Hybrid algorithm designed for handling remote integrity check mechanism over dynamic cloud environment

  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract

    Cloud computing is the becoming the architecture information technology of next generation. Cloud computing provides dynamic set of resources for different category of users. Remote access of resources is available on the pay per basis. Cloud is using the storage, computing, infrastructure services according to the requirements. Cloud manages all the user data at distributed level and provides reliability, flexibility and on demand services to user with very low cost. In Now days scenario cloud applications and data over the cloud machines are increasing day by day which indirectly invites different threats for the crucial and sensitive data on cloud. In this paper, we proposed a security model that will give the computational enhancements in different modules data. The different proposed modules: 1) key generation 2) access control strong encryption 4) remote integrity checks. The proposed model enhances t confidentiality, authentication and integrity of data. From the result analysis, it has been concluded that computation and communication overhead are minimized as compared to previous model with higher efficiency achieved.



  • Keywords

    Cloud Data; Security Issue; Integrity; Secure Cloud Architecture

  • References

      [1] G. Cheng, H. Jin, “Building Dynamic Integrity Protection for Multiple Independent Authorities in virtualization-based Infrastructure “, in proceeding of IEEE 10th ACM International Conference on Grid Computing” pp 113-119, 2009.

      [2] Z. lianhong “Secuirty Storage in the Cloud Computing: A RSAbased Assumption DataIntegrity Check without Original Data” in proceeding of IEEE International Conference on Educational and Information Technology” pp 143-148, 2010.

      [3] R. Neisse, D. Holling, “Implementing Trust in Cloud Infrastructures”, in proceeding of 11th International Symposium on Cluster, Cloud and Grid Computing, pp 524-533, june 2011.

      [4] S. Ni-Na, Z. Hai-Yan “On providing integrity for dynamic data based on the third-party verifier in cloud computing”, in proceeding of IEEE international Conference on Instrumentation, Measurement, Computer, Communication and Control, pp 145-150, 2011.

      [5] F. Barsoum, M. Hasan, “Integrity Verification of Multiple Data Copies over Untrusted Cloud Servers” in proceeding of 12th International Symposium on Cluster, Cloud and Grid Computing, pp 829-840, dec, 2012 .

      [6] T. Thao Phuong, K. Omote “Improvement of Multi-user Searchable Encrypted Data Scheme” in proceeding of 7th International Conference for Internet Technology and Secured Transactions, pp 263-266, 2014.

      [7] S. Shen, “An Effective Integrity Check Scheme for Secure Erasure Code-Based Storage Systems”,inIeee Transactions On Reliability, 64(3), pp 840-851, 2015.

      [8] Z. Zhu, R. Jiang, “ Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud”, IEEE Transactions On Parallel And Distributed Systems, 27(1), pp 40-51, 2016

      [9] C. Wang, K. Ren, “Secure Optimization Computation Outsourcing in Cloud Computing: A Case Studyof Linear Programming” IEEE Transactions on Computers, 65(1), Pp 216-227, 2016.

      [10] P. Hu, C. Sung, “Optimal Coding and Allocation for Perfect Secrecy” in IEEE Transactions On Information Forensics & Security, 11(2), pp 388-399, 2016.

      [11] Shan, D., Cao, G.H., Dong, H.: LGMS-FOA: An Improved Fruit Fly Optimization Algorithm for Solving Optimization Problems. Journal of Mathematical Problems in Engineering. pp 1-9 (2013)

      [12] Zhang, P., Wang, L.: Grouped Fruit Fly Optimization Algorithm for the No-Wait Lot Streaming Flow Shop Scheduling. In: International Conference on intelligent Computing. pp 664-674, Springer (2014)

      [13] Abdullahi, M., Ngadi, M.A.: Hybrid Symbiotic Organisms Search Optimization Algorithm for Scheduling of Tasks on Cloud Computing Environment. PloS One. 11, pp 1-29 (2016)

      [14] Wu, L., Zuo, C., Zhang, H.: A Cloud Model Based Fruit Fly Optimization Algorithm. Knowledge-based Systems. 89, pp 603-617 (2015)

      [15] Dai, H., Zhao, G., Lu, and J.: Comment and Improvement on New Fruit Fly Optimization Algorithm: Taking the Financial Distress Model as an Example. Knowledge-based Systems. 59, pp 159-160 (2014)

      [16] Pan, Q.K., Sang, H.Y., Duan, J.H., Gao, L.: An Improved Fruit.




Article ID: 13030
DOI: 10.14419/ijet.v7i2.4.13030

Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.