Nexgen Technology Address:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com.
www.nexgenproject.com
Mobile: 9791938249
Telephone: 0413-2211159.
NEXGEN TECHNOLOGY as an efficient Software Training Center located at Pondicherry with IT Training on IEEE Projects in Android,IEEE IT B.Tech Student Projects, Android Projects Training with Placements Pondicherry, IEEE projects in pondicherry, final IEEE Projects in Pondicherry , MCA, BTech, BCA Projects in Pondicherry, Bulk IEEE PROJECTS IN Pondicherry.So far we have reached almost all engineering colleges located in Pondicherry and around 90km
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Mmbcloud tree authenticated index for verifiable cloud service selection
1. CONTACT: PRAVEEN KUMAR. L (,+91 – 9791938249)
MAIL ID: sunsid1989@gmail.com, praveen@nexgenproject.com
Web: www.nexgenproject.com, www.finalyear-ieeeprojects.com
MMBCLOUD-TREE: AUTHENTICATED INDEX FOR VERIFIABLE CLOUD
SERVICE SELECTION
ABSTRACT:
Cloud brokers have been recently introduced as an additional computational
layer to facilitate cloud selection and service management tasks for cloud
consumers. However, existing brokerage schemes on cloud service selection
typically assume that brokers are completely trusted, and do not provide any
guarantee over the correctness of the service recommendations. It is then
possiblefor a compromised or dishonestbroker to easily take advantage of the
limited capabilities of the clients and provide incorrect or incomplete
responses. To address this problem, we propose an innovative Cloud Service
Selection Verification (CSSV) scheme and index structures (MMBcloud-tree) to
enable cloud clients to detect misbehaviour of the cloud brokers during the
service selection process. We demonstrate correctness and efficiency of our
approaches both theoretically and empirically.
EXISTING SYSTEM:
Since our work is related to both cloud service selections and query
authentication in databases, we review the works in these two areas in the
following subsections, respectively. There have been several efforts on cloud
service selection in the literature. A general cloud service selection framework
was proposed by Goscinskiand Brock which includes cloud service publication,
discovery and selection. Han et al. described a recommendation system in
2. CONTACT: PRAVEEN KUMAR. L (,+91 – 9791938249)
MAIL ID: sunsid1989@gmail.com, praveen@nexgenproject.com
Web: www.nexgenproject.com, www.finalyear-ieeeprojects.com
cloud computing suitable for design-time decisions as it statically provided a
ranking of available cloud providers. Li et al. developed systematic comparator
CloudCmp to help customers choose a cloud that meets their needs through
measuring and comparing the elastic computing, persistent storage and
networking services. Aiming at evaluating the performance and capabilities of
services offered by CSPs for facilitating customers’ selections, Binnig et al.
designed a new benchmark to fit the characteristics (e.g., scalability, pay-per-
use and fault-tolerance) of cloud computing.
PROPOSED SYSTEM:
Our proposed authenticated index structures are related to those developed
for query authentication in outsourced databases which can be classified into
two main categories: Hash-based approaches and Signature-based approaches,
as shown in Table 1. The hash-based approaches employ the Merkle hash tree
or its variants to index the search keys. During a query, the service provider
(i.e., resembles the cloud broker in our scenario) traverses the tree to identify
the query results, and then send the results and some associated hash values
of necessary nodes as proof messages to the client. Based on the received
proof information, the client reconstructs the path from the nodes containing
the query results to the root of the tree in order to verify the correctness of
the query results. Our work also belongs to this category. Compared with
existing works that also have the Merkle B+-tree as the base structure, our
work is superior to them because they either do not support multidimensional
3. CONTACT: PRAVEEN KUMAR. L (,+91 – 9791938249)
MAIL ID: sunsid1989@gmail.com, praveen@nexgenproject.com
Web: www.nexgenproject.com, www.finalyear-ieeeprojects.com
queries or do not consider the efficiency in the design . The basic approach
using MBcloud-tree indexes only the Price property, and therefore has limited
ability to deal with queries that do not include Price as one of the selection
criteria, or with queries that have many other selection criteria besides Price.
In either case, the basic approach may return many CSPs which satisfy only the
Price criterion but not the whole query in the proof message for verification.
Note that, the final query results are not affected since a refinement step is
included to identify the actual qualifying CSPs. In order to balance the
verification burden (i.e., reduce the number of false positives in filtering step),
we propose an advanced scheme indexing multiple properties. The advanced
scheme integrates the MBcloud-tree idea with a multi-dimensional index (i.e.,
iDistance to build a novel authenticated index, MMBcloud-tree, on all the
properties of the CSPs. Therefore, it is effective and efficient for queries that
contain requirements on any property. In what follows, we first briefly review
the iDistance index and then present the detailed algorithms of the advanced
scheme.
CONCLUSION:
In this paper, we presented an innovative Cloud Service Selection Verification
(CSSV) system to achieve cheating-free cloud service selection under a cloud
brokerage architecture. The core of our system is an efficient authenticated
index structure to ensure the authenticity, the satisfiability and the
completeness of the serviceselection results. Our theoretical and experimental
4. CONTACT: PRAVEEN KUMAR. L (,+91 – 9791938249)
MAIL ID: sunsid1989@gmail.com, praveen@nexgenproject.com
Web: www.nexgenproject.com, www.finalyear-ieeeprojects.com
results demonstrate the effectiveness and efficiency of our schemes compared
with the state-of-the-art. As part of our future work, we plan to consider a
verifiable scheme for best service selection query whereby the broker returns
only the best CSP instead of all candidate CSPs with respect to a client’s
request.
REFERENCES:
[1] I. Petri, M. Punceva, and O. F. Rana, “Broker emergence in social slouds,”
2013 6th International Conference on Cloud Computing, pp. 669–676, 2013.
[2] A. Li, X. Yang, S. Kandula, and M. Zhang, “CloudCmp: comparing public
cloud providers,” in IMC ’10: Proceedings of the 10th ACM SIGCOMM
conference on Internet measurement. New York, New York, USA: ACM Press,
2010, pp. 1–14.
[3] C. Binnig, D. Kossmann, T. Kraska, and S. Loesing, “How is the weather
tomorrow?: towards a benchmark for the cloud,” in DBTest ’09: Proceedings of
the Second International Workshop on Testing Database Systems. ACM
Request Permissions, Jun. 2009.
[4] A. Lenk, M. Menzel, J. Lipsky, S. Tai, and P. Offermann, “What are you
paying for? performance benchmarking for Infrastructure-asa- Service
offerings,” in 2011 IEEE InternationalConference on Cloud Computing (CLOUD),
2011, pp. 484–491.
[5] Z. ur Rehman, O. K. Hussain, S. Parvin, and F. K. Hussain, “A framework for
user feedback based cloud service monitoring,” in 2012 Sixth International
5. CONTACT: PRAVEEN KUMAR. L (,+91 – 9791938249)
MAIL ID: sunsid1989@gmail.com, praveen@nexgenproject.com
Web: www.nexgenproject.com, www.finalyear-ieeeprojects.com
Conference on Complex, Intelligent and Software Intensive Systems (CISIS),
2012, pp. 257–262.
[6] L. Li and Y. Wang, “Subjective trust inference in composite services.” AAAI,
2010.
[7] L. Qu, Y. Wang, and M. A. Orgun, “Cloud service selection based on the
aggregation of user feedback and quantitative performance assessment,” in
2013 IEEE International Conference on Services Computing (SCC), 2013, pp.
152–159.
[8] L. Xin and A. Datta, “On trust guided collaboration among cloud service
providers,” in 2010 6th International Conference on Collaborative Computing:
Networking, Applications and Worksharing (CollaborateCom), 2010, pp. 1–8.
[9] S. Sundareswaran, A. Squicciarini, and D. Lin, “A brokerage-based approach
for cloud serviceselection,” in 2012 IEEE5th InternationalConference on Cloud
Computing (CLOUD). IEEE, Aug. 2012, pp. 558–565.
[10] F. Li, M. Hadjieleftheriou, G. Kollios, and L. Reyzin, “Dynamic authenticated
index structures for outsourced databases,” in SIGMOD ’06: Proceedings of the
2006 ACM SIGMOD international conference on Management of data. ACM
Request Permissions, Jun. 2006.