Self Reconfigurable Distributed Load Balancing For Secure and

advertisement
Self Reconfigurable Distributed Load
Balancing For Secure and PrivacyPreserving Information Brokering.
Jyoti More.
ME student
Dept of Computer Engg G.H.Raisoni College of Engineering,Savitribai Phule
University of Pune, Pune, Maharashtra Email: jyotimore2283@gmail.com
Urmila Biradar
Asst Professor
Dept of Computer Engg G.H.Raisoni College of Engineering, Savitribai Phule
University of Pune, Pune, Maharashtra Email: urmilakb@gmail.com
Abstract—This paper describes concept of Self Reconfigurable Distributed Load Balancing
as well as secure and privacy preserving information brokering. To implement concept of Self
Reconfigurable Distributed Load Balancing, Packet redirection by the server Algorithm is used.
To preserve sensitive information Privacy Preserving is used. Information sharing through
on-demand access has been increased in organizations (e.g. libraries, enterprise). Information
Brokering System (IBS) is distributed system providing data access through set of brokers.
The set of brokers are used to make decisions to locate data sources for client queries. A solution
to preserve privacy in Information Brokering process of multiple stakeholder is Privacy
Preserving Information Brokering(PPIB).To integrates security with query routing have been
achieved by automaton segmentation and query segment encryption. The attacker could infer the
privacy by two attacks named as correlation attack and inference attack. Load balancing has
important impact on performance. In distributed system, load balancing is applied among nodes
for redistributing the workload. Load balancing improves resource utilization and response time.
Index TermsPrivacy,
PPIB,
Balancing, distributed system.
Automaton
segmentation, query segment encryption, Load
I. INTRODUCTION
Information sharing is becoming increasingly important in recent years, but also within many field
ranging from business to other agencies that are becoming more globalized and distributed. To
provide efficient large-scale information sharing, to reconcile data heterogeneity and provide
interoperability across geographically distributed data sources. The systems work on two extremes of
the spectrum: (1) in the query-answering model, peers are fully autonomous but there is no systemwide communication; so that user creates one-to-one client-server connections for information sharing;
(2) in the distributed database systems, all the user lost autonomy and are managed by a unified
DBMS. In distributed system providing data access through a set of brokers is referred to as
Information Brokering System (IBS).This system provide server autonomy and scalability In IBS
infrastructure given broker as well as coordinator structure.
Fig. 1. overview of the IBS infrastructure
There is increasing need for information sharing in recent years, in different organization. In the
Information brokering system, there are mainly three types of stakeholder data owner, data provider
and data requester. The information is may be different from one another. The main problem has
been created by attacker. Attacker could infer privacy of data owner, data provider and data
requester. Also introduce problem of system performance. There are mainly two types of attacks:
Inference attack and Attribute-correlation attack.
• Attribute-correlation attack
This attack is depending on predicates. Attacker prevents query, which contain predicates. To infer
sensitive information, the attacker correlate attributes. This attack is called as the attribute correlation
attack.
• Inference attack
This attack is totally based on the guessing the query. if the guess is matches, the query will be
inferred. This attack is occurred by finding the location of the data server or the data owner by using
the IP address.
• Need for improving Performance Solution:
PPIB has been provided for overcome these attacks. In this way, privacy is preserved. And also Dynamic
load balancing algorithm is implemented for improving performance of system.
PPIB has been provided for overcome these attacks. In this way, privacy is preserved. And also Dynamic
load balancing algorithm is implemented for improving performance of system.
II. LITERATURE SURVEY
Bo Luo et al.[1] study the privacy protection in information brokering process. they first focus on two
attacks: inference attack as well as attribute-correlation attack . Then, they propose a brokercoordinator s t r u c t u r e , as well as two schemes,query segment encryption scheme and automaton
segmentation scheme, to share among a set of brokering servers the secure query routing function.
With analysis on privacy and scalability, end-to- end performance, they show that the proposed system
can integrate query routing while preserving system-wide privacy and security enforcement.they achieve
load balancing. A more detailed quantitative comparison of the various architectures would be
necessary to have major insights on the tradeoffs of the different mechanisms discussed in this paper.
Ms. Pradnya Kamble[8] provides study in Distributed Information Sharing through an automaton
segmentation scheme and query segment encryption and data management issues for processing
XML data in a p2p setting, namely indexing, replication and query routing and processing.
Privacy issues of data and user during the design stage is considered and concluded that existing
information brokering systems suffer from a vulnerabilities associated with data privacy, and metadata
privacy as well as user privacy,. In this paper, PPIB proposed architecture is discussed, a new approach
to preserve privacy in XML information brokering.
A. Banu Prabha[3], a new approach propose PPIB ,to preserve privacy in XML information brokering,. To
preserve privacy of stakeholders involved in information brokering process. The system defines two
privacy attacks, namely inference attack and attribute-correlation attack. The Privacy-Preserving
Information Brokering in Distributed Information Sharing is achieved by an automaton segmentation
scheme and query segment encryption scheme .
Valeria Cardellini [9] proposed a classification of existing solutions based on the entity that dispatches
the client requests among the distributed Web-servers: client-based, dispatcher-based and DNS-based,
server-based. The different techniques are evaluated primarily with respect to compatibility to Web
standards, geographical scalability.
III. IMPLEMENTATION
A. Existing System
1) Privacy Preserving Information Brokering (PPIB):
Architecture of PPIB:
Fig. 2. Architecture of PPIB
PPIB has mainly three types of brokering components: (a) Brokers (b) Coordinators and (c) Central
authority (CA).
• Broker:
Brokers are attached through coordinators. The main function of brokers is for user authentication and
query forwarding.
• Coordinator:
Coordinator is responsible for access control and content based query routing.
• Central Authority:
Central Authority is responsible for metadata maintenance and key management.
B. Problem of existing System
In this system has some existing problem as like site distribution and load balancing. PPIB can suffer
from certain load imbalances due to data storing and query routing, load imbalance caused by these
factors can be efficiently tackled without substantial performance degradation. However, no load
balancing is considered and no explicit results showing query processing costs are reported. [9].
Another problem is drawing an automatic scheme which performs dynamic site distribution. There
is a need of consider several other factors such as the workload and trust level of each peer, and
privacy disagreement between automaton segments. A scheme that can strike a balance among
these factors is a point of consideration.
C. Proposed Method
1) Load balancing: Load balancing is the process of redistributing the work load among nodes of
the distributed system for improve both job response time and resource utilization.And also avoiding a
situation where some nodes are heavily loaded while others are idle or doing little work.
Algorithm: The automaton segmentation
Deploy Segment ()
Input: Automaton State St Output: Segment Address: addr
1: for each symbol k in St:StateT ransT able do
2:
addr=deploySegment(St:StateT ransT able(k):nextState)
3:
DS=createDummyAcceptState()
4:
DS:nextState addr
5:
St:StateT ransT able(k):nextState DS
6: end for
7: Seg = createSegment()
8: Seg:addSegment(S)
9: Coordinator = getCoordinator()
10: Coordinator:assignSegment(Seg)
11: return Coordinator:address
Server-based approach
Packet redirection by the server
Distributed Packet Rewriting (DPR) uses a round robin DNS mechanism to carry out the first
scheduling of the requests among the Web-servers. The server reached by a client request is able
to reroute the connection to another server through a packet rewriting mechanism that, unlike
HTTP redirection, is quite transparent to the client. Figure shows the initial request distribution
achieved through the DNS (step 1, 1’, 2, 3, 3’) and the case Where the server 1 decides to redirect the
received request (step 5, 6) to the server 2 without affecting the client. Two load balancing algorithms
are proposed to spread clients requests. The first policy uses a static (stateless) routing function,
where the destination server of each packet is determined by a hash function applied to both the
sender’s IP address and the port number. However, this simple policy is not practicable because IP
packet fragmentation does not provide the port information in each fragment. The second stateful
algorithm relies on periodic communications among servers about their current load. It tends to
redirect the requests to the least loaded server. DPR can be applied to both LAN and WAN distributed
Web-server systems. However, the packet rewriting and redirecting mechanism causes a delay that can
be high in WAN distributed Web-server systems.
D. MATHEMATICAL MODEL
MATHEMATICAL MODEL FOR AUTOMATION SEGMENTATION:
DS =Dummy accept state
Addr =segment address
For each K,
Create new dummy accept state DS,
Addr1 =DS1
Addr2 =DS2
…………..
Addrk = DSk
[S.StateTransTable] i=1 to k =Addr i
For each Addr,
Create segment S,
S=Si
Si(coordinator)= S(coordinator)
Addr= Si(coordinator).Addr
MATHEMATICAL MODEL FOR LOAD BALANCING:
Let A (i) be the set of jobs assigned to machine Mi; hence the machine Mi needs total computing time
Which is known as (Li) load on machine Mi. to minimize makespan is objective of load balancing ; maximum
loads on any machine is defined as (T = maxi Ti). This is known as linear programming problem, with objective to
Minimize L (load of the corresponding assignment)
Minimize L
Where Mj⊆ M; set of machines to which the job j can be assigned.
The finding an assignment of minimum makespan is NP-hard. The solutions can be obtained using a dynamic
programming algorithm
Where L is the minimum makespan.
RESULT
We test the system using the application of hospital.The application also containing dataset of Health
Dieseas and related information. Following graphs show result of security and Self reconfigurable Load
Balancing. Following figure shows that when both servers are busy then user request is wait in waiting
queue.
Figure : user request wait in waiting queue.
Following figure shows the Name of user request which are request to server1.
Figure : Name of user request which are request to server1.
Following figure shows the Responce of user request.
Figure : Responce of user request
IV. CONCLUSION
This system proposes a new approach for Self reconfigurable load Balancing concept. self
reconfigurable load balancing algorithm is implemented for improving performance of system. Load
Balancing means redistribute workload among the nodes of distribute system to improve resource
utilization and response time. For implementing concept of self reconfigurable load balancing, Packet
redirection by the server. This system gives different ways for privacy and security issues. We studied
how the privacy and security is maintained. Attacker could infer privacy of data owner, data provider
and data requester. Also introduce problem of system performance. There are two types of attacks:
inference attack and Attribute-correlation attack are studied. In this paper, we studied PPIB architecture,
two novel scheme, and phases of PPIB.
V. REFERENCES
[1] Bo Luo, Chao-Hsien Chu, Peng Liu Dongwon Lee, Fengjun Li, Enforc- ing Secure and PrivacyPreserving Information Brokering in Distributed Information Sharing,in IEEE TRANSCATIONS ON
INFORMATION FORENSICS AND SECURITY, 2013.
[2] F. Li, P. Liu, D. Lee, B. Luo, W. Lee, and P. Mitra, C. Chu, In-broker access control: Towards
efficient end-to-end performance of information brokerage systems, in Proc. IEEE SUTC, 2006.
[3] A Banu Prabha Security Enforcement with query routing Information Brokering in Distributed
Information Sharing IOSR-JCE,Issue 2, Vol 16,Ver.XI Mar-Apr 2014
[4] Noe Elisa, K. Suresh Babu SURVEY ON PROTECTING PRIVACY ANDSECURITY IN XML
INFORMATION BROKERING IJCSMC, Vol.3, Issue.4 April 2014.
[5]
Ajanta De Sarkar,Soumya Ray, EXECUTION ANALYSIS OF LOAD BALANCING
ALGORITHMS IN CLOUD COMPUTING ENVIRON- MENT ,in IJCCSA, Vol.2, No.5, October 2012.
[6] S.S.Apte,Abhijit A. Rajguru,,A Comparative Performance Analysis of Load Balancing Algorithms in
Distributed System using Qualitative Parameters Volume-1,Issue-3,August-2012.
[7] Rima Lingawar,Milind Srode,Mangesh Ghonge,Survey
Cloud ComputingIJARCE,Vol.1,No.3,May 2014
on
Load- Balancing Techniques in
[8] Ms. Pradnya Kamble, Mr. Mukesh Kawatghare, Review on Enforcing Secure And Privacy Preserving
Information Brokering In Distributed Information Sharing.
[9] Valeria Cardellini and Michele Colajanni, Dynamic Load Balancing on Web-server Systems.
Download