SlideShare una empresa de Scribd logo
1 de 24
Descargar para leer sin conexión
TECHNICAL SEMINAR REPORT
                         ON
SECURITY ISSUES FOR CLOUD COMPUTING



                      Presented by
                       E.PUSHPA




  PRIYADARSHINI COLLEGE OF ENGINEERING &
               TECHNOLOGY
 [Affiliated to Jawaharlal Nehru technological university,
                       Ananthapur]
                  Kanupartipadu, Nellore-524004
                          2012-2013
Overview
1. Introduction
2. Security Issues
3. Third Party Secure Data Publication Applied to
   CLOUD
4. Encrypted Data Storage for Cloud
5. Secure Query Processing with Hadoop
    5.1 Overview of Hadoop
    5.2 Inadequacies of Hadoop
         i)No facility to handle encrypted
         sensitive
         ii)Semantic Web Data Management
iii)No fine-grained access control
     iv)No strong authentication
  5.3 System Design
     i)Jena
    ii)Pellet
   iii)Pig Latin
   iv)Mahout, Hama
   v)Pre-processing

        5.3.3 Query Execution and Optimization

 5.4 Integrate SUN XACML Implementation into HDFS
  5.5 Strong Authentication
6. Conclusion
7. References
ABSTRACT

   We discuss security issues for cloud computing and
    present a layered framework for secure clouds and
    then focus on two of the layers, i.e., the storage
    layer and the data layer.
   we discuss a scheme for secure third party
    publications of documents in a cloud. Next, we will
    converse secure federated query processing with
    map Reduce and Hadoop, and discuss the use of
    secure co-processors for cloud computing.
    Finally, the we discuss XACML implementation for
    Hadoop and discuss their beliefs that building
    trusted applications from untrusted components
    will be a major aspect of secure cloud computing.
INTRODUCTION

There is a critical need to securely store,
manage,share and analyze massive amounts of
complex data to determine patterns and trends
 Because of the critical nature of the
applications, it is important that clouds be secure

Google has now introduced the MapReduce
framework for processing large amounts of data on
commodity hardware

Apache’s Hadoop distributed file system
(HDFS) is emerging as a superior software
component for cloud computing combined with
integrated parts such as MapReduce
Due to the extensive complexity of the
cloud, we contend that it will be difficult to
provide a holistic solution to securing the
cloud

Our cloud system will:
(a)support efficient storageof encrypted sensitive
   data,
(b) store, manage and query massive amounts of
   data,
(c) support fine-grained access control and
(d) support strong authentication
2.SECURITY ISSUES

 There are numerous security issues for cloud
computing as it encompasses many technologies
including networks, databases, operating systems
Data security involves encrypting the data as
well as ensuring that appropriate policies are
enforced for data sharing

We describe ways of efficiently storing the data
in foreign machines

Querying encrypted data, as much of the data on
the cloud may be encrypted
Data mining techniques may be applicable to
malware detection in clouds

 We are using Hadoop distributed file system for
virtualization at the storage level and applying security
for Hadoop which includes an XACML implementation

 Resource allocation and memory management
algorithms


We are investigating secure federated query
processing on clouds over Hadoop
3.THIRD PARTY SECURE DATAPUBLICATION
             APPLIED TO CLOUD

►We have developed techniques for third party publication
of data in a secure manner

►security policy is specified depending on user roles and
credentials


Figure : Access control framework
►Users must possess the credentials to access XML
documents
►For example, a professor has access to all of the details of
students while a secretary only has access to administrative
information

►If access is granted to the root, it does not necessarily
mean access is granted to all the children

►When the subject requests a document, the publisher
will apply the policies relevant to the subject and give
portions of the documents to the subject.

►Owner will encrypt various combinations of documents
and policies with his/her private key
►Using Merkle signature and the encryption techniques,
the subject can verify the authenticity and completeness
of the document

►In the cloud environment,
the third party publisher is the
machine that stored the
sensitive data in the cloud
4.ENCRYPTED DATA
        STORAGE FOR CLOUD

►Data in the cloud will be placed anywhere

►We are using secure co-processor as part of the cloud
infrastructure to enable efficient encrypted storage of
sensitive data.

► Open Cirrus provides limited access based on their
economic model

►Open Cirrus doesnot provide the hardware support
we need (e.g., secure co-processors).
►By embedding a secure co-processor (SCP)into the cloud
infrastructure, the system can handle encrypted data
efficiently

►SCP is a tamper resistant hardware capable of limited
general-purpose computation

►Secure coprocessor is tamper-resistant, one could be
tempted to run the entire sensitive data storage server on
the secure coprocessor.

►Due to the tamper-resistant shell, secure co-processors
have usually limited memory .
►Another issue is that the software running on the SCP
must be totally trusted and verified

►Framework will facilitate
(a)secure data storage and
(b) assured information
sharing

►We have conducted
research on querying
encrypted data as well as
secure multipart
computation (SMC)

►One drawback of SMC is the high computation costs
5.SECURE QUERY PROCESSING
              WITH HADOOP
                  5.1 Overview of Hadoop

A major part of our system is HDFS which is a
distributed Java-based file system with the capacity to
handle a large number of nodes storing petabytes of data

HDFS architecture
is based on the
Master- Slave
approach
5.3 SYSTEM DESIGN

We are using several software tools that are available
to help us in the process
i)Jena: Jena is a framework which is widely used
for solving SPARQL queries over RDF data
ii)Pellet: We use Pellet to reason at various stages.
We do real-time query reasoning using pellet libraries
(Pellet) coupled with Hadoop’s map-reduce functionalities

iii)Pig Latin: Pig Latin is a scripting language which
runs on top of Hadoop.
 It comes with many built-in functions, but we can also
 create our own user-defined functions to do special-
 purpose processing.

iv)Mahout, Hama: These are open source data mining
and machine learning packages that already augment
Hadoop.
    Our approach consists of processing SPARQL queries
securely over Hadoop. SPARQL is a query language used to
query RDF data


v)Pre-processing: Generally, RDF data is in XML format
In order to execute a SPARQL query, we propose some data
pre-processing steps and store the pre-processed data into
HDFS.
5.3.3 Query Execution and
                       Optimization

We are developing a SPARQL query execution and
optimization module for Hadoop.
As our storage strategy is based on predicate splits

First, we will look at the predicates present in the query.

 Second, rather than looking at all of the input files, we
will look at a subset of the input files that are matched with
predicates.

Third, SPARQL queries generally have many joins in them
and all of these joins may not be possible to perform in a
single Hadoop job.
5.4 Integrate SUN XACML
                  Implementation into HDFS

 Current Hadoop implementations enforce a very coarse-
grained access control policy that permits or denies a
principal access to essentially all system resources as a
group without distinguishing amongst resources.

 For example, users who are granted access to the
Namenode may execute any program on any client
machine, and all client machines have read and write
access to all files stored on all clients

 We are enforcing more flexible and fine-grained
access control policies on Hadoop by designing an In-
lined Reference Monitor implementation of Sun
XACML.
Untrusted processes in the framework access
securityrelevant resources by submitting a request to the
resource’s Policy Enforcement Point (PEP)

 PEP reformulates the
request as a policy query
and submits it to a
Policy Decision Point
(PDP)

IRM has advantage
that the policy can be
enforced without
modifying the
operating system
5.5 Strong Authentication

♦Open source community is actively working to integrate
kerberos protocols with hadoop

♦On top of the proposed Kerboros protocol, for some
assured information applications, there may be a need
for adding simple authentication protocols to
authenticate with secure co-processors

♦We can add a simple public key infrastructure to our
system so that users can independently authenticate with
secure coprocessors to retrieve secret keys used for
encrypting sensitive data
6.Conclusion

The main goal is to securely store and manage data that
is not controlled by the owner of the data


It will be difficult to achieve end-to-end security.
However, the challenge we have is to ensure more secure
operations even if some parts of the cloud fail


Building trust applications from untrusted components
will be a major aspect with respect to cloud security
7. References

W3C. (n.d.). SPARQL. Retrieved from http://www. w3.org/TR/rdf-sparql-query
Bertino, E. (2002). Access Control for XML Documents.
Data & Knowledge Engineering, 43(3).
Bertino, E. (2004).
Selective and Authentic Third Party Distribution of XML Documents. IEEE
Transactions on Knowledge and Data Engineering,
16(10). doi:10.1109/TKDE.2004.63
DeVries, B. W., Gupta, G., Hamlen, K. W., Moore, S.,
& Sridhar, M. (2009).
ActionScript Bytecode Verification
with Co-Logic Programming. In Proceedings
of the ACM SIGPLAN Workshop on Programming
Languages and Analysis for Security (PLAS).
Gates, F., Natkovich, O., Chopra, S., Kamath, S. M.,
THANK YOU

Más contenido relacionado

La actualidad más candente

Security Issues in Cloud Computing
Security Issues in Cloud ComputingSecurity Issues in Cloud Computing
Security Issues in Cloud ComputingJyotika Pandey
 
Data Confidentiality in Cloud Computing
Data Confidentiality in Cloud ComputingData Confidentiality in Cloud Computing
Data Confidentiality in Cloud ComputingRitesh Dwivedi
 
Cloud computing and data security
Cloud computing and data securityCloud computing and data security
Cloud computing and data securityMohammed Fazuluddin
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environmentsijfcstjournal
 
Data storage security in cloud computing
Data storage security in cloud computingData storage security in cloud computing
Data storage security in cloud computingSonali Jain
 
Cloud Computing Security Organization Assessments Service Categories Responsi...
Cloud Computing Security Organization Assessments Service Categories Responsi...Cloud Computing Security Organization Assessments Service Categories Responsi...
Cloud Computing Security Organization Assessments Service Categories Responsi...SlideTeam
 
On technical security issues in cloud computing
On technical security issues in cloud computingOn technical security issues in cloud computing
On technical security issues in cloud computingsashi799
 
Cloud Security Issues 1.04.10
Cloud Security  Issues 1.04.10Cloud Security  Issues 1.04.10
Cloud Security Issues 1.04.10Rugby7277
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challengesDheeraj Negi
 
PhD Projects in Cloud Computing Security Research Topics
PhD Projects in Cloud Computing Security Research TopicsPhD Projects in Cloud Computing Security Research Topics
PhD Projects in Cloud Computing Security Research TopicsPhD Services
 
Ryan_Holt_MS_Thesis_Project_Presentation
Ryan_Holt_MS_Thesis_Project_PresentationRyan_Holt_MS_Thesis_Project_Presentation
Ryan_Holt_MS_Thesis_Project_PresentationRyan Holt
 
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
SOME SECURITY CHALLENGES  IN CLOUD COMPUTINGSOME SECURITY CHALLENGES  IN CLOUD COMPUTING
SOME SECURITY CHALLENGES IN CLOUD COMPUTINGHoang Nguyen
 
Cloud computing & Security presentation
Cloud computing & Security presentationCloud computing & Security presentation
Cloud computing & Security presentationParveen Yadav
 
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTINGDATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTINGijsptm
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computingveena venugopal
 
Cloud computing and its security issues
Cloud computing and its security issuesCloud computing and its security issues
Cloud computing and its security issuesJyoti Srivastava
 

La actualidad más candente (20)

Security Issues in Cloud Computing
Security Issues in Cloud ComputingSecurity Issues in Cloud Computing
Security Issues in Cloud Computing
 
Data Confidentiality in Cloud Computing
Data Confidentiality in Cloud ComputingData Confidentiality in Cloud Computing
Data Confidentiality in Cloud Computing
 
Cloud computing and data security
Cloud computing and data securityCloud computing and data security
Cloud computing and data security
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environments
 
Data storage security in cloud computing
Data storage security in cloud computingData storage security in cloud computing
Data storage security in cloud computing
 
Data security using rsa
Data security using rsaData security using rsa
Data security using rsa
 
Cloud Computing Security Organization Assessments Service Categories Responsi...
Cloud Computing Security Organization Assessments Service Categories Responsi...Cloud Computing Security Organization Assessments Service Categories Responsi...
Cloud Computing Security Organization Assessments Service Categories Responsi...
 
On technical security issues in cloud computing
On technical security issues in cloud computingOn technical security issues in cloud computing
On technical security issues in cloud computing
 
Cloud Security Issues 1.04.10
Cloud Security  Issues 1.04.10Cloud Security  Issues 1.04.10
Cloud Security Issues 1.04.10
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
PhD Projects in Cloud Computing Security Research Topics
PhD Projects in Cloud Computing Security Research TopicsPhD Projects in Cloud Computing Security Research Topics
PhD Projects in Cloud Computing Security Research Topics
 
Ryan_Holt_MS_Thesis_Project_Presentation
Ryan_Holt_MS_Thesis_Project_PresentationRyan_Holt_MS_Thesis_Project_Presentation
Ryan_Holt_MS_Thesis_Project_Presentation
 
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
SOME SECURITY CHALLENGES  IN CLOUD COMPUTINGSOME SECURITY CHALLENGES  IN CLOUD COMPUTING
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computing
 
Cloud computing & Security presentation
Cloud computing & Security presentationCloud computing & Security presentation
Cloud computing & Security presentation
 
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTINGDATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
 
Cloud Encryption
Cloud EncryptionCloud Encryption
Cloud Encryption
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computing
 
Cloud computing and its security issues
Cloud computing and its security issuesCloud computing and its security issues
Cloud computing and its security issues
 
Cloud security
Cloud security Cloud security
Cloud security
 

Destacado

Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computingPrince Chandu
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing SecurityNinh Nguyen
 
Cloud Computing Security Issues in Infrastructure as a Service”
Cloud Computing Security Issues in Infrastructure as a Service”Cloud Computing Security Issues in Infrastructure as a Service”
Cloud Computing Security Issues in Infrastructure as a Service”Vivek Maurya
 
Cloud computing-security-issues
Cloud computing-security-issuesCloud computing-security-issues
Cloud computing-security-issuesAleem Mohammed
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud ComputingFalgun Rathod
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computingronak patel
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architectureVladimir Jirasek
 
Scaling People, Not Just Systems, to Take On Big Data Challenges
Scaling People, Not Just Systems, to Take On Big Data ChallengesScaling People, Not Just Systems, to Take On Big Data Challenges
Scaling People, Not Just Systems, to Take On Big Data ChallengesMatthew Vaughn
 
Defending Applications In the Cloud: Architecting Layered Security Solutions ...
Defending Applications In the Cloud: Architecting Layered Security Solutions ...Defending Applications In the Cloud: Architecting Layered Security Solutions ...
Defending Applications In the Cloud: Architecting Layered Security Solutions ...EC-Council
 
A Reference Architecture for a Federated Cloud for Research
A Reference Architecture for a Federated Cloud for ResearchA Reference Architecture for a Federated Cloud for Research
A Reference Architecture for a Federated Cloud for ResearchResearch Data Alliance
 
Data Security Essentials for Cloud Computing - JavaOne 2013
Data Security Essentials for Cloud Computing - JavaOne 2013Data Security Essentials for Cloud Computing - JavaOne 2013
Data Security Essentials for Cloud Computing - JavaOne 2013javagroup2006
 
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Web image re ranking using query-spe...
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Web image re ranking using query-spe...2014 IEEE DOTNET CLOUD COMPUTING PROJECT Web image re ranking using query-spe...
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Web image re ranking using query-spe...IEEEFINALSEMSTUDENTPROJECTS
 
Cloud computing legal issues
Cloud computing legal issuesCloud computing legal issues
Cloud computing legal issuesAdv Prashant Mali
 
Mona secure multi owner data sharing for dynamic groups in the cloud-ppt
Mona secure multi owner data sharing for dynamic groups in the cloud-pptMona secure multi owner data sharing for dynamic groups in the cloud-ppt
Mona secure multi owner data sharing for dynamic groups in the cloud-pptKrushna Panda
 
IT Security As A Service
IT Security As A ServiceIT Security As A Service
IT Security As A ServiceMichael Davis
 
Cloud Computing Legal Issues
Cloud Computing Legal IssuesCloud Computing Legal Issues
Cloud Computing Legal IssuesIkuo Takahashi
 
Sgx @ centre & vista
Sgx @ centre & vistaSgx @ centre & vista
Sgx @ centre & vistaSim Shawn
 

Destacado (20)

Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Cloud Computing Security Issues in Infrastructure as a Service”
Cloud Computing Security Issues in Infrastructure as a Service”Cloud Computing Security Issues in Infrastructure as a Service”
Cloud Computing Security Issues in Infrastructure as a Service”
 
Cloud computing-security-issues
Cloud computing-security-issuesCloud computing-security-issues
Cloud computing-security-issues
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computing
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
 
Scaling People, Not Just Systems, to Take On Big Data Challenges
Scaling People, Not Just Systems, to Take On Big Data ChallengesScaling People, Not Just Systems, to Take On Big Data Challenges
Scaling People, Not Just Systems, to Take On Big Data Challenges
 
Defending Applications In the Cloud: Architecting Layered Security Solutions ...
Defending Applications In the Cloud: Architecting Layered Security Solutions ...Defending Applications In the Cloud: Architecting Layered Security Solutions ...
Defending Applications In the Cloud: Architecting Layered Security Solutions ...
 
A Reference Architecture for a Federated Cloud for Research
A Reference Architecture for a Federated Cloud for ResearchA Reference Architecture for a Federated Cloud for Research
A Reference Architecture for a Federated Cloud for Research
 
Data Security Essentials for Cloud Computing - JavaOne 2013
Data Security Essentials for Cloud Computing - JavaOne 2013Data Security Essentials for Cloud Computing - JavaOne 2013
Data Security Essentials for Cloud Computing - JavaOne 2013
 
Encrypted Databases for Untrusted Cloud
Encrypted Databases for Untrusted CloudEncrypted Databases for Untrusted Cloud
Encrypted Databases for Untrusted Cloud
 
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Web image re ranking using query-spe...
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Web image re ranking using query-spe...2014 IEEE DOTNET CLOUD COMPUTING PROJECT Web image re ranking using query-spe...
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Web image re ranking using query-spe...
 
Cloud computing legal issues
Cloud computing legal issuesCloud computing legal issues
Cloud computing legal issues
 
Synopsis_kamlesh
Synopsis_kamleshSynopsis_kamlesh
Synopsis_kamlesh
 
Mona secure multi owner data sharing for dynamic groups in the cloud-ppt
Mona secure multi owner data sharing for dynamic groups in the cloud-pptMona secure multi owner data sharing for dynamic groups in the cloud-ppt
Mona secure multi owner data sharing for dynamic groups in the cloud-ppt
 
IT Security As A Service
IT Security As A ServiceIT Security As A Service
IT Security As A Service
 
Cloud Computing Legal Issues
Cloud Computing Legal IssuesCloud Computing Legal Issues
Cloud Computing Legal Issues
 
Sgx @ centre & vista
Sgx @ centre & vistaSgx @ centre & vista
Sgx @ centre & vista
 

Similar a Presentation on cloud computing security issues using HADOOP and HDFS ARCHITECTURE

IRJET- Secured Hadoop Environment
IRJET- Secured Hadoop EnvironmentIRJET- Secured Hadoop Environment
IRJET- Secured Hadoop EnvironmentIRJET Journal
 
Improving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using HadoopImproving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using HadoopIJERA Editor
 
Privacy Preserving Data Analytics using Cryptographic Technique for Large Dat...
Privacy Preserving Data Analytics using Cryptographic Technique for Large Dat...Privacy Preserving Data Analytics using Cryptographic Technique for Large Dat...
Privacy Preserving Data Analytics using Cryptographic Technique for Large Dat...IRJET Journal
 
IRJET - A Secure Access Policies based on Data Deduplication System
IRJET - A Secure Access Policies based on Data Deduplication SystemIRJET - A Secure Access Policies based on Data Deduplication System
IRJET - A Secure Access Policies based on Data Deduplication SystemIRJET Journal
 
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageBio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageIJERA Editor
 
An efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environmentAn efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environmenteSAT Journals
 
Imperative Induced Innovation - Patrick W. Dowd, Ph. D
Imperative Induced Innovation - Patrick W. Dowd, Ph. DImperative Induced Innovation - Patrick W. Dowd, Ph. D
Imperative Induced Innovation - Patrick W. Dowd, Ph. Dscoopnewsgroup
 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Editor IJMTER
 
Ijarcet vol-2-issue-3-951-956
Ijarcet vol-2-issue-3-951-956Ijarcet vol-2-issue-3-951-956
Ijarcet vol-2-issue-3-951-956Editor IJARCET
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
An Efficient PDP Scheme for Distributed Cloud Storage
An Efficient PDP Scheme for Distributed Cloud StorageAn Efficient PDP Scheme for Distributed Cloud Storage
An Efficient PDP Scheme for Distributed Cloud StorageIJMER
 
Improved deduplication with keys and chunks in HDFS storage providers
Improved deduplication with keys and chunks in HDFS storage providersImproved deduplication with keys and chunks in HDFS storage providers
Improved deduplication with keys and chunks in HDFS storage providersIRJET Journal
 
A NEW FRAMEWORK FOR SECURING PERSONAL DATA USING THE MULTI-CLOUD
A NEW FRAMEWORK FOR SECURING PERSONAL DATA USING THE MULTI-CLOUDA NEW FRAMEWORK FOR SECURING PERSONAL DATA USING THE MULTI-CLOUD
A NEW FRAMEWORK FOR SECURING PERSONAL DATA USING THE MULTI-CLOUDijsptm
 
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...IJMER
 
Dynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudDynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudAM Publications
 
Authenticated Key Exchange Protocols for Parallel Network File Systems
Authenticated Key Exchange Protocols for Parallel Network File SystemsAuthenticated Key Exchange Protocols for Parallel Network File Systems
Authenticated Key Exchange Protocols for Parallel Network File Systems1crore projects
 

Similar a Presentation on cloud computing security issues using HADOOP and HDFS ARCHITECTURE (20)

IRJET- Secured Hadoop Environment
IRJET- Secured Hadoop EnvironmentIRJET- Secured Hadoop Environment
IRJET- Secured Hadoop Environment
 
Improving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using HadoopImproving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using Hadoop
 
Privacy Preserving Data Analytics using Cryptographic Technique for Large Dat...
Privacy Preserving Data Analytics using Cryptographic Technique for Large Dat...Privacy Preserving Data Analytics using Cryptographic Technique for Large Dat...
Privacy Preserving Data Analytics using Cryptographic Technique for Large Dat...
 
IRJET - A Secure Access Policies based on Data Deduplication System
IRJET - A Secure Access Policies based on Data Deduplication SystemIRJET - A Secure Access Policies based on Data Deduplication System
IRJET - A Secure Access Policies based on Data Deduplication System
 
H1803035056
H1803035056H1803035056
H1803035056
 
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageBio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
 
An efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environmentAn efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environment
 
Mn3422372248
Mn3422372248Mn3422372248
Mn3422372248
 
Imperative Induced Innovation - Patrick W. Dowd, Ph. D
Imperative Induced Innovation - Patrick W. Dowd, Ph. DImperative Induced Innovation - Patrick W. Dowd, Ph. D
Imperative Induced Innovation - Patrick W. Dowd, Ph. D
 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
 
Ijarcet vol-2-issue-3-951-956
Ijarcet vol-2-issue-3-951-956Ijarcet vol-2-issue-3-951-956
Ijarcet vol-2-issue-3-951-956
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
An Efficient PDP Scheme for Distributed Cloud Storage
An Efficient PDP Scheme for Distributed Cloud StorageAn Efficient PDP Scheme for Distributed Cloud Storage
An Efficient PDP Scheme for Distributed Cloud Storage
 
An4201262267
An4201262267An4201262267
An4201262267
 
Improved deduplication with keys and chunks in HDFS storage providers
Improved deduplication with keys and chunks in HDFS storage providersImproved deduplication with keys and chunks in HDFS storage providers
Improved deduplication with keys and chunks in HDFS storage providers
 
A NEW FRAMEWORK FOR SECURING PERSONAL DATA USING THE MULTI-CLOUD
A NEW FRAMEWORK FOR SECURING PERSONAL DATA USING THE MULTI-CLOUDA NEW FRAMEWORK FOR SECURING PERSONAL DATA USING THE MULTI-CLOUD
A NEW FRAMEWORK FOR SECURING PERSONAL DATA USING THE MULTI-CLOUD
 
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
 
Dynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudDynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for Cloud
 
L018137479
L018137479L018137479
L018137479
 
Authenticated Key Exchange Protocols for Parallel Network File Systems
Authenticated Key Exchange Protocols for Parallel Network File SystemsAuthenticated Key Exchange Protocols for Parallel Network File Systems
Authenticated Key Exchange Protocols for Parallel Network File Systems
 

Último

Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 

Último (20)

Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 

Presentation on cloud computing security issues using HADOOP and HDFS ARCHITECTURE

  • 1. TECHNICAL SEMINAR REPORT ON SECURITY ISSUES FOR CLOUD COMPUTING Presented by E.PUSHPA PRIYADARSHINI COLLEGE OF ENGINEERING & TECHNOLOGY [Affiliated to Jawaharlal Nehru technological university, Ananthapur] Kanupartipadu, Nellore-524004 2012-2013
  • 2. Overview 1. Introduction 2. Security Issues 3. Third Party Secure Data Publication Applied to CLOUD 4. Encrypted Data Storage for Cloud 5. Secure Query Processing with Hadoop 5.1 Overview of Hadoop 5.2 Inadequacies of Hadoop i)No facility to handle encrypted sensitive ii)Semantic Web Data Management
  • 3. iii)No fine-grained access control iv)No strong authentication 5.3 System Design i)Jena ii)Pellet iii)Pig Latin iv)Mahout, Hama v)Pre-processing 5.3.3 Query Execution and Optimization 5.4 Integrate SUN XACML Implementation into HDFS 5.5 Strong Authentication 6. Conclusion 7. References
  • 4. ABSTRACT  We discuss security issues for cloud computing and present a layered framework for secure clouds and then focus on two of the layers, i.e., the storage layer and the data layer.  we discuss a scheme for secure third party publications of documents in a cloud. Next, we will converse secure federated query processing with map Reduce and Hadoop, and discuss the use of secure co-processors for cloud computing.  Finally, the we discuss XACML implementation for Hadoop and discuss their beliefs that building trusted applications from untrusted components will be a major aspect of secure cloud computing.
  • 5. INTRODUCTION There is a critical need to securely store, manage,share and analyze massive amounts of complex data to determine patterns and trends  Because of the critical nature of the applications, it is important that clouds be secure Google has now introduced the MapReduce framework for processing large amounts of data on commodity hardware Apache’s Hadoop distributed file system (HDFS) is emerging as a superior software component for cloud computing combined with integrated parts such as MapReduce
  • 6. Due to the extensive complexity of the cloud, we contend that it will be difficult to provide a holistic solution to securing the cloud Our cloud system will: (a)support efficient storageof encrypted sensitive data, (b) store, manage and query massive amounts of data, (c) support fine-grained access control and (d) support strong authentication
  • 7. 2.SECURITY ISSUES  There are numerous security issues for cloud computing as it encompasses many technologies including networks, databases, operating systems Data security involves encrypting the data as well as ensuring that appropriate policies are enforced for data sharing We describe ways of efficiently storing the data in foreign machines Querying encrypted data, as much of the data on the cloud may be encrypted
  • 8. Data mining techniques may be applicable to malware detection in clouds  We are using Hadoop distributed file system for virtualization at the storage level and applying security for Hadoop which includes an XACML implementation  Resource allocation and memory management algorithms We are investigating secure federated query processing on clouds over Hadoop
  • 9. 3.THIRD PARTY SECURE DATAPUBLICATION APPLIED TO CLOUD ►We have developed techniques for third party publication of data in a secure manner ►security policy is specified depending on user roles and credentials Figure : Access control framework
  • 10. ►Users must possess the credentials to access XML documents ►For example, a professor has access to all of the details of students while a secretary only has access to administrative information ►If access is granted to the root, it does not necessarily mean access is granted to all the children ►When the subject requests a document, the publisher will apply the policies relevant to the subject and give portions of the documents to the subject. ►Owner will encrypt various combinations of documents and policies with his/her private key
  • 11. ►Using Merkle signature and the encryption techniques, the subject can verify the authenticity and completeness of the document ►In the cloud environment, the third party publisher is the machine that stored the sensitive data in the cloud
  • 12. 4.ENCRYPTED DATA STORAGE FOR CLOUD ►Data in the cloud will be placed anywhere ►We are using secure co-processor as part of the cloud infrastructure to enable efficient encrypted storage of sensitive data. ► Open Cirrus provides limited access based on their economic model ►Open Cirrus doesnot provide the hardware support we need (e.g., secure co-processors).
  • 13. ►By embedding a secure co-processor (SCP)into the cloud infrastructure, the system can handle encrypted data efficiently ►SCP is a tamper resistant hardware capable of limited general-purpose computation ►Secure coprocessor is tamper-resistant, one could be tempted to run the entire sensitive data storage server on the secure coprocessor. ►Due to the tamper-resistant shell, secure co-processors have usually limited memory .
  • 14. ►Another issue is that the software running on the SCP must be totally trusted and verified ►Framework will facilitate (a)secure data storage and (b) assured information sharing ►We have conducted research on querying encrypted data as well as secure multipart computation (SMC) ►One drawback of SMC is the high computation costs
  • 15. 5.SECURE QUERY PROCESSING WITH HADOOP 5.1 Overview of Hadoop A major part of our system is HDFS which is a distributed Java-based file system with the capacity to handle a large number of nodes storing petabytes of data HDFS architecture is based on the Master- Slave approach
  • 16. 5.3 SYSTEM DESIGN We are using several software tools that are available to help us in the process i)Jena: Jena is a framework which is widely used for solving SPARQL queries over RDF data ii)Pellet: We use Pellet to reason at various stages. We do real-time query reasoning using pellet libraries (Pellet) coupled with Hadoop’s map-reduce functionalities iii)Pig Latin: Pig Latin is a scripting language which runs on top of Hadoop.
  • 17.  It comes with many built-in functions, but we can also create our own user-defined functions to do special- purpose processing. iv)Mahout, Hama: These are open source data mining and machine learning packages that already augment Hadoop. Our approach consists of processing SPARQL queries securely over Hadoop. SPARQL is a query language used to query RDF data v)Pre-processing: Generally, RDF data is in XML format In order to execute a SPARQL query, we propose some data pre-processing steps and store the pre-processed data into HDFS.
  • 18. 5.3.3 Query Execution and Optimization We are developing a SPARQL query execution and optimization module for Hadoop. As our storage strategy is based on predicate splits First, we will look at the predicates present in the query.  Second, rather than looking at all of the input files, we will look at a subset of the input files that are matched with predicates. Third, SPARQL queries generally have many joins in them and all of these joins may not be possible to perform in a single Hadoop job.
  • 19. 5.4 Integrate SUN XACML Implementation into HDFS  Current Hadoop implementations enforce a very coarse- grained access control policy that permits or denies a principal access to essentially all system resources as a group without distinguishing amongst resources.  For example, users who are granted access to the Namenode may execute any program on any client machine, and all client machines have read and write access to all files stored on all clients  We are enforcing more flexible and fine-grained access control policies on Hadoop by designing an In- lined Reference Monitor implementation of Sun XACML.
  • 20. Untrusted processes in the framework access securityrelevant resources by submitting a request to the resource’s Policy Enforcement Point (PEP)  PEP reformulates the request as a policy query and submits it to a Policy Decision Point (PDP) IRM has advantage that the policy can be enforced without modifying the operating system
  • 21. 5.5 Strong Authentication ♦Open source community is actively working to integrate kerberos protocols with hadoop ♦On top of the proposed Kerboros protocol, for some assured information applications, there may be a need for adding simple authentication protocols to authenticate with secure co-processors ♦We can add a simple public key infrastructure to our system so that users can independently authenticate with secure coprocessors to retrieve secret keys used for encrypting sensitive data
  • 22. 6.Conclusion The main goal is to securely store and manage data that is not controlled by the owner of the data It will be difficult to achieve end-to-end security. However, the challenge we have is to ensure more secure operations even if some parts of the cloud fail Building trust applications from untrusted components will be a major aspect with respect to cloud security
  • 23. 7. References W3C. (n.d.). SPARQL. Retrieved from http://www. w3.org/TR/rdf-sparql-query Bertino, E. (2002). Access Control for XML Documents. Data & Knowledge Engineering, 43(3). Bertino, E. (2004). Selective and Authentic Third Party Distribution of XML Documents. IEEE Transactions on Knowledge and Data Engineering, 16(10). doi:10.1109/TKDE.2004.63 DeVries, B. W., Gupta, G., Hamlen, K. W., Moore, S., & Sridhar, M. (2009). ActionScript Bytecode Verification with Co-Logic Programming. In Proceedings of the ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS). Gates, F., Natkovich, O., Chopra, S., Kamath, S. M.,