IaaS, PaaS, SaaS. Besides three basic services DaaS can also be implemented which only accounts for en security in the cloud. AI can also be introduced in the autonomous computing REFERENCES 1.Zissis, Dimitrios, and "Addressing cloud issues." Future Generation computer systems (2012): 583-592. Paragon for other techniques:- Our methodology will be used as a paragon for the others models to enhance the security in the autonomic cloud. We have used workflow efficient algorithms which can be used in other schemes to enhancing the security. ology for the autonomous cloud computing which has the three basic steps. In first step we are detecting that either the incoming request is a virus or some hacking tools trying to harm Benefits of our methodology:- There are several characteristics of a cloud. Some of them are given below: Scalability and elasticity:- Our methodology will enhance more scalability and elasticity in the structure of the cloud. Invulnerability :- Our proposed system will make the autonomic cloud system immune of most of the attacks Thus becoming the cloud invulnerable of virus and hacking. Manageability and interoperability: As our methodology is self automated the experts don’t have to do the most of the work as it is done by the system itself. It increases the manageability of the cloud would be manageable easily. The experts also don’t have to give the instructions every time when the system is attacked. Thus increases its interoperability. Performance and optimization:- Our methodology will increases the performance of the cloud both directly and in directly. As the system is less vulnerable to attack the efficiency and the performance of the cloud will automatically increases. The structure of the cloud will be more opti way. several characteristics of a cloud. Some of In the second phase we are prioritizing the attack from the number 1 to 10. 1being the mildest attack and being the most severe attack. In the last step we are applying our designed algorithms to enhance the security in the autonomous cloud computing. Our methodology will enhance more scalability and elasticity in the structure of the cloud. Our proposed system will make the autonomic cloud system immune of most of the attacks Thus the cloud invulnerable of virus, worms In the future more layers can be introduced in our methodology to enhance the security. We have defined our implementation in one layer and that layer does all the work. In the future more layers can be defined and each will do its separate work. Introducing more layers means introducing more Manageability and interoperability:- As our methodology is self automated the experts the most of the work as it is done by It increases the manageability of the cloud; the cloud would be manageable easily. The experts also don’t have to give the instructions every time when the system is attacked. Thus increases its Besides that DaaS can be implemented in the autonomous cloud computing which stands for defense as a service. As we know we have IaaS, PaaS, SaaS. Besides three basic services DaaS can also be implemented which only accounts for ensuring the Our methodology will increases the performance of the cloud both directly and in directly. As the system is less vulnerable to attack the efficiency and the performance of the cloud will automatically increases. The structure of the cloud will be more optimized this AI can also be introduced in the autonomous Zissis, "Addressing Dimitrios, and Dimitrios computing computing Dimitrios Lekkas. security security Lekkas. cloud Future Generation computer systems 28.3 2.Pearson, Siani, and Azzedine Benameur. "Privacy, security and trust issues arising from cloud computing." Cloud Computing Technology and Science (CloudCom), International Conference on International Conference on. IEEE, 2010. Siani, and Azzedine Benameur. "Privacy, security and trust issues arising from cloud Cloud Computing Technology and Science (CloudCom), 2010 2010 IEEE IEEE Second Second @ IJTSRD | Available Online @ www.ijtsrd.com www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018 Page: 31

  5. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456 International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456 International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 3.Krutz, Ronald L., and Russell Dean Vines. security: A comprehensive guide to secure cloud computing. John Wiley & Sons, 2010. . John Wiley & Sons, 2010. Krutz, Ronald L., and Russell Dean Vines. Cloud curity: A comprehensive guide to secure cloud paradigm." NIST, Laboratory (2009): 304-311. NIST, Information Information 311. Technology Technology 6.Buyya, Rajkumar, Rodrigo N. Calheiros, and Xiaorong Li. "Autonomic cloud computing: Open challenges and architectural elements." Applications of Information Technology (EAIT), 2012 Third International Conference on 2012. Buyya, Rajkumar, Rodrigo N. Calheiros, and Xiaorong Li. "Autonomic cloud computing: Open challenges and architectural elements." Emerging Applications of Information Technology (EAIT), 2012 Third International Conference on. IEEE, 4.Buyya, Rajkumar, Chee Shin Yeo, and Srikumar Venugopal. "Market-oriented cloud computing: Vision, hype, and reality for delivering it services as computing utilities." High Computing and Communications, HPCC'08. 10th IEEE International Conference on. Ieee, 2008. Buyya, Rajkumar, Chee Shin Yeo, and Srikumar oriented cloud computing: Vision, hype, and reality for delivering it services High P Performance Computing HPCC'08. 10th IEEE International Conference and Communications, 2008. 2008. 7.Lombardi, Flavio, and Roberto Di Pietro. "Secure virtualization for cloud computing." Network and Computer Applications 1113-1122. nd Roberto Di Pietro. "Secure virtualization for cloud computing." Journal of Network and Computer Applications 34.4 (2011): 5.Mell, Peter, and Tim Grance. "Effectively and securely using the Mell, Peter, and Tim Grance. "Effectively and securely using the cloud cloud computing computing @ IJTSRD | Available Online @ www.ijtsrd.com www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018 Page: 32

More Related