A Two Way Validation Framework for Cloud Storage Security

  • Authors

    • Anantula Jyothi
    • Baddam Indira
    2018-04-18
    https://doi.org/10.14419/ijet.v7i2.20.14769
  • Cloud storage, cost reduction, data auditing, Data security, framework.
  • High Performance Computing (HPC) has become one of the predominant techniques for processing the large scale applications. Cloud environment has been chosen to provide the required services and to process these high demand applications. Management of such            applications challenges us on three major things i.e. network feasibility, computational feasibility and data security. Several research endeavours are focused on network load and computing cloud date and provided better outcomes. Still those approaches are not able to provide standard mechanisms in view of data security. On the other side, research towards enabling the auditing features on the cloud based data by various researchers has been addressed but their performance is poor. However, the complexity of the audit process proven to be the bottleneck in improving performance of the application as it consumes the computational resources of the same application. Henceforth, this work proposes a novel framework for cloud data auditing at multiple levels to audit the access requests and upon             validating the conditions of one level, the connection request will be moved to the further complex levels in order to reduce the              computational loads. The proposed framework determines a substantial reduction in the computational load on the cloud server, thus improves the application performance leveraging the infrastructure use.

     


  • References

    1. [1] Marston S, Li Z, Bandyopadhyay S, Zhang J & Ghalsasi A, “Cloud computing—The business perspectiveâ€, Decision support systems, Vol.51,l No.1,(2011), pp.176-189.

      [2] Vouk MA, “Cloud computing—issues research and implementationsâ€, Jrnl of Comp. Inf. Tech-CIT, Vol.4, (2008), pp.235-246.

      [3] Jha AK, DesRoches CM, Campbell EG, Donelan K, Rao SR, Ferris TG, Shields A, Rosenbaum S & Blumenthal D, “Use of electronic health records in US hospitalsâ€, New England Journal of Medicine, Vol.360, No.16,(2009), pp.1628-1638.

      [4] Peng HT, Hsu WW, Chen CH, Lai F & Ho JM, “FinancialCloud: Open cloud framework of derivative pricingâ€, International Conference on Social Computing (SocialCom), (2013), pp.782-789.

      [5] Mircea M & Andreescu AI, “Using cloud computing in higher education: A strategy to improve agility in the current financial crisisâ€, Commun. IBIMA, (2011).

      [6] Armbrust M, Fox A, Griffith R, Joseph AD, Katz RH, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I & Zaharia M, “Above the clouds: A Berkeley view of cloud computingâ€, Commun. ACM, Vol.53, No.4,(2010), pp.50-58.

      [7] Liu L, Yu E & Mylopoulos J, “Security and privacy requirements analysis within a social settingâ€, 11th IEEE Conf. Requirements Eng. Conf., (2003), pp.151-161.

      [8] Mather T, Kumaraswamy S & Latif S, Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance, Sebastopol, CA, USA:O'Reilly Media, (2009).

      [9] Pop M & Salzberg SL, “Bioinformatics challenges of new sequencing technologyâ€, Trends Genetics, Vol.24, No.3, (2008), pp.142-149.

      [10] Greenberg A, Hamilton AJ, Maltz DA & Patel P, “The cost of a cloud: Research problems in data center networksâ€, ACM SIGCOMM Comput. Commun. Rev., Vol.39, No.1, (2008), pp.68-73.

      [11] Zhang Q, Cheng L & Boutaba R, “Cloud computing: state-of-the-art and research challengesâ€, J. Internet Services Appl., Vol.1, No.1, (2010), pp.7-18.

      [12] Chang V, Walters RJ & Wills G, Cloud Storage and Bioinformatics in a Private Cloud Deployment: Lessons for Data Intensive Research, New York, NY, USA:Springer, (2013), pp.245-264.

      [13] Chang V, “Business intelligence as service in the cloudâ€, Future Gener. Comput. Syst., Vol.37,(2014), pp.512-534.

      [14] Cimino GM & Vaglini G, “An interval-valued approach to business process simulation based on genetic algorithms and the BPMNâ€, Information, Vol.5, (2014), pp.319-356.

      [15] Vardharajan V & Tupakula U, “Security as a service model for cloud environmentâ€, IEEE Trans. Netw. Service Manage., Vol.11, No.1, (2014), pp.60-75.

      [16] Antunes N & Vieira M, “Assessing and comparing vulnerability detection tools for web services: Benchmarking approach and examplesâ€, IEEE Trans. Services Comput., Vol.8, No.2, (2015), pp.269-283.

      [17] Yang K & Jia X, “An efcient and secure dynamic auditing protocol for data storage in cloud computingâ€, IEEE Trans. Prll Distrib. Syst.,Vol.24, No.9, (2013), pp.1717-1726.

      [18] Wang C, Chow SSM, Wang Q, Ren K & Lou W, “Privacy preserving public auditing for secure cloud storageâ€, IEEE Trans. Comput., Vol.62, No.2, (2013), pp.362-375.

      [19] Zhu Y, Hu H, Ahn GJ & Yu M, “Cooperative provable data possession for integrity verication in multicloud storageâ€, IEEE Trans. Parallel Distrib. Syst., Vol.23, No.12, (2012), pp.2231-2244.

      [20] Boneh D, Gentry C, Lynn B & Shacham H, “Aggregate and veriably encrypted signatures from bilinear mapsâ€, Adv. Cryptograph Eurocrypt_ Int. Confer. Thy Appl. Cryptograph. Techn., (2003).

      [21] Sookhak M, Gania A, Khanb MK & Buyyac R, “Dynamic remote data auditing for securing big data storage in cloud computingâ€, Inf. Sci., (2015).

      [22] Jia Y, Kui R, Cong W & Varadharajan V, “Enabling cloud storage auditing with key-exposure resistanceâ€, IEEE Trans. Inf. Forensics Security, Vol.10, No.6, (2015), pp.1167-1179.

      [23] Narayana MV, Narsimha G & Sarma SSVN, “Secure- ZHLS: Secure Zone Based Hierarchical Link State Routing Protocol using Digital Signatureâ€, International Journal of Applied Engineering Research, Vol.10, No.9, (2015), pp.22927-22940.

  • Downloads

  • How to Cite

    Jyothi, A., & Indira, B. (2018). A Two Way Validation Framework for Cloud Storage Security. International Journal of Engineering & Technology, 7(2.20), 236-242. https://doi.org/10.14419/ijet.v7i2.20.14769