Saturday, January 25, 2020

Pinpoint Colluding Attackers for Software-as-a-Service Cloud

Pinpoint Colluding Attackers for Software-as-a-Service Cloud Abstract- Software as a Service (SaaS) is a distribution model of software in which service provider or vendor develops applications and these are accessible by the customers over a network. SaaS clouds are vulnerable to malicious attacks because of their sharing nature. IntTest, service integrity attestation framework has been anticipated and it uses a novel integrated attestation graph analysis scheme to pinpoint attackers. But IntTest has still a limitation that attackers can still escape the detection if they have less inconsistency links than benign service providers. In this paper, we present Function Combination Generator along with the IntTest in order to detect the attackers more in number. Also, Result Auto Correction is provided to correct the incorrect results provided by the attackers. Our experimental results shows that our scheme is effective and can achieve higher accuracy in pinpointing the attackers more in number than the existing approaches. Index Terms- Cloud Computing, Integrity Attestation, Multitenant, SaaS, Function Combination Generator 1 INTRODUCTION Cloud computing depends on resource sharing over a network. Cloud computing mainly relies on improving the efficiency of shared resources. Cloud provides services like Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). This paper mainly deals with Software-as-a-service. Software as a Service depicts any cloud service where providers deploy their applications and consumers use those applications through a client interface such as web browser. Software as a Service and Service Oriented Architecture (SOA) [4] provides certain concepts for the evolution of Software as a Service clouds [1] (e.g., Amazon Web Service (AWS) [2] and Google App Engine [3]). SaaS clouds provide a way for application service providers (ASPs)[5], [6] to transport their applications through the huge cloud computing infrastructure [7]. Figure 1 shows the origin of Software as a Service deployed on either public, private or hybrid cloud and its relation with the end u ser. As ASPs from different security domains shares Cloud Computing infrastructures, they are vulnerable to attacks. As Cloud Computing attracts many providers due to its cost-effective concept, it has become very popular at recent. This paper concentrates on service integrity attacks on SaaS clouds. The user gets the bad results due to these integrity attacks when requested for a service. Figure 2 shows the integrity attacks in SaaS clouds. Multitenant architecture is one that is responsible for most of the SaaS cloud solutions. In the previous research, only privacy protection and confidentiality problems have been widely stated, but the service integrity attestation was not clearly addressed. Service integrity is one of the main problems that need to be solved despite whether the public or private clouds process the data. Various researchers have presented certain service integrity attestation schemes but the problem is that they require secure kernel or trusted hardware support. Because of these problems, Multitenant cloud computing does not carry those schemes. Later, Juan Du has proposed IntT est, an efficient framework for large scale cloud systems. A novel integrated attestation graph analysis scheme has been provided by the IntTest that detects the attackers more when compared to the existing schemes. But the problem here is that the attackers can still escape the detection if they have less inconsistency links than benign service providers. i.e., If only one order of service functions is given by the providers for a service, the attacker acts as genuine and colludes with other attackers and provides fake results. With this, all the inconsistent results caused by the attackers are not detected completely and the fake results are assumed as good one and provided to the users. With this, we can say that that IntTest cannot detect the colluding attackers. In this Paper, Function Combination Generator is provided for the IntTest to overcome the limitation. Function Combination Generator along with IntTest can attain more attacker identifying accuracy than existing schemes like Run Test and AdapTest. In particular, AdapTest and RunTest with the other conventional voting schemes wants to believe that benevolent service providers take bulk in every service function. Figure 1: Software-as-a Service To make the targeted service functions as malicious, several attackers may launch on colluding attacks in large scale multitenant cloud systems. In order to overcome this problem, IntTest with FCG adopts a systematic method by exploring the both consistency and inconsistency relationships between various service providers in the whole cloud system. The per-function consistency graphs and global inconsistency graphs have been validated by the IntTest. The attackers can be detected more effectively, it does not allow the attackers to escape as well as reduces the scope of damage caused by the attackers by using Function Combination Generator with IntTest. With the scalable IntTest along with Function Combination Generator, the burden provided with attestation can be reduced to an extent than any other schemes. This paper provides the below implementations: IntTest, an efficient and scalable service integrity attestation framework for broad cloud computing infrastructures. Function Combination Generator that generates different set of orders for a particular set of functions for the given service. Baseline and Integrated attestation schemes that attains more attackers pinpointing than the existing schemes. Result auto correction method that eventually replaces the fake results provided by the colluding attackers with the correct results. The rest of this paper is organized as follows. Section 2 presents the related work. Section 3 presents the proposed Work in detail. Section 4 presents the design. Finally, the paper concludes in section 5. Figure 2: Integrity attacks in cloud based data processing Where, Sn= different service components n= {1, 2, 3, 4, 5, 6, 7} VM= Virtual Machines 2 RELATED WORK SaaS clouds are given with various integrity attestation schemes in recent years. The BIND scheme, TEAS, RunTest and AdapTest are some of the schemes but these in turn have some issues that are to be dealt with. Some of them want trusted hardware and support of secure kernel. BIND [10] (Binding Information and Data) is one that requires secure kernel or a third party support. To verify the service integrity for SaaS clouds, BIND exhibits the fine grained attestation framework. This BIND scheme follows these steps. 1) Attestation annotation mechanism. 2) Sandbox mechanism. 3) Verification of authenticator through hash. In order to address the service integrity attestation, Diffee-Hellman key has been used by the BIND scheme. TEAS [11] (Timed Executable Agent System) is another provided scheme that address the integrity for SaaS clouds. It uses Agent generation and verification algorithm. But the problem is that it is not scalable and does require trusted hardware. RunTest [8] has been proposed later with further corrections. RunTest, a scalable runtime integrity attestation framework attains the data flow processing integrity in cloud. It promotes light-weight application level attestation mechanism. With this, it identifies the attackers when inconsistent results are detected and also integrity of data processing results is examined. This RunTest gives the information on who are benign service providers and also the attackers’ stealthy behaviour. The disadvantage that RunTest has is its low performance. The AdapTest [9] is another existing scheme that presents a novel adaptive data driven runtime service integrity attestation framework to verify the service integrity in SaaS clouds. It reduces the detection delay and also the attestation overhead. It treats all the service components as black boxes so any special hardware support is not needed by the AdapTest. The disadvantage is that detection rate is low. So later, to overcome all th e limitations of the existing schemes, IntTest has been proposed. Any secure kernel or hardware support is not needed by IntTest as it also treats the components as black boxes. IntTest provides more detecting accuracy than above all the existing schemes. But still the IntTest has a limitation that attackers try to escape the detection by colluding with the other attackers. So, we proposed Function Combination Generator technique to be used with IntTest to overcome the limitation. With this Function Combination Generator with IntTest, there is no chance for the attackers to escape. 3 PROPOSED WORK Software as a Service clouds are evolved from the basic concepts of Software as a Service and Service Oriented Architecture. It provides a way for the application service providers to build their applications and transport them through cloud computing infrastructure. Here, we are proposing a new technique called Function Combination Generator for IntTest. To pinpoint all the colluding attackers is the main goal of IntTest with Function Combination Generator. And it should not make attackers to escape from detection. Various service providers are negotiated by a single attacker in multitenant cloud systems. Here, certain assumptions are made by the IntTest. First, in the entire cloud system the total number of benign service providers is greater than the malicious service providers. Without this assumption, the IntTest scheme does not work properly. Second, the data processing services are input deterministic. Whatever input is given by the benign service component, it should produce the similar output. Third, the hardware and software faults that grounds the result inconsistency are marked by fault detection schemes [12] and can be removed them as malicious attacks. Figure 3 depicts the overall architecture of our proposed work. The architecture flows like this. At first the user requests the cloud for a particular service, and that requested service is deployed in the cloud and promotes that request to SaaS. SaaS cloud process the request and generates the result to the cloud. Next, Function Combination Generator regulates different set of orders for service functions and then IntTest checks the consistency and inconsistency relationships and then identify the malicious attackers. Result autocorrection corrects the bad results produced by the attackers and stores the corrected data and finally corresponding good results are sent to the user. Figure 3: Architecture 4 DESIGN In this section we present the design of the proposed system. First, we present the Function Combination Generator. We then describe baseline and integrated attestation schemes and next, we present the result autocorrection scheme. 4.1 Function Combination Generator Service is one that consists of several components that in turn consists of different number of functions. Service may contain any number of functions like f1, f2, f3, f4 etc. When the SaaS cloud generates the service as per requested by the user, then the Function Combination Generator generates different set of patterns for the functions such as f1, f3, f2, f4 and f2, f3, f4, f1 and soon. By generating like this, there we can see that the attackers can’t escape from detection. Function Combination Generator is an efficient technique provided with the IntTest to detect the colluding attackers in large number. 4.2 Baseline Attestation Scheme IntTest is mainly used to detect the service integrity attack in SaaS clouds and also pinpoint malicious service providers. In Cloud Computing, several providers develop the same function as they are popular. Function Combination Generator after generating patterns sends the results to the IntTest. IntTest then obtains the consistency and inconsistency relationships among the different service providers for a particular set of service function generated. Figure 4 depicts the consistency check mechanism. As shown in the figure 4, the service providers are p1, p2 and p3. The same function f is developed by all the providers. Portal node is one that has global information like number of ASPs etc., It acts as a gateway to use the services. Provider p1 first receives the original data input p1 from the portal node and generates the result f(d1). Again provider p3 receives the duplicate of d1 and generates the result f(d1’). Next the relationship between the providers is derived. If both the providers generate the same result, they are said to be consistent with each other. If not they are inconsistent with each other, then we can say that one of them is malicious. Like this, we derive the relationships among various service providers. Figure 4: Consistency Check 4.3 Integrated Attestation Scheme Now, an integrated attestation graph analysis algorithm is given here. Step 1: Consistency analysis: Based on the consistency relationships derived by the Baseline attestation scheme, we derive per-function consistency graph as shown in figure 4(a).. With this, the distrustful service providers can be identified. The consistency graph presents certain consistency links among a set of service providers. Those service providers give same results for every specific service function. Like if service providers p1, p2 give consistent results for a function f1, they give the same consistent results for all functions like f2, f3, f4 and so on. The benign service providers who give consistent results for a particular function will form a clique in terms of consistency links. With this per-function consistency graph, we cannot clearly identify who the attacker is. So, we must also consider inconsistency graph too. Figure 4: Attestation Graphs Step 2: Inconsistency analysis: The global inconsistency graph as shown in figure 4(b) is derived from the inconsistency relationships drawn by Baseline attestation scheme. This graph contains only inconsistency links, there may involve various possible combinations of benign node set and malicious node set. Here, we have to believe that total number of malicious service providers is not greater than max number of malicious service. Function Combination Generator generated different set of patterns for a particular service. By generating like this, there is no chance for the attackers to escape as they give inconsistent results with all the patterns when consistency check is done. If any provider gives only incorrect results with all the patterns, we confirm that provider as a corrupted one. Like this, we will find the attackers more in number. 4.4 Result Auto Correction To regularly correct the bad results provided by the attackers, Result Autocorrection is provided. IntTest with Function Combination Generator can not only pinpoint malicious service providers and even autocorrects the bad results with good results and thus improving the result quality of the cloud data processing service. With the absence of attestation scheme, any malicious attacker can change original input data and with this the processing result of that input will be corrupted which will result in degraded result quality. IntTest presents attestation data and correct compromised data processing results. Function Combination Generator given with IntTest, it can achieve higher detection accuracy than any other techniques when malicious service providers attack more nodes. This method will identify the attackers even though they attack a very low percentage of services. This technique can achieve higher detection rate than any other existing scheme and will have low false alarm rate than others. Comparison Study Below is the table that compares various parameters like detection rate, time and attestation overhead among various approaches like AdapTest, RunTest, and IntTest with no Function Combination Generator and IntTest with Function Combination Generator. 5 CONCLUSION In this paper we introduced a technique called Function Combination Generator for IntTest, a novel integrated service integrity attestation graph analysis scheme for multitenant software-as-a-service cloud system. Function Combination Generator generates diffsaerent set of patterns for service functions and then IntTest uses a reply based consistency check to verify the service providers. IntTest with Function Combination Generator analyses both the consistency and inconsistency graphs to find the malicious attackers efficiently than any other existing techniques. And also it provides a result auto correction to improve result quality.

Friday, January 17, 2020

Interaction Between Cognition and Physiology Essay

Discuss the interaction between cognition and physiology in terms of behavior †¢Introduction: cognition, physiology, relation †¢Amnesia: retrograde, anterograde †¢Memory: multi-store, division, *amnesic patients, ways of distinguishing types of memory (KC, spiers maguire and burgess, vargha and khadem) †¢HM †¢Clive Wearing †¢Conclusion: cognition, physiology Cognition, as defined by Neisser, is all the processes by which the brain transforms, reduces, elaborates, stores, retrieves, and uses information. Physiology refers to the structures of the human body and brain. The relationship between cognition and physiology is bi-directional, meaning that cognition can effect physiology and vice versa. Every cognitive aspect can be localized to a specific structure in the brain. This close interaction can have an effect on behavior. This essay will study ‘memory’ as the cognition, and ‘amnesia’ as the behavior. Amnesia, simply put, is a loss of memory. There are two types of amnesia: retrograde, where information acquired before the onset of amnesia is forgotten, but new memories can be made, and anterograde, where information acquired after the onset of amnesia is forgotten, making the patient unable to form new memories. Memory is defined by ‘Baddeley’ as an active system which receives information from the senses, organizes and alters it, and stores it away, and then retrieves the information from storage. A model called the ‘multi-store model’ by Atkinson and Shiffrin states that there are 2 stores of memory: short term (STM), and long term (LTM). Information is received by the sensory unit, and then sent to the STM. after this information is rehearsed, it is sent to the LTM. The researchers describe these 2 stores as ‘unitary stores’, which differ in terms of capacity, duration, and encoding. The fact that the stores are ‘unitary’ was refuted by later studies. Later studies of memory prove that the LTM can be divided into 2: explicit, and implicit. Explicit refers to the memories that one can declare, and implicit refers to the memories that are more underlying, like the memories of how to ride a bike. These two stores and further divided. Explicit memory contains episodic (events) and semantic (facts). implicit contains procedural (skills) and emotional (emotions). For amnesic patients, the problem lies mostly with explicit memory. There are three main ways to study the differences between the types of memories. The first is the study of anterograde amnesic patients. For example, the study done by Spiers, Maguire and Burgess. They studied 147 cases of anterograde amnesia with damage to the hippocampus. psychological testing proved that all cases had impaired episodic memory and limitedly impaired semantic. This shows that the hippocampus is responsible for episodic memory. To make the conclusion more reliable, another study was done by Vargha and Khadem, with 3 anterograde amnesic patients, and found the same results, except that the semantic memory was completely intact. They found that semantic memory was localized to the cortices underlying the hippocampus. Another way of studying the differences between the two is by studying retrograde amnesic patients. a retrograde amnesic patient known as KC was studied to find that the damage to his hippocampus impaired his episodic memory, but his semantic memory was still intact. The study of amnesic patients is done in psychology to study the relations between the physiology and cognition, because the damage to the brain can be seen easily, and it’s effects on cognition can also be studied. The third way of distinguishing would be the use of neuro-imaging. Studies using neuro-imaging have concluded that emotional memory relates to the amygdala in the brain, and procedural locates at the striatum and cerebellum. Moving on to a specific study, one was done on a man known as HM. At the age of 9, HM started having uncontrollable epileptic seizures that couldn’t be  controlled by medication at the time. At the age of 27, the doctors removed his medial temporal lobe, to control his seizures. The surgery was successful, but after the surgery, HM suffered anterograde and partial retrograde amnesia. He had a loss of episodic memory, and a limited impairment with semantic and emotional. The medial temporal lobe contained the hippocampus, and some of the cortices underlying it, as well as part of the amygdala. The doctor, John Harlow concluded that the specific types of memory located to the specific structures in the brain that were removed. This method of research, the case study, was ethical because they kept his identity from the media and referred to him as HM. One of the worst recorded cases of amnesia was that of Clive Wearing. He was a pianist and a conductor, and he developed ‘herpes encephalitis’, a brain infection that affected his temporal lobe. He was left with both retrograde and anterograde amnesia. His episodic memory was impaired as well as part of him emotional memory. His procedural memory stayed intact, he could still remember how to play the piano. His name was released into the media only because his wife allowed the researchers to do so, which abides by the ethical consideration of taking consent from one’s caretaker in case of not being able to take consent from the participant himself. The studies showed both the causes and effects of the behavior: amnesia. Since the studies were case studies, they were unique in nature, which gave the researchers a way of understanding the distinction between the types of memories. A disadvantage is that case studies cannot be replicated. The studies, being completely of reality, had high ecological validity. To conclude, in terms of amnesia, it is evident that damage to a specific brain structure can have an effect of the cognitive aspects, which overall has an effect on behavior.

Thursday, January 9, 2020

The People s Republic Of China - 1761 Words

The People’s Republic of China = The Republic â€Å"Communism is not love. Communism is a hammer in which we use to crush the enemy.† –Mao Zedong. This quote is saying that communism is a way to conquer your enemies. The People’s Republic of China shares many similarities with the Republic in the book Legend. They are both communist, militarily run nations, where the citizen’s rights are oppressed, and they are both totalitarian states. They both have authoritarian leadership, and they deny many of their people basic human rights. They both suppress their citizen’s freedom of expression, and imprison those who fight for it. These governments have very small middle classes, medium sized rich classes, and very large poor working classes. They†¦show more content†¦Both governments treat their people dreadfully, although they claim their people are treated fine. The People’s Republic of China is a member of the United Nations Huma n Rights Council, and they say that people should be treated fairly. However, they commit some the most heinous human rights violations on the planet. They have prisons built specifically to torture the inmates, although the government denies having them. During Mao Zedong’s rule, millions of people were declared psychologically ill, and were barred from work if they did not support his administration. This process still continues, only at a much smaller scale. The People’s Republic of China has committed many minimum wage violations, such as refusing to pay their worker’s their nation’s set minimum wage, along with forcing extensive work hours on their workers, and allowing inappropriate actions towards workers by employers/managers. The Chinese government has facilities where they re-educate the people who commit crimes. The re-education is usually 3 years long, and is for minor crimes. The re-education is carried out through labor. The labor centers ar e separate from their much larger labor camps, where the criminals who commit more serious crimes go. The People’s Republic of China limits the access their people have to the Internet.

Wednesday, January 1, 2020

Essay On Harriet Tubman - 1602 Words

Harriet Tubman â€Å"I had reasoned this out in my mind, there was one of two things I had a right to, liberty or death; if I could not have one, I would have the other.† -Tubman The world was blessed with Harriet Tubman in 1822 on the eastern shore of Maryland. Unfortunately, Tubman was born into this world as a slave and lived on a plantation with her family, which consisted of four brothers and four sisters. Her parents named her Araminta â€Å"Minty† Ross but soon, with the coming of age, she changed her name from Araminta to Harriet taking after her mother, Harriett Greene. At the age of 12 Harriet Ross was seriously injured by a blow to the head, inflicted by a white overseer, or a person who supervises others, for refusing to assist in tying†¦show more content†¦He was a freeborn black Pennsylvanian who could read and write. He used these talents to interview runaway slaves and record their names and stories in a book. He hoped that in the future, families could trace their relations using this book. William Still published the book in 1872 under the title The Underground Railroad which describes many of Tubman s efforts. With Still by her side, along with other members of the Philadelphia anti-slavery society, Tubman soon learned all about the Underground Railroad. The curiosity exposed the hero within Harriet. In 1850, Harriet helped her first slaves escape to the North. She sent a message to her sister s oldest son that said for her sister and family to board a fishing boat in Cambridge, from there Harriet guided them from safehouse to safehouse in Pennsylvania, which was also a free state, until they reached Philadelphia. For Tubman, family came first. In September of the same year, Harriet was made an official conductor of the Underground Railroad. This meant that she knew all the routes to free territory and she had to take an oath of silence so the secret of the Underground Railroad would be kept secret. Not like she’d actually say something about it anyway. She also made a second trip to the South to rescue her brother James and other friends. They were already in the process of running away so Harriet aided them across a river and to the homeShow MoreRelatedHarriet Tubman Essay2304 Words   |  10 PagesHarriet Tubman By Blake Snider December 5, 2010 Professor J Arrieta Seminar Critical Inquiry Harriet Tubman is a woman of faith and dignity who saved many African American men and women through courage and love for God. One would ponder what would drive someone to bring upon pain and suffering to one’s self just to help others. Harriet Tubman was an African American women that took upon many roles during her time just as abolitionist, humanitarian, and a UnionRead More Harriet Tubman Essay1183 Words   |  5 Pages Early Years Her real name was Harriet Beecher Stowe. Born as a salve on June 14, 1820 on a plantation in Maryland. There were 8 children in her family and she was the sixth. When she was five, her Mother died. Her Father remarried one year later and in time had three more children. Her Father always wanted her to be a boy. When Harriet was only 13 years old, she tried to stop a person from being whipped and went between the two people. The white man hit her in the head with a shovel and she blackedRead MoreHarriet Tubman Essay586 Words   |  3 PagesHarriet Tubman Harriet Tubman was a very interesting women. Harriet Tubman, was born as Araminta Ross in 1819 or 1820 in Dorchester County, Maryland. Araminta Tubman had changed her name to Harriet after her mother, and Ross of course was after her father. Harriet was born into slavery. There were eight children in her family and she was the sixth. Her mother died when she was only five years old. The first person that ownedRead More Harriet Tubman Essay552 Words   |  3 Pages Harriet Tubman was an important African American who ran away from slavery and guided runaway slaves to the north for years. During the Civil War she served as a scout, spy, and nurse for the United States Army. After that, she worked for the rights of blacks and women. nbsp;nbsp;nbsp;nbsp;nbsp;Harriet Tubman was really named Araminta Ross, but she later adopted her mother’s first name. She was one of eleven children of Harriet Greene and Benjamin Ross. She was five when she worked on a plantationRead More Harriet Tubman Essay1480 Words   |  6 PagesHarriet Tubman In the 1840 ¹s and 1850 ¹s American abolitionist ¹s were a small minority in every part of the country. Harriet Tubman was one of the women who joined the attack on slavery. She stood out from most of the other abolitionists. The evidence that I will present to you shows how she wasn ¹t satisfied merely to be free or even to give speeches against slavery. Harriet Tubman was important to the abolition movement because she put her ideas to action. Harriet was born a slave in BucktownRead MoreEssay on Harriet Tubman1187 Words   |  5 PagesHarriet Tubman Harriet Tubman was a poor slave girl who ran away from her plantation at the age of 28. Throughout the course of her life many people and many things challenged her. Each situation she was faced with tested either her mental or physical strength, usually both. She persevered through all of her trials stronger and wiser, and was willing to always help others through their own. Not one to instigate unless extremely necessary, Harriet was known for her quick thinking and herRead More Harriet Tubman Essay1405 Words   |  6 Pages Harriet Tubman Even before Harriet Tubman was born she had a powerful enemy. Her enemy wasn’t a person or even a country; it was the system known as slavery. It is known that at least two grandparents were captured by slave traders and brought to North America from the Slave Coast of Africa during the 18th century. Because slaves were not allowed to read and write, Tubman grew up illiterate. She left no letters or diaries that would later allow historians to piece together all the parts of herRead MoreEssay On Harriet Tubman1771 Words   |  8 PagesHarriet Tubman is well known for a successful role in freeing many slaves through the Underground Railroad. Not many know the major effect she had on the Union Army as a Scout and a spy during the Civil War. Her bravery while helping slaves escape through the Underground Railroad and her assistance in gathering Confederate troops intelligence as a spy changed the history and made a great impact on the on the United States National Defense. Even though Harriet Tubman was a very skillful spy, she hadRead MoreHarriet Tubman Essay Outline911 Words   |  4 PagesEdge, 2 Harriet Tubman The Underground Railroad was a secret system of individuals who assisted fugitive slaves in their quest for freedom prior to the Civil War. The term, used between 1830-1860, refers to the swift, â€Å"invisible† way in which the slaves escaped. Usually they hid during the day and moved at night. Coffin says: â€Å"fugitive slaves relied heavily on fellow slaves and free blacks, who rarely betray them.† (Coffin, 2006). The most famous black leader in the movement was Harriet TubmanRead MorePersuasive Essay On Harriet Tubman1193 Words   |  5 Pagesrest, however. Harriet Tubman risked her life many times to free her people from unjust enslavement, Mother Jones organized more obvious methods to set laws in place against child labor, and nowadays Christine Caine and the A21 Organization fight to save and protect victims of human trafficking. These three people have all fought valiantly, and continue to fight today, for the justice that every oppressed individual deserv es, as they believe in equality for all on Earth. Harriet Tubman, a slave on