Professional Documents
Culture Documents
Outline
Aims and Objectives Cloud Security Issues Existing models Proposed model Simulations Results Conclusion and Future work Demo References
Aim
To evaluate the cloud performance under the secure firewall implementation and block the unwanted web traffic using the OPNET IT guru simulation.
Objective
To review the cloud security issues and the current security models To propose a new security model for cloud data and information security To design the simulation using OPNET It guru and create three scenarios To measure the performance of the cloud under these three scenarios using some performance metrics To compare the scenario results and corresponding graphs and to evaluate the performance of cloud
Existing models
Cloud cube model
Organization boundaries Open/propriety Parameterized/De-parameterized Insourced/Outsourced nature of cloud
Proposed model
Here, three scenarios are created: - No Firewall scenario
- Firewall scenario
- Firewall scenario: Blocking Web access
A heavy database access application is used in this simulation such that imposes more database queries over the database server.
9
10
11
12
Simulation procedure
OPNET IT guru as simulation tool
Provides rich user interface This has an object palette Compare scenarios Three levels of performance metrics
13
16
17
19
Results
Results for Database application
Database query response time: This indicates overall performance of the database application
When the unwanted web traffic is blocked, the overall performance of the database application is enhanced and also the security across the cloud is enhanced.
Results (contd..)
Server DB query load: The overall load on the database server is estimated When there is firewall over the network the overall load on the database server is increased as due to the additional security firewall policies.
Results (contd..)
Database Server point to point utilization: This indicates the application performance against the key security issues. The point to point utilization of the database server is increased when there is firewall across the cloud.
Results (contd..)
Results for web application
Page response time for no firewalls scenario: The average response time is constant across the simulation and the maximum time consumed in this context is one minute The flow of the web application is constant across the cloud without any limitations
Figure 22. HTTP response time
29
Results (contd..)
Page response time across firewalls scenarios: The average maximum page response time across the web application is 6 seconds From the overall analysis it can be understood that blocking the web traffic will increase the page response time.
Figure 23. HTTP response time
30
Results (contd..)
Cloud performance
Point to point cloud utilization across west router:
This indicates overall point to point cloud utilization across the west router The overall utilization of the cloud can be optimized when the web traffic is blocked using the firewalls.
Conclusion
Providing security to the database resources and web resources is a tedious task A new security model is proposed and the proposed design is explained, OPNET IT guru is used for simulation From the overall analysis of the results the proposed firewall model is well used for enhancing the database application
32
Future work
More number of applications can be used to evaluate the performance of the security model proposed Combined clouds and hybrid clouds can be used in future to evaluate the security requirements
33
Demo
34
References
Galen Gruman . (2009). What cloud computing really means. Journal of cloud computing. 21 (1), p10-14. Dave Asprey. (2010). Building a truly secure Cloud with Dell and Trend Micro. Journal of Computer Applications. 2 (1), p915. Richard Chow. (2009). Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control. International Journal of Network Security & Its Applications (IJNSA. 20 (1), p7-12. Jon Brodkin. (2008). Gartner: Seven cloud-computing security risks. Cloud Security Journal . 3 (1), p4-7.
35
References (contd..)
Alan Boehme. (2010). Top Threats to Cloud Computing V1.0. Cloud Security Alliance. . 10 (2), p19-23. CHEN Quan. (2009). Cloud computing and its key techniques. Journal of Computer Applications. 20 (1), p10-12. Kevin Hamlen. (2010). Security Issues for cloud computing. International Journal of Information Security and Privacy. 4 (2), p12-15. ELIZABETH WHITE. (2009). Safeguarding Management and Security in the Cloud. Cloud Security Journal . 3 (1), p8-12.
36
References (contd..)
Aderemi A. Atayero. (2011). Security Issues in Cloud Computing: The Potentials of Homomorphic Encryption. Journal of Emerging Trends in Computing and Information Sciences. 2 (10), p12-16. David Binning. (2011). Top five cloud computing security issues. International Journal of Software engineering. 4 (2), p20-24. Terri Quinn-Andry. (2010). Pervasive Security Answers Cloud Computing Worries. Cisco cloud articles. 2 (1), p10-13.
37