Conference Papers

Permanent URI for this collectionhttps://idr.nitk.ac.in/handle/123456789/28506

Browse

Search Results

Now showing 1 - 7 of 7
  • Item
    Agent-based approach for distributed access control in cloud environments
    (IEEE Computer Society, 2013) Thomas, M.V.; Chandra Sekaran, K.
    Recently, considerable attention has been given to the emerging cloud computing paradigm in the distributed computing environments where, users access various services and shared resources hosted by the service providers, for the successful and efficient completion of their tasks. In this context, in order to prevent the unauthorized access of the distributed system components, authentication and authorization functions are to be enforced effectively. Hence, the proper access control of distributed shared resources assumes high significance, as far as the secure computing paradigm is concerned. In this paper, we make an analysis of the distributed access control issue considering the various mechanisms proposed by the researchers in this area, discussing their merits and demerits. The issues and concerns in different contexts of distributed computing environments are highlighted. We propose an agent-based approach for the distributed access control in cloud environments for mediating the access requests of cloud consumers, considering the present day requirements of the cloud computing paradigm. We also give the workflow model for the proposed agent-based approach for the distributed access control in cloud. A few open issues in the area of distributed access control are also discussed. © 2013 IEEE.
  • Item
    An access control model for cloud computing environments
    (IEEE Computer Society help@computer.org, 2013) Thomas, M.V.; Chandra Sekaran, K.
    Cloud Computing is a distributed computing paradigm which allows the users to access the services and shared resources hosted by the various service providers, to meet their services or resources requirements. In order to prevent the unauthorized or illegal access of the cloud resources, authentication of the requesting users and the authorization of their access privileges are extremely important. The access control of distributed resources is most important in securing the cloud scenario. In this paper, we analyze the various access control mechanisms adopted in the distributed computing domain, considering their pros and cons. We propose an architecture for the Distributed Access Control (DAC) in the Cloud Computing paradigm, taking into account the access control requirements of the cloud service providers and consumers. We also give the workflow model for the proposed access control architecture. A few open issues in the area of DAC are also discussed in this paper. © 2013 IEEE.
  • Item
    Workflow model for distributed access control
    (2013) Thomas, M.V.; Chandra Sekaran, K.
    In the distributed computing environments like cloud computing or service computing, users access various services and shared resources hosted by the service providers, to achieve their tasks done efficiently. Authentication and authorization are the two important functions to be performed in this context, to make sure that unauthorized users do not access the distributed system components. In this paper, we analyse the various distributed access control approaches already adopted in this area, considering the advantages and the disadvantages. We propose a distributed access control architecture for the cloud computing paradigm considering the present day requirements of the service consumers and service providers. We also give the workflow model for the proposed distributed access control system in the cloud. A few open issues in the area of distributed access control are also discussed. © 2013 IEEE.
  • Item
    Load balancing of MongoDB with tag aware sharding
    (Walter de Gruyter GmbH info@degruyter.com, 2015) Shegokar, P.; Thomas, M.V.; Chandrasekaran, K.
    In the era of Big Data, traditional databases face many problems to process data effectively. To solve problems we have NoSQL databases which can solve the problems and are becoming very popular. MongoDB is a document oriented NoSQL database which can process large data sets with the help of sharding mechanism. MongoDB supports range-based sharding, hash-based sharding and tag aware sharding. Problem with range-based method is that one of the shard will have more load. In case of hash-based method, we can distribute the load among shards but related data aren't together. Tag aware sharding method is better than the other two methods. But this method need to be enhanced as tagged data can belong to more shards and balancer have to migrate the data to most appropriate shard, hence we are enhancing the tag aware sharding in MongoDB. Improper distribution of data can't allow us to use all the benefits of sharding. Tag aware sharding is administrator based method in which tags are mentioned by the administrator. According to tags, data is migrated but we need to balance the load. To solve this problem, Weighted Round Robin (WRR) load balancing algorithm is used and it has improved the writing and querying performance.
  • Item
    An efficient game-theoretic approach for resource management in Cloud Federation
    (Institute of Electrical and Electronics Engineers Inc., 2016) Thakur, P.K.; Thomas, M.V.; Chandrasekaran, K.
    Cloud Federation is an emerging technology for the effective utilization of cloud resources. Effective management of resources is very much required in order to increase the profits of individual CSPs in the federation. Hence, it is of crucial business value for a cloud provider to develop an effective mechanism so that the resource management is efficient in the cloud federation scope. In this paper, we discuss the design and development of game-theoretic approach for the resource management mechanism also considering the trust values between the participating CSPs in the federation. We have discussed and analysed the performance of both the co-operative and non co-operative approaches for the resource allocation. © 2015 IEEE.
  • Item
    An efficient trust-based Game-Theoretic approach for Cloud Federation Formation
    (Institute of Electrical and Electronics Engineers Inc., 2016) Dhole, A.; Thomas, M.V.; Chandrasekaran, K.
    Cloud Federation or a Coalition of Cloud Service Providers (CSPs) is a hot topic nowadays in the industry as well as academia. Cloud Federation was introduced to overcome the realistic limited amount of resources available from a single CSP so that the CSPs may not lose its customers due to the unavailability of resources. But its a challenge to form a Cloud Federation which is stable, reliable and fair in terms of payoff to the CSPs that are part of the Cloud Federation. In this paper, we propose to find a solution to the Cloud Federation formation by following a game-theoretic approach considering the trust between the participating CSPs. This technique will also allow the CSPs to take decision unilaterally based on their own decisions depending on the profit they would receive upon inclusion into the federation. Our approach takes into consideration the trust between the CSPs taking part in the Cloud Federation Formation process. The Game-Theoretic approach used in our approach makes use of a simple Cloud Federation Formation policy which ensures stability and fairness in the Cloud Federation. © 2016 IEEE.
  • Item
    Agent-based approach for the management of dynamic QoS violations in the inter-cloud environments
    (Springer Verlag service@springer.de, 2018) Thomas, M.V.; Chandrasekaran, K.; Mugeraya, G.
    Nowadays, considerable attention has been given by the researchers in the field of Cloud Computing to the emerging Inter-Cloud computing paradigm, where different cloud service providers collaborate or federate to achieve better QoS and cost efficiency. In this context, in order to prevent the unauthorized access of the distributed system components, authentication and authorization functions are to be enforced effectively. In this paper, we propose the conceptual model of the agent-based approach for the identity and access management in the dynamic inter-cloud environments where the Cloud Service Providers or the partners of the inter-cloud federation join and leave the federation dynamically. We further discuss the architectural model for the agent-based approach for solving the policy conflicts in the inter-cloud scenario while dealing with the access requests of cloud consumers in the inter-cloud environments. A few open issues in the area of identity and access management in the inter-cloud environment are also discussed. © 2018, Springer Nature Switzerland AG.