Indonesian J
ournal of Ele
c
trical Engin
eering and
Computer Sci
e
nce
Vol. 2, No. 3,
Jun
e
201
6, pp. 695 ~ 70
2
DOI: 10.115
9
1
/ijeecs.v2.i3.pp69
5-7
0
2
695
Re
cei
v
ed Fe
brua
ry 25, 20
16; Re
vised
May 2, 201
6; Acce
pted Ma
y 17, 201
6
Making a Cloud Data Secure and Effective for Better
Performance of Services
Sa
n
g
e
et
Mish
r
a
1
, Asis Kumar Tripathy
2
,
Palla
vi Joshi
3
1,2
School of Informatio
n
T
e
chnol
og
y a
nd En
gin
eeri
n
g
3
School of Elec
tronics Eng
i
ne
erin
g
VIT
UNIVERSIT
Y
*Corres
p
o
ndi
n
g
author, e-ma
i
l
:
1
Sangeet.mis
hra8@
gma
il.co
m,
2
asistripathy@vit.ac.in,
3
pall
a
vi.
w
h
i
te
@gmai
l
.com
A
b
st
r
a
ct
Clou
d
data
se
curity is
o
ne
of
the
maj
o
r a
n
d
cruci
a
l c
onc
er
ns i
n
everyd
ay
life.
Now
a
d
a
ys clo
u
d
computi
ng
is e
m
er
gin
g
as va
st and fast
est grow
ing
t
e
chn
o
lo
gy d
epe
nd
i
ng o
n
th
e us
ag
e. Clo
ud c
o
mp
uti
n
g
does n
o
t all
o
w
to keep dat
a at user site an
d thus a
dat
a security is con
c
erne
d to be a
maj
o
r cha
lle
n
g
i
n
g
task regar
din
g
data stora
ge. T
h
is p
aper
over
all d
e
scri
bes th
e mon
i
torin
g
of
the clo
ud
data
concer
nin
g
d
a
t
a
storage. In
this
pa
per w
e
pro
pose
d
a n
e
w
meth
od
olo
g
y t
hat ca
n
efficie
n
tly
ma
nag
ed
the s
e
curity t
o
th
e
data an
d prov
ide priv
acy to
the consu
m
e
r
using t
he se
rvices of the clou
d. Our propos
ed tech
ni
qu
e
provides
data
security by
using th
e third party m
o
nitoring
system
whic
h
acts as an interface between
the
cl
o
u
d
con
s
ume
r
an
d
cl
o
u
d
own
e
r
. Ba
si
cal
l
y
th
i
r
d
p
a
r
ty
mon
i
to
rs the
ea
ch a
n
d
e
v
e
r
y a
c
tivi
ty o
f
th
e cl
oud
consu
m
er a
n
d
bas
ed
up
on
his
perfor
m
a
n
c
e h
e
res
p
o
n
d
to th
e cl
ou
d
ow
ner for
tak
i
ng
dec
isio
n.
Our
prop
osed
co
nc
ept pr
ovid
es th
e sec
u
rity fro
m
cons
umer
p
o
i
n
t of view
a
n
d
ow
ner si
de
of
view
makin
g
th
e
flexibi
lity to the
cloud i
n
frastru
c
ture. Existing
w
o
rks fo
cus mainly
on sec
u
ri
ty from ow
ner side of view
th
at
not well fitted into the lif
ecycle of data secur
i
ty.
Ke
y
w
ords
: clo
ud co
mp
utin
g; mo
nitori
ng; pri
v
acy; cl
oud co
nsu
m
er; clou
d
ow
ner; cloud i
n
frastructure
Copy
right
©
2016 In
stitu
t
e o
f
Ad
van
ced
En
g
i
n
eerin
g and
Scien
ce. All
rig
h
t
s reser
ve
d
.
1. Introduc
tion
Clou
d comp
uting i
s
the l
a
test a
nd fa
stest
eme
r
gi
ng te
chn
o
log
y
. The u
s
ag
e of thi
s
techn
o
logy m
a
inly dep
end
s u
pon
the
a
c
tivities p
e
rfo
r
med
by the
clou
d
con
s
u
m
er. Ba
sicall
y we
followe
d the
PaaS (Platfo
rm a
s
a
servi
c
e) mo
del
, so we ca
n monitor overall
perform
an
ce
o
f
clou
d activitie
s
. As there a
r
e more adv
antage
s of
cl
oud computin
g [1] but in spite of that the
main challen
ge face
d by the clo
ud com
puting is la
ck
of information
securi
ty, as
Figure 1. Private
clou
d is not better in com
pari
s
on to th
e public
clou
d. In Private
clou
d the co
nsum
er an
d data
own
e
r a
r
e id
entical,
so th
ey have full control ov
er t
he physi
cal
reso
urce
s an
d also th
ey can
install m
onito
ring
age
nts i
n
sid
e
phy
sical ma
chin
e t
o
colle
ct co
mplete n
e
ce
ssary info
rm
ation.
Whe
r
ea
s in p
ublic
clou
d, the con
s
u
m
er i
s
differe
nt an
d own
e
r i
s
different; thus th
e own
e
r
can
n
o
t
do anythin
g i
n
co
nsume
r
virtual ma
chi
n
e. The exi
s
ti
ng [2] s
y
s
t
em
does
not
c
o
mpletely fit into the
life cycl
e of
data
se
curity
. Ho
wever th
e contri
b
u
tio
n
of the
existing sy
stem
doe
s n
o
t sol
v
e
con
s
um
er’
s
p
r
oble
m
. Now
we intro
d
u
c
e
the su
cces
siv
e
step co
ncerning the
field of monitoring,
hen
ceforth
ca
lled MPCA
(Monitori
ng p
e
r
forma
n
ce of
clou
d a
c
tivities).
Clou
d co
mputing i
n
volves
sha
r
ing
of
co
mputing
re
so
urces [3] in
stead
of usi
ng local
servers to
exec
ute a
pplication. Cl
ou
d
is cl
assified o
n
the ba
si
s of
their lo
cation
and
thei
r types. Based o
n
the location t
hey are
publi
c
clou
d, private
cloud
and hy
brid
cloud. Ba
sed o
n
thei
r t
y
pes they are
Infrastr
uctu
re as a
se
rvices,
Platform as a
services a
n
d
Software a
s
a servi
c
e
s
. The main adva
n
tage of usin
g public
clou
d is
that custo
m
er has not the
not c
ont
rol au
thority over the clou
d com
p
uting infra
s
tru
c
ture
and thu
s
it can be
shared bet
ween anyone.
Various technologi
es [4] such
as virtualization, utility
comp
uting, lo
ad bala
n
ci
ng
make
s the
cloud
comp
uting obje
c
tive
to be a
c
hiev
ed succe
s
sfu
lly.
Instead
of m
any adva
n
tag
e
s
of
cloud
computing
the
r
e
are
few
se
riou
s
pro
b
lem
agai
nst it
su
ch
as data integ
r
ity, data privacy and data
security fo
r usin
g the clo
ud in vast aspect. Internet
is
one of the
technolo
g
y co
nsi
s
t [5] of gro
u
p
of follo
wed
on the
con
c
e
p
t of clou
d
co
mputing. In n
o
w
a day
s u
s
e
r
need
license
d
software t
o
work. Thi
s
made
a
use
r
to
be h
eavi
l
y rest
ricte
d
on
configuration of
software
and hardware
of
system
on
whi
c
h thi
s
software
will be i
n
stalled. Cloud
comp
uting [6]
has bee
n ev
olved for
solv
ing all the
s
e i
s
sue. Th
e m
a
in obj
ective
of this p
ape
r
to
Evaluation Warning : The document was created with Spire.PDF for Python.
ISSN: 25
02-4
752
IJEECS
Vol.
2, No. 3, Jun
e
2016 : 695
– 702
696
provide
se
cu
rity to
the data stored
in
clo
ud datab
ase from security threat
s issue
related to clo
u
d
.
This p
ape
r u
s
e
s
an a
dditi
onal mo
nitori
ng sy
stem which a
c
t
s
as an interfa
c
e
betwee
n
cl
o
ud
con
s
um
er an
d cl
oud
own
e
r. Thi
s
new pro
p
o
s
ed
concept h
a
s t
he extra
feat
ure to
blo
c
k
the
con
s
um
er a
c
cou
n
t on doin
g
wro
ng a
c
tivity.
Figure 1. Issues related to
cloud security
This
pap
er [
7
] overall
de
scribe
s th
e
m
onitori
ng of
the cl
oud
d
a
ta co
ncerni
ng data
stora
ge. T
he
importa
nce o
f
the pap
er i
s
to m
a
ke a
se
cure frame
w
ork fo
r
clou
d data
se
cu
ri
ty.
This n
e
w p
r
o
posed con
c
e
p
t has extra feature to
blo
ck th
e cu
sto
m
er a
c
count
on doin
g
wro
n
g
activity. Basically this mod
u
le a
c
ts a
s
a
n
in
terfa
c
e b
e
t
ween th
e o
w
ner a
nd
con
s
umer. T
he m
a
in
obje
c
tive of this p
ape
r to
provide
se
cu
rity to
the da
ta store
d
in
clou
d datab
a
s
e fro
m
secu
rity
threats i
s
sue
related to
cl
oud. As in f
u
ture d
e
man
d
s for
clo
ud
techn
o
logy will be increa
sed
becau
se of h
uge
sp
read
e
d
data all
aro
und the
wo
rl
d.
This
ca
nn
ot be a
s
sure
d that this
da
ta is
definitely se
cured. S
o
con
c
erning
for fut
u
re
re
fe
ren
c
e
we
propo
se
d
the meth
odol
ogy that
can
be
well
suite
d
fo
r se
cu
rity of th
ese
hu
ge
sp
reade
d d
a
ta. The set of
p
r
oce
dures
whi
c
h are
di
scu
s
sed
in existin
g
co
nce
p
t implie
s that they a
r
e not
we
ll
su
ited to the
lifecycl
e
of
dat
a security. T
h
is
make
s the
e
x
isting monit
o
ring
sol
u
tion
not well
suit
ed for
clou
d
infrast
r
u
c
ture.
Therefore
we
provide a
su
cce
ssive
step i
n
this field i.e. data se
curit
y
which p
r
ovi
des the pl
atform for the cl
o
ud
infras
t
r
uc
ture to mak
e
its
s
e
rvic
es
flexibly and
effici
ently availabl
e for the
use
r
s. T
he
propo
sed
system p
r
ovi
des a
better
and flexible
monitori
ng
framework that
make
s t
he cl
oud
infrastructure
more
se
cu
ra
ble. It provides the mo
nitoring to
b
o
th
i.e. cloud o
w
ne
r and
clo
ud co
nsume
r
. This
provide
s
the
clou
d co
nsu
m
er a monit
o
ring pl
a
tform throug
h which h
e
/sh
e
can
cu
stomize the
monitori
ng re
sou
r
ces. T
h
e
prop
osed
system ma
ke
s t
he monito
ring
frame
w
ork
more
relia
ble
by
allowin
g
third
party whi
c
h o
v
erall monito
r the activities of cloud o
w
n
e
r.
2. Related Work
Jo
se M Al
ca
raz
Cale
ro
et al [1] have di
sc
usse
d ab
o
u
t monitori
ng
archite
c
ture
and its
benefits to
wa
rds
clo
ud dat
a se
cu
rity. They talk abo
ut the chall
eng
e
s
faced by cl
oud comp
utin
g.
These challe
nge
s sh
ould
be add
re
ssed
seri
ou
sly in orde
r to provide better m
o
nitoring
soluti
ons.
Firstly
they provide
successive soluti
on corre
s
p
o
n
d
ing to
moni
toring
platform i.e. IaaS
Mon
(Infra
stru
ctur
e a
s
a
s
e
rv
ic
e) b
u
t
this
is
not well fitted into the dat
a
se
cu
rity life
cycle. It p
r
ovi
des
informatio
n of infrastru
c
tu
re
to owner but
doe
s not
involve any consu
m
er rel
a
ted in
formation. So
they propo
se
d a
ne
w
sch
e
me
co
ncern
i
ng m
onitori
n
g
a
r
chitectu
re i.e. Mo
nPa
a
S. It provid
es
monitori
ng
scheme from b
o
th the si
de i.
e. own
e
r
side
as
well a
s
consume
r
si
de
. Lifei Wei
et al
[8] have work on maki
ng
the cloud d
a
ta stable an
d
flexible for its efficient use. They h
a
ve
con
s
id
ere
d
t
he
se
curity f
eature
alo
n
g
with
data
storage.
They
have
pro
p
o
s
ed
Sec-
Cl
oud
frame
w
ork b
a
se
d on pro
b
abilisti
c sam
p
ling techni
qu
e as well a
s
desi
gnate
d
verifier techniq
ue.
Evaluation Warning : The document was created with Spire.PDF for Python.
IJEECS
ISSN:
2502-4
752
Makin
g
a Clo
ud Data Se
cu
re and Effecti
v
e for Better
Perform
a
n
c
e
of Servi
c
e
s
(S
ange
et Mish
ra)
697
Basically they focuse
d on
divide the data in sampl
e
form whi
c
h
are sm
all in
size a
nd th
en
distrib
u
te it. Thus it doe
s not create
o
v
erload
on
server. By thi
s
they p
r
e
s
erve data st
ora
ge,
computation. Preeti
Sirohi et
al
[4] focus on the
encr
yption and decryption
approach facilitat
ing
clou
d user
with data se
cu
ri
ty assu
ran
c
e.
The pro
p
o
s
e
d
solutio
n
talks o
n
ly about
the security of
data not
co
ncernin
g
a
bout
the authe
ntication sch
e
me
that ca
n le
a
d
to mo
re l
e
vel of security. A
Ne
w mo
del f
o
r d
a
ta
se
cu
ri
ty in clo
ud
co
mputi
ng environment usi
n
g
the
in
fo
rmati
on
stated i
n
t
he
previou
s
sect
ion is offere
d
.
The prop
osed syste
m
uses a three la
yer system
structu
r
e in
whi
c
h
these laye
rs
are u
s
ed fo
r ensurin
g data
security.
The
propo
se
d mo
del en
sures t
hat prote
c
tion
of
the use
r
co
nfidential inf
o
rmatio
n by ensu
r
ing fa
ster retrieval
of the data usin
g se
curity
intelligen
ce
a
nd adva
n
ced
se
cu
rity data protecti
o
n
. Je
su
s Mo
nte
s
a et
al. [9] have di
scussed
about monito
ring large scale distri
bute
d
system
. Variou
s studi
e
s have been made to anal
yze
and discu
s
s about monito
ring
of
di
strib
u
ted system
and sp
ecifi
c
a
lly of clo
ud
computing.
Th
is
pape
r focuse
s on a
nalysi
s
of monitorin
g
system fr
o
m
the clo
u
d
provide
r
poi
n
t
of view but not
focu
se
s o
n
t
he n
eed
of
cl
oud
co
nsume
r
s. Ku
n M
a
e
t
al [10]
have
discu
s
sed
a
bout m
o
nitori
ng
platform for t
he clo
ud infrastru
c
tu
re. As in t
oday’s
scena
r
io cl
ou
d is be
comin
g
the necessary
part of the
organi
zation, A
pplicati
on b
e
i
ng de
ployed
on to the
clo
u
d
ha
s be
co
m
e
a maj
o
r p
r
io
rity.
This pa
per di
scusse
d the
overall
expe
ri
ence with
p
u
b
lic clo
ud and
so
thei
r p
r
o
p
o
se
d
wo
rk is that
they have de
sign
ed the lig
ht wei
ght pu
b
lic clo
u
d fram
ewo
r
k.
3. Methodol
og
y
The below gi
ven diagram
will explain the ov
erall wo
rking of the p
r
oposed
syste
m
. The
proposed system includes three modules I.e. cloud
owner, cloud consumer and
third party. F
i
rst
of all
the clo
ud consume
r
will register on
the appl
ication deployed in
the cl
oud, then after
registering co
nsumer
will login on to th
e applicat
ion. After successful login cloud consumer will
first sent the request to clo
ud owne
r. Then afte
r that
cloud own
e
r
will c
heck that whether he/she
got the request from cloud consum
er. If
he got t
he clo
ud owner will
generate one
public key and
one se
cret
key (private key) for cloud
consum
er.
By using that key con
s
ume
r
will en
crypt their
data which h
e
wants to be
uploaded
in
cloud d
a
t
abase. After this
when
con
s
u
m
er wants hi
s/her
data from the cloud datab
ase, the clou
d owner
w
ill provide the task to clou
d
consum
er. Afte
r
doing the task, third party
which a
c
ts as an
interface between clou
d owner and
cloud con
s
u
m
er
will match th
e information filled ou
t by consumer
during the task completition. If he got righ
t
details then consumer will
able to use th
e service
s
of
cloud or else
third party will directly inform
to the owner t
hat the particular con
s
ume
r
is
doing
wro
ng something
and simultan
eously the clo
ud
owner
will ge
nerate a
warning messag
e to the co
n
s
umer that you can f
ill
the wrong details
onl
y
three times after that your
accou
n
t will be dis
abled. This way our propose
d
system will provi
de
s
e
c
u
rity (Figu
r
e 2).
Figure 2. Flo
w
diagram of
the system
Evaluation Warning : The document was created with Spire.PDF for Python.
ISSN: 25
02-4
752
IJEECS
Vol.
2, No. 3, Jun
e
2016 : 695
– 702
698
4. Pre
v
ious
Sy
stem
They basicall
y
focus on
the monitoring
frame-
work
which re
solves the issu
es f
a
ced by
IaaSMon.
In the previous system security is
not being
provided upto the standard
being accept
ed
in data security
life
cycle.
In t
he existing system secu
rity is bei
ng
provided from
the owner point
of view and consumer
poin
t
of view. The
owner i
s
self
-monitoring a
u
thority. Only monitoring from
authentication point of view ha
s been
done in exis
ting system b
u
t that is not well enou
gh
for
secu
rity purpose. Existing
system is basically
base
d
on monitoring agents in
stalled inside
the
machine to gather information. These facts make
the traditional
monitoring so
lutions not fit for
cloud infrastructures. So
we proposed a su
cc
e
ssive step i.e. called M
P
CA (Monitoring
performance of cloud activities) which p
e
rfectly
removes the issue
s
faced by existing system.
The drawba
cks of previous system are as follows:
We can’t monitoring the clo
ud storage
We can’t find
out the author
ization
5. Proposed
Sy
stem
The prop
ose
d
system p
r
o
v
ides a better and
flexible monitoring framework that make
s
the cloud infrastructure m
o
re se
curable
.
It prov
ides the monitoring to both i.e
.
cloud owner a
n
d
cloud consu
m
er. This pro
v
ides the clo
ud con
s
um
er a monitoring
platform through whi
c
h he
/she
can
customize the monitoring re
sources.
The pr
opose
d
system ma
kes the
monitoring frame
w
ork
more reliable
by allowing
third party which over
all monitor the
activities of cloud owner.
The
advantages of proposed scheme are as follows:
We can monitoring the cloud storage
Can find out
the authorization
Proposed al
gorithm:
Step 1: Create an VM (virtual machine)
Step 2: Until
"done"
Distribute the
files or data’s
(MPCA)
Distribute Mon pass to t
he Nagios(re
co
mbination)
Monitoring th
e metrics (mu
t
ation)
VM for Tenan
t Monitoring d
oes not exit
Wait until Mo
n ready configuration acce
ss
In the proposed framework monitoring feature is much
powerful tha
n
existing system so that no
user even re
gistered also
can harm the
cloud infr
ast
r
ucture. He
re
both i.e. cloud provider a
n
d
third party are keeping eye contact on all the acti
vities done by consumer. In this system we
created three
warnings for
the con
s
umer doing
wron
g
activities. After third
warning also, if he
is
doing wrong
activities his
accou
n
t can be blocked or
might be deleted from
registered user li
st.
6. Sy
stem Architec
ture
The users or node
s involved in o
u
r p
r
o
j
ects
are
sen
der, intermed
iate and rece
iver, as
Figure 3. In order to se
nd file, the sender has
to find
out the list of nodes
which
are co
nnect
ed
with the sender. From that
available list
he can
choo
se receiver. Then the sender has to analyze
the performance of each and every no
de which is
connected with the sender. The performance
analysis list
will return th
e priority based result
so t
hat sender can choo
se th
e intermediate to
send the file
. The
Intermediate will r
e
ceive t
he fi
le from sender then it
will analyze
the
performance so that it can send data to another interm
ediate or receiver. In the
receiver side,
the
receiver ha
s
to select the
file path to receive
the file from send
er or interm
e
d
iate. Then the
receiver can
view the
file r
e
ceived file.
Evaluation Warning : The document was created with Spire.PDF for Python.
IJEECS
ISSN:
2502-4
752
Makin
g
a Clo
ud Data Se
cu
re and Effecti
v
e for Better
Perform
a
n
c
e
of Servi
c
e
s
(S
ange
et Mish
ra)
699
Figure 3. Ove
r
all System
Architecture
7. Soft
w
a
r
e
specific
a
tion
This is about the software language and
the tool
s used in the development of the
project.
The platform
used here is
.NET. The Pr
imary languag
es are C#,
VB, and J#.
In this project C#
is chosen for implementation. Basi
cally
we have worked .NET platform which gives look and feel
to the application.
.NET has built in components wh
ich provide the user to directl
y
use them an
d
build a
simple user interface application. We
have
used ASP.NET with visual c# for front end
designing a
n
d
SQL Serve
r
for ba
ck en
d designi
ng.
When
we d
e
v
eloped the web ap
plication so
one nece
ssa
ry thing we ha
ve to kept in
our mind while developing I.e. how to store data which
are being use
d
by web services in
order to operate efficiently.
8. Result a
n
d discussion
In previou
s
re
sea
r
che
s
con
c
erning
clo
u
d
data
se
cu
rity there
wa
s no
provisi
on of
makin
g
the clou
d secu
re fro
m
consume
r
poi
nt of vi
ew, it was givin
g
the se
cu
rity only for clo
u
d
provide
r
(own
er).Also the existing sy
ste
m
lacks t
he al
ert system
(m
essag
e
al
ert
sy
st
em
).
B
u
t
this
new
syste
m
develop
ed in
this p
r
oje
c
t h
a
s g
o
t a
ll the
above m
enti
oned fe
ature
s
that i
s
no
w
the
clou
d data
is se
cu
red
bot
h for
own
e
r
as
well
as consume
r
.
Th
e
Tabl
e
1 b
e
low sh
ows the
comp
ari
s
o
n
for mo
nitorin
g
time for regi
sterin
g t
he
consume
r
T ti
me interval
o
f
24 se
co
nd
s for
both the exist
i
ng system a
nd the pre
s
e
n
t
ly im
plemented syste
m
, Figure 4
refers
to this-
Table 1. Co
m
pari
s
on b
e
tween two
syste
m
s for r
egi
ste
r
ing tena
nts for 24 sec tim
e
interval
S No.
No. o
f
te
nan
t
s
For Exist
i
ng
s
y
stem
For pres
ent
s
y
s
t
em
1 1
20
28
2 2
31
32
3 4
41
38
4 8
80
90
Similarly other figure
s
like Figure
s
6,
7,8
are showing the tena
nt and Admin time for
regi
stratio
n
s
for different numbe
r of tenants an
d
at different intervals an
d different monito
ring
times for
25,
26, 27
se
cond
s etc. Ba
sically t
he
re
sults have sl
ight
fluctuatio
n between t
h
e
perfo
rman
ce
s of
clou
d
se
rvice
s
fo
r o
w
n
e
r
a
s
well
a
s
custome
r
site
s w.r.t time.
Ping Tim
e
i
s
th
e
amount of time taken for the first req
uest bein
g
resp
ond
ed by virtual mach
ine. In Figure 4,
Evaluation Warning : The document was created with Spire.PDF for Python.
ISSN: 25
02-4
752
IJEECS
Vol.
2, No. 3, Jun
e
2016 : 695
– 702
700
Figure 7 th
e
overall
perfo
rmance of
mo
nitoring
time
is n
o
t in lin
e
a
r m
ann
er. I
n
Figu
re
5 th
e
overall
perfo
rmance i
s
b
e
ing
sho
w
n i
n
curve
form
in
cre
a
si
ng i
n
p
a
rallel
man
n
e
r
. In Figu
re
6
the
overall pe
rformance is bei
ng increa
se
d in parall
e
l an
d linear m
ann
er.
Figure 4. Monitoring time f
o
r 24 second
s of time interval
Figure 5. Monitoring time f
o
r 25 second
s of time interval
Evaluation Warning : The document was created with Spire.PDF for Python.
IJEECS
ISSN:
2502-4
752
Makin
g
a Clo
ud Data Se
cu
re and Effecti
v
e for Better
Perform
a
n
c
e
of Servi
c
e
s
(S
ange
et Mish
ra)
701
Figure 6. Monitoring time f
o
r 26 second
s of time
Figure 7. Monitoring time f
o
r 27 second
s of time interval
9
.
Conclusio
n
A distributed and flexible monitoring
fr
amework h
a
s been
pro
v
ided to the cloud
community. Under the d
i
fferent stressing work
loa
d
condition
this monitoring architecture
performs re
ally well.
In this
paper we al
so intr
oduce the conce
p
t of third party monitoring system
who overall
monitor the
entire cloud
activities
done by use
r
e
s
pecially clou
d con
s
ume
r
. The
proposed framework gives the adaptabi
lity to
the cloud administrations and clou
d assets offered
to the client.
Our future work
will focus on the
mode
l and method
ology that will
work much
well
even in workload conditio
n
. We might
want
to au
gment the observing eng
ineering utilizing
worklo
ad adju
s
ting capa
cities for the che
cking admini
s
trations of the cloud sho
p
p
e
r too. In futu
r
e
Evaluation Warning : The document was created with Spire.PDF for Python.
ISSN: 25
02-4
752
IJEECS
Vol.
2, No. 3, Jun
e
2016 : 695
– 702
702
we will utilize
load adjusting strategy to m
a
intain
a strategic distance
from the heap on server for
assigning a
s
sets.
Referen
ces
[1]
Jose M Alcara
z Calero, et al
. “MonPaaS: An A
daptiv
e Mo
nitori
ng Platfor
m
as a Service for Clou
d
Comp
uting Infr
astructures an
d Services”.
IEEE Transaction on servic
e com
p
uting
. 201
5; 8(1).
[2]
Lou
ai A Magh
rabi. “T
he
T
h
reats of Data Secu
rit
y
over the
Clo
ud
as Perceiv
ed
b
y
Exp
e
rts
an
d
Univers
i
t
y
Stu
d
ents”. 978-1-
47
99-2
806-
4/14/$
31.00 ©20
14 I
EEE.
[3]
Mr Krunal P
a
te
l, et al. “Data Securit
y
an
d P
r
iv
ac
y
usi
ng D
a
ta Partitio
n a
nd Ce
ntric ke
y manag
eme
n
t
in Clo
ud”.
ICIC
ES201
4 pu
blic
ation j
ourn
a
l
, ISBN No. 978-
1
-
479
9-38
34-
6/14.
[4]
Lifei We, et
al. “
Sec
Cl
ou
d: Brid
gin
g
S
e
cure
Stora
g
e
an
d C
o
mp
utation
in
C
l
ou
d
”. IEEE 30t
h
Internatio
na
l C
onfere
n
ce o
n
Distri
but
ed Co
mputin
g S
y
ste
m
s W
o
rkshops
. 2010.
[5]
Cong Wang,
et al. “
Towards Secur
e
and Effective Uti
l
i
z
a
t
i
o
n
over
E
n
crypted
Cl
ou
d Dat
a
”. 31st
Internatio
na
l C
onfere
n
ce o
n
Distri
but
ed Co
mputin
g S
y
ste
m
s W
o
rkshops
. 2011.
[6]
Lou
ai A Magh
rabi. “T
he
T
h
reats of Data Secu
rit
y
over the
Clo
ud
as Perceiv
ed
b
y
Exp
e
rts
an
d
Univers
i
t
y
Stu
d
ents”. 978-1-
47
99-2
806-
4/14/$
31.00 ©20
14 I
EEE.
[7]
Gaurav Garkot
i, et al. “Det
ection of Ins
i
der
A
ttacks in Cloud bas
ed e-
Healthcare E
n
vironment”. 2014
Internatio
na
l C
onfere
n
ce
on
Informatio
n
T
e
chno
logy
.
97
8-
1-47
99-8
0
8
4
-0
/14 $
31.0
0
©
201
4 IEE
E
DOI 10.110
9/ICIT
.2014.43.
[8]
Afzaal A
h
mad,
et al. “Ens
uri
n
g Data
Sec
u
rity
and
Privac
y
i
n
Cl
ou
d Com
p
uting t
h
rou
gh T
r
ansp
a
renc
y
as Service Mo
del”. 20
14
IJ-CLOSER
. 201
4; 3(5): 253-
25
9.
[9]
Mr Krunal P
a
te
l, et al. “Data Securit
y
an
d P
r
iv
ac
y
usi
ng D
a
ta Partitio
n a
nd Ce
ntric ke
y manag
eme
n
t
in Clo
ud”.
ICIC
ES 2014
pub
lic
ation j
ourn
a
l
, ISBN No. 978-
1
-
479
9-38
34-
6/14.
[10]
Devki Ga
urav
Pal. “A N
o
vel
Open
S
e
curit
y
F
r
ame
w
ork
fo
r Clo
ud
Comp
uting”.
IJ-CLO
SER
. 20
12
;
1(2): 45-5
2
.
Evaluation Warning : The document was created with Spire.PDF for Python.