2. ABSTRACT
A new fine-grained two-factor authentication (2FA)
access control system for web-based cloud computing
services has been proposed.
In our proposed 2FA access control system, an attribute-
based access control mechanism is implemented with the
necessity of both user secret key and a lightweight
security device.
As a user cannot access the system if s/he does not hold
both, the mechanism can enhance the security of the
system, especially in those scenarios where many users
share the same computer for web-based cloud services.
3. LITERATURE SURVEY
InterCloud: Utility-Oriented Federation of Cloud
Computing Environments for Scaling of
Application Services
• Cloud computing providers have setup several data
centers at different geographical locations over the
Internet in order to optimally serve needs of their
customers around the world
• The Cloud computing providers are unable to predict
geographic distribution of users consuming their
services, hence the load coordination must happen
automatically,
4. The overall goal is to create a computing
environment that supports dynamic expansion or
contraction of capabilities
using the CloudSim toolkit The results demonstrate
that federated Cloud computing model has immense
potential as it offers significant performance gains as
regards to response time and cost saving under
dynamic workload scenarios.
5. ADVANTAGES & DISADVANATGES
ADVANTAGES:
Scalable architecture and frequent data accessibility.
Fast access of data.
Data can be accessed from anywhere in the world.
DISADVANATGES:
Complexity occurs for large number of data to
maintain.
Too much load can crash the whole system and
flow of data
6. (2) Characterizing Task Usage Shapes in Google’s
Compute Clusters:
The increase in scale and complexity of large compute clusters
motivates a need for representative workload benchmarks to
evaluate the performance impact of system changes
The goal is to find an accurate characterization that can
faithfully reproduce the performance of historical workload
traces in terms of key performance metrics
Through experiments using workload traces from Google
production clusters, we find that simply using the mean of
task usage can generate synthetic work-load traces that
accurately reproduce resource utilizations and task waiting
time
7. ADVANATAGES & DISADVANATAGES
ADVANATGES:
Advance security measiures like 2-step verification
was introduced.
Less chances of system failure or data loss.
High security measures.
DISADVANATGES:
Hard for users to use this system because of its
complexity
Time Consuming process.
8. (3) An Analysis of Traces from a Production
MapReduce Cluster:
MapReduce is a programming paradigm for parallel
processing that is increasingly being used for data-
intensive applications in cloud computing environments
The service provider can use this knowledge to make
better scheduling decisions
We use an instance-based learning technique that
exploits temporal locality to predict job completion times
from historical data and identify potential performance
problems in our dataset.
9. ADVANATAGES & DISADAVANATGES
ADVANTAGES:
Step by step verifications required for users to prove
their identity and Cluster based data maintenance
High security measures
DISADVANATAGES:
Hard to clear the authentication process
Time consuming
10. (4) Characterization of Hadoop Jobs Using
Unsupervised Learning:
Apache Hadoop, is increasingly being used for data-
intensive applications in cloud computing
environments.
MapReduce environments benefits both the cloud
service providers and their users.
metrics and job configuration features such as
format of the input/output files, type of compression
used etc to find similarity among Hadoop jobs
11. ADVANATGES & DISADVANTAGES
ADVANTAGES:
Random Key methodology is implemented for
signature verification
Handling of huge amount of data is possible
Ease of use
DISADVANATGES:
Possibility of guessing the key structure is high.
Less secure when compared to other methods
12. (5) An approach for characterizing workloads
in Google cloud to derive Realistic resource
utilization models:
Analyzing behavioral patterns of workloads is critical
to understanding Cloud computing environments.
the first large-scale analysis of real-world Cloud data,
using a recently released dataset that features traces
from over 12,000 servers over the period of a month.
The derived model assists in understanding the
relationship between users and tasks within
workload, and enables further work
13. ADVANTAGES & DISADVANTAGES
ADVANATGES:
Providing data maintenance based on the existing
model based architecture.
Large scale processing and analysis of cloud data
DISADVANTAGES:
Lack of privacy occurs, if the user search goes larger
and fully depends on third party server
Hackers can easily steal data from the users.
14. (6) Workload classification & software energy
measurement for efficient scheduling on private
cloud platforms:
At present there are a number of barriers to creating an
energy efficient workload scheduler for a Private Cloud
based data center.
The effect of different workloads on server power
consumption in a Private Cloud platform.
display a noticeable difference in energy consumption
when servers are given tasks that dominate various
resources (CPU, Memory, Hard Disk and Network)
15. ADVANATAGES & DISADVANATGES
ADVANATAGES:
Measurement based cloud architecture and resource
is handled by the private cloud.
Better performance by the servers.
DISADVANATAGES:
The approach is proposed purely based on existing
models, so the success and failure rates depend on
the existing system.
There are not much of any improvements in the
security or any levels of cloud system.
16. (7) An Efficient File Hierarchy Attribute-Based
Encryption Scheme in Cloud Computing:
Ciphertext-policy attribute-based encryption (CP-
ABE) has been a preferred encryption technology to
solve the challenging problem of secure data sharing
in cloud computing
an efficient file hierarchy attribute-based encryption
scheme is proposed in cloud computing.
both ciphertext storage and time cost of encryption
are saved
17. ADVANATAGES & DISADVANATAGES
ADAVANATGES:
Layered access structures are integrated into a single
structure in CP-ABE.
Very high level of encryption and security of data
DISADVANATAGES:
The shared data files generally have the
characteristic of multilevel hierarchy.
It can cause errors in data processing.
18. (8) Intrusion-Resilience via the Bounded-Storage
Model:
New methords are used to preserve the protocols from
the malicious program
The security of our protocols relies on the assumption
that the amount of data that the adversary can transfer
from the infected machine is limited
This method is based on the results from the
BoundedStorage Model
This type of software can be secretly attached to
seemingly harmless programs, or can be installed by
worms or viruses.
19. ADVANATAGES & DISADVANATAGES
ADVANATAGES:
Intrusion-resilience in the cryptographic protocols
by session-key generation and entity authentication.
High level of security for protection of data.
DISADAVANATAGES:
The main drawback of our protocols is that during
the intrusion the virus can impersonate the user
The user might be annoyed by the whole setup
process
20. (9) SMS-based One-Time Passwords: Attacks
and Defence:
SMS-based One-Time Passwords (SMS OTP) were
introduced to online bank transaction prevent from
theft
analyze the security architecture of SMS OTP
systems and study attacks that pose a threat to
Internet-based authentication and authorization
services
Mechanisms to secure SMS OTPs against common
attacks and specifically against smartphone Trojans
21. ADVANATAGES & DISADVANTAGES
ADVANTAGES:
The OTP will only be received in the registered number
of the User which no other have access.
The OTP’s will only be valid for limited amount of time.
The randomly generated OTP will not be guessable.
DISADVANATAGES:
Delay in receiving OTP when there are any network
problems
The main drawback of this method is OTP can stolen by
a person with whom one work in a profession.
22. (10) Securing online bank transaction from phishing
attacks using MFA And secure session key:
Phishing is an online criminal activity using the collection of
social engineering methods such as messages and emails
The strong techniques are required to avoid phishing attacks
Multi Factor Authentication (MFA) and secure session key
generation using Gaussian distribution to reduce the attacks
Authentication technique authenticates the users using user's
signature image recognition and secret question answer.
session key generated using Gaussian distribution is sent to
user's mobile phone
23. ADVANATAGES & DISADAVANTAGES
ADVANATAGES:
Multi Factor Authentication (MFA) and secure session
key generation using Gaussian distribution to reduce the
attacks caused by the phishers
Multiple levels of security measures available for
protection of data from hackers.
DISADVANATAGES:
Deceptive phishing attacks, false emails are sent to the
user’s inbox are still threat
Users are prone to fraud activities by hackers and data
can be stolen by such fraudulent measures.