Skip to main content

2018 | OriginalPaper | Buchkapitel

Design and Performance Characterization of Practically Realizable Graph-Based Security Aware Algorithms for Hierarchical and Non-hierarchical Cloud Architectures

verfasst von : Rahul Vishwanath Kale, Bharadwaj Veeravalli, Xiaoli Wang

Erschienen in: Frontier Computing

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Applications processing massive amount of data demand superior time-performance and data-storage capabilities. Many organizations are exploring Cloud Computing to manage such applications because of scalability and convenience of access from different geographic locations, whereas data security and privacy are few of the major concerns preventing them from fully embracing it. Data security while maintaining time-performance becomes an important consideration for designing data placement strategies. We first present the reader with a quick survey on the recent approaches and solutions in data placement oriented problems that address security concern and then characterize the performance for graph based algorithms that are practically realizable. We evaluated the performance of conventional strategies such as, Random, T-coloring and revisited these algorithms in the view of providing maximum security. We refer to our strategy as Data Security Preferential (DSP) data placement strategy and evaluated via rigorous performance evaluation tests to identify which strategy will best suit the requirements of the user on three state-of-the-art hierarchical cloud platforms viz., FatTree, ThreeTier and DCell and non-hierarchical cloud platforms.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Hoque, N., et al.: Network attacks: taxonomy, tools and systems. J. Netw. Comput. Appl. 40, 307–324 (2014)CrossRef Hoque, N., et al.: Network attacks: taxonomy, tools and systems. J. Netw. Comput. Appl. 40, 307–324 (2014)CrossRef
2.
Zurück zum Zitat Li, Y., Dai, W., Ming, Z., Qiu, M.: Privacy protection for preventing data over-collection in smart city. IEEE Trans. Comput. 65(5), 1339–1350 (2016)MathSciNetCrossRef Li, Y., Dai, W., Ming, Z., Qiu, M.: Privacy protection for preventing data over-collection in smart city. IEEE Trans. Comput. 65(5), 1339–1350 (2016)MathSciNetCrossRef
3.
Zurück zum Zitat Kappes, G., Hatzieleftheriou, A., Anastasiadis, S.V.: Dike: virtualization-aware access control for multitenant filesystems. University of Ioannina, Greece, Technical report No. DCS2013-1 (2013) Kappes, G., Hatzieleftheriou, A., Anastasiadis, S.V.: Dike: virtualization-aware access control for multitenant filesystems. University of Ioannina, Greece, Technical report No. DCS2013-1 (2013)
4.
Zurück zum Zitat Bitam, S., Mellouk, A.: ITS-cloud: cloud computing for Intelligent transportation system. In: 2012 IEEE GLOBECOM, pp. 2054–2059 (2012) Bitam, S., Mellouk, A.: ITS-cloud: cloud computing for Intelligent transportation system. In: 2012 IEEE GLOBECOM, pp. 2054–2059 (2012)
5.
Zurück zum Zitat Yan, G., Wen, D., Olariu, S., Weigle, M.C.: Security challenges in vehicular cloud computing. IEEE Trans. Intell. Transp. Syst. 14(1), 284–294 (2012)CrossRef Yan, G., Wen, D., Olariu, S., Weigle, M.C.: Security challenges in vehicular cloud computing. IEEE Trans. Intell. Transp. Syst. 14(1), 284–294 (2012)CrossRef
6.
Zurück zum Zitat Cisco Data Center Infrastructure 2.5 Design Guide (2014) Cisco Data Center Infrastructure 2.5 Design Guide (2014)
7.
Zurück zum Zitat Liu, Y., Muppala, J., Veeraraghavan, M., Lin, D., Hamdi, M.: Data Center Networks. Springer, Berlin (2013)CrossRef Liu, Y., Muppala, J., Veeraraghavan, M., Lin, D., Hamdi, M.: Data Center Networks. Springer, Berlin (2013)CrossRef
8.
Zurück zum Zitat Tang, Y., Lee, P., Lui, J., Perlman, R.: Secure overlay cloud storage with access control and assured deletion. IEEE Trans. Dependable Secure Comput. 9(6), 903–916 (2012)CrossRef Tang, Y., Lee, P., Lui, J., Perlman, R.: Secure overlay cloud storage with access control and assured deletion. IEEE Trans. Dependable Secure Comput. 9(6), 903–916 (2012)CrossRef
9.
Zurück zum Zitat Zissis, D., Lekkas, D.: New approaches to security and availability for cloud data. Future Gener. Comput. Syst. 28(3), 583–592 (2012)CrossRef Zissis, D., Lekkas, D.: New approaches to security and availability for cloud data. Future Gener. Comput. Syst. 28(3), 583–592 (2012)CrossRef
10.
Zurück zum Zitat Liu, W., et al.: Security-aware intermediate data placement strategy in scientific cloud workflows. Knowl. Inf. Syst. 41(2), 423–447 (2014)CrossRef Liu, W., et al.: Security-aware intermediate data placement strategy in scientific cloud workflows. Knowl. Inf. Syst. 41(2), 423–447 (2014)CrossRef
11.
Zurück zum Zitat Kang, S., Veeravalli, B., Aung, K.M.M.: A security-aware data placement mechanism for big data cloud storage systems. In: 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE HPSC, and IEEE IDS, pp. 327–332 (2016) Kang, S., Veeravalli, B., Aung, K.M.M.: A security-aware data placement mechanism for big data cloud storage systems. In: 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE HPSC, and IEEE IDS, pp. 327–332 (2016)
12.
Zurück zum Zitat Tu, M., et al.: Data placement in P2P data grids considering the availability, security, access performance and load balancing. J. Grid Comput. 11(1), 103–127 (2013)CrossRef Tu, M., et al.: Data placement in P2P data grids considering the availability, security, access performance and load balancing. J. Grid Comput. 11(1), 103–127 (2013)CrossRef
13.
Zurück zum Zitat Tian, B., et al.: SecHDFS: a secure data allocation scheme for heterogenous Hadoop systems. In: 2016 IEEE International Conference on Networking, Architecture and Storage (NAS), pp. 1–2 (2016) Tian, B., et al.: SecHDFS: a secure data allocation scheme for heterogenous Hadoop systems. In: 2016 IEEE International Conference on Networking, Architecture and Storage (NAS), pp. 1–2 (2016)
14.
Zurück zum Zitat Kayem, A.V.D.M., Elgazzar, K., Martin, P.: Secure and efficient data placement in mobile healthcare services. In: Proceedings of DEXA 2014, Munich, Germany, 1–4 September 2014, Part I, pp. 352–361 (2014) Kayem, A.V.D.M., Elgazzar, K., Martin, P.: Secure and efficient data placement in mobile healthcare services. In: Proceedings of DEXA 2014, Munich, Germany, 1–4 September 2014, Part I, pp. 352–361 (2014)
Metadaten
Titel
Design and Performance Characterization of Practically Realizable Graph-Based Security Aware Algorithms for Hierarchical and Non-hierarchical Cloud Architectures
verfasst von
Rahul Vishwanath Kale
Bharadwaj Veeravalli
Xiaoli Wang
Copyright-Jahr
2018
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-7398-4_40

Premium Partner