A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Surekha, Y.
- Adaption of Optimal Evaluation Methods in Resource Utilization by Service Providers with Grid Approaches
Authors
1 Dept of CSE, SRK Institute of Technology, IN
Source
Networking and Communication Engineering, Vol 2, No 10 (2010), Pagination: 405-410Abstract
A Optimal Grid should have three characteristics: It should not allow resource providers to increase prices continuously,No provider should reject to provide resources to certain type of jobs due to risk associated in executing them, Resource Providers and Consumers are allowed to take autonomous decisions. Here we give different levels to jobs to be executed depending upon the application type to which they belong and resource quota is given for different type of jobs while allocating resources by a provider so that starvation of particular type jobs can be avoided. There will be no force on providers regarding the price for which they should offer their resources, but at the same time the price cannot be increased to any extent by providers because if no consumer is selecting him to offer his resources he should definitely get the price down. The two objectives identified are to schedule all type of jobs for execution and to minimize fairness deviation among resources. We present a scheduling scheme, which utilizes a peer-to-peer decentralized scheduling framework. Here we need not adjust competition degree explicitly, the provider automatically decreases his competition degree depending upon his capacity and number of jobs he is offered and automatically increases competition degree when jobs offered is more than his capacity.
Keywords
Optimal Grid, Scheduling, Peer to Peer, Competition Degree.- A Novel Approach for Detecting and Preventing Cross Site Scripting and HTTP Parameter Pollution Using Reverse Proxy
Authors
1 Department of CSE, PVPSIT, affiliated to NTU, Kakinada, Andhra Pradesh, IN
2 Department of IT, Sri Kavitha Engineering College, Khammam, AndhraPradesh, IN
3 Department of CSE, PVPSIT affiliated to JNTU Kakinada, Andhra Pradesh, IN
4 Department of CSE, PVPSIT affiliated to JNTU, Kakinada, Andhra Pradesh, IN
Source
Networking and Communication Engineering, Vol 2, No 11 (2010), Pagination: 487-491Abstract
Present situations, the most critical attacks are those that combine Cross site scripting techniques to access systems and Hypertext Transfer protocol parameter pollution techniques to access the information by polluting the HTTP parameters. The potential damage associated with this kind of threats, the total absence of background and the fact that the solution to mitigate these vulnerabilities must be worked together with programmers, systems administrators and database vendors justifies an in-depth analysis to estimate all the possible ways of implementing this technique. It is a quite simple but effective hacking technique. HPP attacks can be defined as the feasibility to override or add HTTP GET/POST parameters by injecting query string delimiters. It affects a building block of all web technologies. We have to investigate business logic flaws triggered by HPP. As we know, it is tricky and time consuming since manual testing is required. In this paper we are proposing a novel approach to prevent http parameter pollution using reverse proxy. This approach provides a mechanism of records HTML response in order to test the application behavior as well as unexpected exploits. And also this approach also prevents other vulnerabilities.