Skip to main content
Top

2021 | OriginalPaper | Chapter

Approach for Ensuring Fragmentation and Integrity of Data in SEDuLOUS

Authors : Anand Prakash Singh, Arjun Choudhary

Published in: Proceedings of Second International Conference on Computing, Communications, and Cyber-Security

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

With the rapid adoption of cloud services, more and more data are being uploaded on the cloud platform. These data are under threat from various threat actors constantly researching to steal, corrupt, or get control over the data. The threat actors are not only limited to malicious attackers, but these also include curious service providers, social activists, business entities, and nations. They pose a serious risk to cloud services. There are various approaches to protect data at various levels. Division and replication is one such approach where data are divided into chunks and spread over the cloud to reduce the risk of data leakage and simultaneously increase the accessibility. Under division and replication approach, SEDuLOUS provides a heuristic algorithm for data placement in a distributed cloud environment. In this research work, we have provided a comprehensive analysis on cloud data storage services and associated security issues, analysis of SEDuLOUS algorithm, and methodology to improve the SEDuLOUS by specifying minimum fragments to ensure fragmentation of all files and hashing of each chunk to identify the compromised storage nodes.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Mell P, Grance T (2011) The NIST definition of cloud computing. Special Publication, National Institute of Standard and Technology, pp 145–800 Mell P, Grance T (2011) The NIST definition of cloud computing. Special Publication, National Institute of Standard and Technology, pp 145–800
2.
go back to reference Buyya R, Yeo CS, Venugopal S, Broberg J, Brandic I (2009) Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility. Futur Gener Comput Syst 25(6):599–616CrossRef Buyya R, Yeo CS, Venugopal S, Broberg J, Brandic I (2009) Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility. Futur Gener Comput Syst 25(6):599–616CrossRef
4.
go back to reference Henze M, Matzutt R, Hiller J, Mühmer E, Ziegeldorf JH, Giet JVD, Wehrle K (2017) Practical data compliance for cloud storage. In: 2017 IEEE international conference on cloud engineering (IC2E), pp 252–258 Henze M, Matzutt R, Hiller J, Mühmer E, Ziegeldorf JH, Giet JVD, Wehrle K (2017) Practical data compliance for cloud storage. In: 2017 IEEE international conference on cloud engineering (IC2E), pp 252–258
5.
go back to reference Buyya R, Broberg J, Goscinski AM (2010) Cloud computing: principles and paradigms, vol 87. Wiley, London Buyya R, Broberg J, Goscinski AM (2010) Cloud computing: principles and paradigms, vol 87. Wiley, London
7.
go back to reference T. T. W. Group (2016) The treacherous 12: cloud computing top threats in 2016. Cloud Security Alliance. Last Accessed 20 June 2020 T. T. W. Group (2016) The treacherous 12: cloud computing top threats in 2016. Cloud Security Alliance. Last Accessed 20 June 2020
8.
go back to reference Varghese B, Buyya R (2018) Next generation cloud computing: new trends and research directions. Futur Gener Comput Syst 79:849–861CrossRef Varghese B, Buyya R (2018) Next generation cloud computing: new trends and research directions. Futur Gener Comput Syst 79:849–861CrossRef
9.
go back to reference Ouffoué G, Ortiz AM, Cavalli AR, Mallouli W, Domingo-Ferrer J, Sánchez D, Zaidi F (2016) Intrusion detection and attack tolerance for cloud environments: the clarus approach. In: 2016 IEEE 36th international conference on distributed computing systems workshops (ICDCSW), pp 61–66 Ouffoué G, Ortiz AM, Cavalli AR, Mallouli W, Domingo-Ferrer J, Sánchez D, Zaidi F (2016) Intrusion detection and attack tolerance for cloud environments: the clarus approach. In: 2016 IEEE 36th international conference on distributed computing systems workshops (ICDCSW), pp 61–66
10.
go back to reference Torkura KA, Sukmana MIH, Meinig M, Kayem AVDM, Cheng F, Graupner H, Meinel C (2018) Securing cloud storage brokerage systems through threat models. In: 2018 IEEE 32nd international conference on advanced information networking and applications (AINA), pp 759–768 Torkura KA, Sukmana MIH, Meinig M, Kayem AVDM, Cheng F, Graupner H, Meinel C (2018) Securing cloud storage brokerage systems through threat models. In: 2018 IEEE 32nd international conference on advanced information networking and applications (AINA), pp 759–768
11.
go back to reference Kajal N, Ikram N (2015) Security threats in cloud computing. In: International conference on computing, communication and automation. IEEE, pp 691–694 Kajal N, Ikram N (2015) Security threats in cloud computing. In: International conference on computing, communication and automation. IEEE, pp 691–694
12.
go back to reference Tari Z, Yi X, Premarathne US, Bertok P, Khalil I (2015) Security and privacy in cloud computing: vision, trends, and challenges. IEEE Cloud Comput 2(2):30–38CrossRef Tari Z, Yi X, Premarathne US, Bertok P, Khalil I (2015) Security and privacy in cloud computing: vision, trends, and challenges. IEEE Cloud Comput 2(2):30–38CrossRef
13.
go back to reference Choo KKR, Sarre R (2015) Balancing privacy with legitimate surveillance and lawful data access. IEEE Cloud Comput 2(4):8–13CrossRef Choo KKR, Sarre R (2015) Balancing privacy with legitimate surveillance and lawful data access. IEEE Cloud Comput 2(4):8–13CrossRef
14.
go back to reference Quick D, Choo KKR (2016) Big forensic data reduction: digital forensic images and electronic evidence. Clust Comput 19(2):723–740CrossRef Quick D, Choo KKR (2016) Big forensic data reduction: digital forensic images and electronic evidence. Clust Comput 19(2):723–740CrossRef
15.
go back to reference Khan N, Al-Yasiri A (2016) Identifying cloud security threats to strengthen cloud computing adoption framework. Procedia Comput Sci 94:485–490CrossRef Khan N, Al-Yasiri A (2016) Identifying cloud security threats to strengthen cloud computing adoption framework. Procedia Comput Sci 94:485–490CrossRef
16.
go back to reference Anwar S, Inayat Z, Zolkipli MF, Zain JM, Gani A, Anuar NB, Khan MK, Chang V (2017) Cross-VM cache-based side channel attacks and proposed prevention mechanisms: a survey. J Netw Comput Appl 93:259–279CrossRef Anwar S, Inayat Z, Zolkipli MF, Zain JM, Gani A, Anuar NB, Khan MK, Chang V (2017) Cross-VM cache-based side channel attacks and proposed prevention mechanisms: a survey. J Netw Comput Appl 93:259–279CrossRef
17.
go back to reference Patel D, Gupta RK, Pateriya R (2019) Energy-aware prediction-based load balancing approach with VM migration for the cloud environment. In: Data, engineering and applications. Springer, pp 59–74 Patel D, Gupta RK, Pateriya R (2019) Energy-aware prediction-based load balancing approach with VM migration for the cloud environment. In: Data, engineering and applications. Springer, pp 59–74
18.
go back to reference Xiao X, Zheng W, Xia Y, Sun X, Peng Q, Guo Y (2019) A work load aware VM consolidation method based on coalitional game for energy saving in cloud. IEEE Access 7:80421–80430 Xiao X, Zheng W, Xia Y, Sun X, Peng Q, Guo Y (2019) A work load aware VM consolidation method based on coalitional game for energy saving in cloud. IEEE Access 7:80421–80430
19.
go back to reference Xiao X, Xia Y, Zeng F, Zheng W, Sun X, Peng Q, Guo Y, Luo X (2019) A novel coalitional game-theoretic approach for energy aware dynamic VM consolidation in heterogeneous cloud datacenters. In: International conference on web services. Springer, pp 95–109 Xiao X, Xia Y, Zeng F, Zheng W, Sun X, Peng Q, Guo Y, Luo X (2019) A novel coalitional game-theoretic approach for energy aware dynamic VM consolidation in heterogeneous cloud datacenters. In: International conference on web services. Springer, pp 95–109
21.
go back to reference Xia Y, Liu Y, Chen H, Zang B (2012) Defending against VM rollback attack. In: IEEE/IFIP international conference on dependable systems and networks workshops (DSN 2012). IEEE, pp 1–5 Xia Y, Liu Y, Chen H, Zang B (2012) Defending against VM rollback attack. In: IEEE/IFIP international conference on dependable systems and networks workshops (DSN 2012). IEEE, pp 1–5
22.
go back to reference Singh A, Chatterjee K (2017) Cloud security issues and challenges: a survey. J Netw Comput Appl 79:88–115CrossRef Singh A, Chatterjee K (2017) Cloud security issues and challenges: a survey. J Netw Comput Appl 79:88–115CrossRef
23.
go back to reference Castro-Medina F, Rodríguez-Mazahua L, Abud-Figueroa MA, Romero-Torres C, Reyes-Hernández LÁ, Alor-Hernández G (2019) Application of data fragmentation and replication methods in the cloud: a review. In 2019 International conference on electronics, communications and computers (CONIELECOMP). IEEE, pp 47–54 Castro-Medina F, Rodríguez-Mazahua L, Abud-Figueroa MA, Romero-Torres C, Reyes-Hernández LÁ, Alor-Hernández G (2019) Application of data fragmentation and replication methods in the cloud: a review. In 2019 International conference on electronics, communications and computers (CONIELECOMP). IEEE, pp 47–54
24.
go back to reference Mansouri N, Javidi MM (2020) A review of data replication based on meta-heuristics approach in cloud computing and data grid. In: Soft computing, pp 1–28 Mansouri N, Javidi MM (2020) A review of data replication based on meta-heuristics approach in cloud computing and data grid. In: Soft computing, pp 1–28
25.
go back to reference Santos N, Lentini S, Grosso E, Ghita B, Masala G (2019) Performance analysis of data fragmentation techniques on a cloud server. Int J Grid Util Comput 10(4):392–401CrossRef Santos N, Lentini S, Grosso E, Ghita B, Masala G (2019) Performance analysis of data fragmentation techniques on a cloud server. Int J Grid Util Comput 10(4):392–401CrossRef
26.
go back to reference Ali M, Bilal K, Khan SU, Veeravalli B, Li K, Zomaya AY (2018) Drops: division and replication of data in cloud for optimal performance and security. IEEE Trans Cloud Comput 6(2):303–315CrossRef Ali M, Bilal K, Khan SU, Veeravalli B, Li K, Zomaya AY (2018) Drops: division and replication of data in cloud for optimal performance and security. IEEE Trans Cloud Comput 6(2):303–315CrossRef
27.
go back to reference Pandithurai O, Shenbagalakshmi R, Sindujha AU (2019) A noval approach of drops with NTRU in cloud. In: 2019 5th international conference on science technology engineering and mathematics (ICONSTEM), vol 1, pp 261–265 Pandithurai O, Shenbagalakshmi R, Sindujha AU (2019) A noval approach of drops with NTRU in cloud. In: 2019 5th international conference on science technology engineering and mathematics (ICONSTEM), vol 1, pp 261–265
28.
go back to reference Khatod V, Ingale S, Gund K, Gorde S, Joshi R, Khengare R (2020) Enigma: a hybrid approach to file security in cloud. In: Proceedings of ICETIT 2019. Springer, Cham, pp 1005–1015 Khatod V, Ingale S, Gund K, Gorde S, Joshi R, Khengare R (2020) Enigma: a hybrid approach to file security in cloud. In: Proceedings of ICETIT 2019. Springer, Cham, pp 1005–1015
29.
go back to reference Hudic A, Islam S, Kieseberg P, Rennert S, Weippl ER (2013) Data confidentiality using fragmentation in cloud computing. Int J Pervasive Comput Commun Hudic A, Islam S, Kieseberg P, Rennert S, Weippl ER (2013) Data confidentiality using fragmentation in cloud computing. Int J Pervasive Comput Commun
30.
go back to reference Kang S, Veeravalli B, Aung KMM (2016) A security-aware data placement mechanism for big data cloud storage systems. In: 2016 IEEE 2nd international conference on big data security on cloud (BigDataSecurity), IEEE international conference on high performance and smart computing (HPSC), and IEEE international conference on intelligent data and security (IDS), pp 327–332 Kang S, Veeravalli B, Aung KMM (2016) A security-aware data placement mechanism for big data cloud storage systems. In: 2016 IEEE 2nd international conference on big data security on cloud (BigDataSecurity), IEEE international conference on high performance and smart computing (HPSC), and IEEE international conference on intelligent data and security (IDS), pp 327–332
31.
go back to reference Raghavan S (2014) E-science infrastructure: national knowledge network (NKN) initiative. CSI Trans ICT 2(3):207–215CrossRef Raghavan S (2014) E-science infrastructure: national knowledge network (NKN) initiative. CSI Trans ICT 2(3):207–215CrossRef
Metadata
Title
Approach for Ensuring Fragmentation and Integrity of Data in SEDuLOUS
Authors
Anand Prakash Singh
Arjun Choudhary
Copyright Year
2021
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-16-0733-2_61