Published in International Journal of Advanced Research in Computer Science Engineering and Information Technology
ISSN: 2321-3337 Impact Factor:1.521 Volume:6 Issue:3 Year: 20 December,2016 Pages:1192-1197
Hierarchical clustering process is proposed to aid more search semantics and likewise to fulfill the demand for speedy ciphertext search inside a large data environment. The proposed hierarchical method clusters the documents founded on the minimum relevance threshold, after which partitions the ensuing clusters into sub-clusters until the constraint on the highest measurement of cluster is reached. Within the search section, this process can reach a linear computational complexity in opposition to an exponential measurement expand of file collection. With a purpose to verify the authenticity of search results, a structure known as minimal hash sub-tree is designed on this paper. Experiments had been conducted utilising the gathering set built from the IEEE Xplore. The outcome show that with a pointy broaden of records in the dataset the quest time of the proposed method increases linearly whereas the search time of the average procedure increases exponentially. Additionally, the proposed approach has an competencies over the common approach within the rank privateness and relevance of retrieved files. Cloud-trust is used to determine the security stage of 4 multi-tenant IaaS cloud architectures prepared with substitute cloud security controls and to exhibit the probability excessive if a minimal set of safety controls are implemented. CCS penetration probability drops noticeably if a cloud safety in depth safety architecture is adopted that protects digital computer (VM) images at rest, strengthens CSP and cloud tenant approach administrator access controls, and which employs different community safety controls to slash cloud network surveillance and discovery of live VMs.
Cyber security, advanced persistent threats, security metrics, virtual machine (VM) isolation.
[1] W. Jansen and T. Grance, “Guidelines on security and privacy in public cloud computing,” NIST Spec. Publ., pp. 800–144, 2011. [2] P. Jamshidi, A. Ahmad, and C. Pahl, “Cloud Migration Research: A Systematic Review,” IEEE Transactions on Cloud Computing, vol.1, no. 2, pp. 142–157, 2013. [3] FedRAMP Security Controls, Federal Chief Information Officer’s Council, [Online]. Available: security-controls. [Accessed: 29-Oct-2014]. [4] S. Zevin, Standards for security categorization of federal information and information systems. DIANE Publishing, 2009. [5] M. Walla, “Kerberos Explained,” May, 2000. [Online]. us/library/bb742516.aspx.[Accessed: 12-Jan-2014]. [6] Microsoft, “Federation trusts,” Aug 22, 2005. [7] M. I. Gofman, et. al., “SPARC: A Security and Privacy Aware Virtual Machine Checkpointing Mechanism in the electronic society, 2011, pp. 115–124. [8] E. Ray and E. Schultz, “Virtualization security,” in Allows Escape To Hypervisor Attacks InformationWeek,” Jun. 13,2012.[Online].Available:http://www.informationweek.com/security/riskmanagement/new-virtualization-vulnerability-allows-escape-to- hypervisor-attacks/d/d-id/1104823 [Accessed: 13-Jan-2014]. [9] J. Rutkowska, and A. Tereshkin, “Bluepilling the Xen Hypervisor,” presented At the 2008 Blackhat Conference, Las Vegas, NV,Aug. 2008. [10] O. Sheyner et. al., “Automated Generation And Analysis Of Attack Graphs,” Secur. Priv. 2002 Proc. 2002 IEEE Symp. On, pp. 273, 284. [11] A. Singhal and X. Ou, Security Risk Analysis Of Enterprise Networks Science and Technology Interagency Report 7788, Gaithersburg, MD, August 2011. [12] C. Glyer and R. Kazanciyan, “The ‘Hikit’using dynam- ic bayesian network,” in Proceedings of the 4th ACM workshop on Quality of protection, 2008, pp. 23–30. [Online]. Available: [13] V. J. Winkler, Securing the Cloud:Cloud computer Security techniques and tactics. Elsevier, 2011. [14] Network Infrastructure Technology Overview, Version 8, Release 3, Defense Information Systems Agency, August 27, 2010. [15] G. Keeling, R. Bhattacharjee, and Y Patil, “Beyond the Hypervisor: Three Key Areas to Consider When Securing Your Cloud Infrastructure Platform,” presented at The VM World 2012, San Francisco, August, 2012 [Online]. Available: [Accessed: 29-Oct2014] [16] A. Regenscheid, “BIOS Protection Guidelines for Servers (Draft),” 800-147B, Jul. 2012 [Online]. Available: http://csrc.nist.gov/publications/drafts/800- 147b/draft-sp800- 147b_july2012.pdf [Accessed: 29-Oct- [17] Trusted Computing Group, “Trusted Platform Module (TPM) Summary.” [Online]. Available: http://www.trustedcomputinggroup.org/reso urces/trusted_platfo rm_module_tpm_summary. [Accessed: 12- [18] S. Chalal, et. al., “Evolution of Integrity Checking with Intel® Trusted Execution Technology: an Intel IT Perspective.” Intel, Aug. 2010[Online].Available: http://www.intel.com/content/dam/doc/white -paper/intel- itsecurity-trusted- execution technology-paper.pdf.[Accessed:29- Oct-14].