Skip to main content
Top
Published in: Cluster Computing 6/2019

15-03-2018

Efficient data integrity and data replication in cloud using stochastic diffusion method

Authors: M. Ramanan, P. Vivekanandan

Published in: Cluster Computing | Special Issue 6/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Cloud computing will provide scalable computing as well as storage resources where more data intensive applications will be developed in a computing environment. Owing to the existence of such security threats in the cloud, several mechanisms are being proposed for allowing the users to audit the integrity of data along with the public key of the owner of the data even before making use of the cloud data. Replicating of data in cloud servers through multiple data centers offers better availability, scalability, and durability. The correctness of choice of the right type of public key of the previous mechanisms is based on the security of the public key infrastructure (PKI). Although traditional PKI has been widely used in the construction of public key cryptography, it still faces many security risks, especially in the aspect of managing certificates. There are different applications having different types of quality of service (QoS) needs. In order to support the QoS requirement continuously, the application of such data corruption for this work will be an efficient integrity of data replication that makes use of a stochastic diffusion search (SDS) algorithm that has been proposed. This SDS is that technique of a multi-agent global optimisation which has been based on the behaviour of ants that has been rooted in the partial evaluation of that of an objective function along with direct communication among agents. The proposed SDS algorithm will minimize the replication cost of data. The results of these experiments have shown that the mechanism will be able to demonstrate the effectiveness of this proposed algorithm which is in the replication of data as well as its recovery. The proposed method when appropriately compared with the cost effective replication of dynamic data given by Li et al. proves that the average recovery time is less by 18.18% for the 250 number of requested nodes, by 14.28% for the 500 number of requested nodes, by 11.11% for the 750 number of requested nodes and by 8.69% for the 1000 number of requested nodes.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Jouini, M., Rabai, L.B.A.: A security framework for secure cloud computing environments. Int. J. Cloud Appl. Comput. 6(3), 32–44 (2016) Jouini, M., Rabai, L.B.A.: A security framework for secure cloud computing environments. Int. J. Cloud Appl. Comput. 6(3), 32–44 (2016)
2.
go back to reference Zunnurhain, K., Vrbsky, S. V.: Security in cloud computing. In: Proceedings of the 2011 International Conference on Security and Management (2011) Zunnurhain, K., Vrbsky, S. V.: Security in cloud computing. In: Proceedings of the 2011 International Conference on Security and Management (2011)
3.
go back to reference Hussein, M.K., Mousa, M.H.: A light-weight data replication for cloud data centers environment. Int. J. Eng. Innov. Technol. 1(6), 169–175 (2012) Hussein, M.K., Mousa, M.H.: A light-weight data replication for cloud data centers environment. Int. J. Eng. Innov. Technol. 1(6), 169–175 (2012)
4.
go back to reference Boru, D., Kliazovich, D., Granelli, F., Bouvry, P., Zomaya, A.Y.: Energy-efficient data replication in cloud computing datacenters. Clust. Comput. 18(1), 385–402 (2015)CrossRef Boru, D., Kliazovich, D., Granelli, F., Bouvry, P., Zomaya, A.Y.: Energy-efficient data replication in cloud computing datacenters. Clust. Comput. 18(1), 385–402 (2015)CrossRef
5.
go back to reference Liu, C.W., Hsien, W.F., Yang, C.C., Hwang, M.S.: A survey of public auditing for shared data storage with user revocation in cloud computing. IJ Netw. Secur. 18(4), 650–666 (2016) Liu, C.W., Hsien, W.F., Yang, C.C., Hwang, M.S.: A survey of public auditing for shared data storage with user revocation in cloud computing. IJ Netw. Secur. 18(4), 650–666 (2016)
6.
go back to reference Zhang, J., Dong, Q.: Efficient ID-based public auditing for the outsourced data in cloud storage. Inf. Sci. 343, 1–14 (2016)MathSciNet Zhang, J., Dong, Q.: Efficient ID-based public auditing for the outsourced data in cloud storage. Inf. Sci. 343, 1–14 (2016)MathSciNet
7.
go back to reference Zhang, Y., Xu, C., Li, H., Liang, X.: Cryptographic public verification of data integrity for cloud storage systems. IEEE Cloud Comput. 3(5), 44–52 (2016)CrossRef Zhang, Y., Xu, C., Li, H., Liang, X.: Cryptographic public verification of data integrity for cloud storage systems. IEEE Cloud Comput. 3(5), 44–52 (2016)CrossRef
8.
go back to reference Darwazeh, N.S., Al-Qassas, R.S., AlDosari, F.: A secure cloud computing model based on data classification. Proc. Comput. Sci. 52, 1153–1158 (2015)CrossRef Darwazeh, N.S., Al-Qassas, R.S., AlDosari, F.: A secure cloud computing model based on data classification. Proc. Comput. Sci. 52, 1153–1158 (2015)CrossRef
9.
go back to reference Fabian, B., Ermakova, T., Junghanns, P.: Collaborative and secure sharing of healthcare data in multi-clouds. Inf. Syst. 48, 132–150 (2015)CrossRef Fabian, B., Ermakova, T., Junghanns, P.: Collaborative and secure sharing of healthcare data in multi-clouds. Inf. Syst. 48, 132–150 (2015)CrossRef
10.
go back to reference Jiang, T., Chen, X., Ma, J.: Public integrity auditing for shared dynamic cloud data with group user revocation. IEEE Trans. Comput. 65(8), 2363–2373 (2016)MathSciNetCrossRef Jiang, T., Chen, X., Ma, J.: Public integrity auditing for shared dynamic cloud data with group user revocation. IEEE Trans. Comput. 65(8), 2363–2373 (2016)MathSciNetCrossRef
11.
go back to reference Ali, M., Bilal, K., Khan, S., Veeravalli, B., Li, K., Zomaya, A.: DROPS: division and replication of data in the cloud for optimal performance and security. In: IEEE Transactions on Cloud computing (2015) Ali, M., Bilal, K., Khan, S., Veeravalli, B., Li, K., Zomaya, A.: DROPS: division and replication of data in the cloud for optimal performance and security. In: IEEE Transactions on Cloud computing (2015)
12.
go back to reference Zhang, Y., Ni, J., Tao, X., Wang, Y., Yu, Y.: Provable multiple replication data possession with full dynamics for secure cloud storage. Concurr. Comput.: Pract. Exp. 28(4), 1161–1173 (2016)CrossRef Zhang, Y., Ni, J., Tao, X., Wang, Y., Yu, Y.: Provable multiple replication data possession with full dynamics for secure cloud storage. Concurr. Comput.: Pract. Exp. 28(4), 1161–1173 (2016)CrossRef
13.
go back to reference Gai, K., Qiu, L., Chen, M., Zhao, H., Qiu, M.: SA-EAST: security-aware efficient data transmission for ITS in mobile heterogeneous cloud computing. ACM Trans. Embed. Comput. Syst. 16(2), 60 (2017)CrossRef Gai, K., Qiu, L., Chen, M., Zhao, H., Qiu, M.: SA-EAST: security-aware efficient data transmission for ITS in mobile heterogeneous cloud computing. ACM Trans. Embed. Comput. Syst. 16(2), 60 (2017)CrossRef
14.
go back to reference Sookhak, M., Gani, A., Khan, M.K., Buyya, R.: Dynamic remote data auditing for securing big data storage in cloud computing. Inf. Sci. 380, 101–116 (2017)CrossRef Sookhak, M., Gani, A., Khan, M.K., Buyya, R.: Dynamic remote data auditing for securing big data storage in cloud computing. Inf. Sci. 380, 101–116 (2017)CrossRef
15.
go back to reference Dashti, S.E., Rahmani, A.M.: Dynamic VMs placement for energy efficiency by PSO in cloud computing. J. Exp. Theor. Artif. Intell. 28(1–2), 97–112 (2016)CrossRef Dashti, S.E., Rahmani, A.M.: Dynamic VMs placement for energy efficiency by PSO in cloud computing. J. Exp. Theor. Artif. Intell. 28(1–2), 97–112 (2016)CrossRef
16.
go back to reference Li, H., Zhu, G., Cui, C., Tang, H., Dou, Y., He, C.: Energy-efficient migration and consolidation algorithm of virtual machines in data centers for cloud computing. Computing 98(3), 303–317 (2016)MathSciNetCrossRef Li, H., Zhu, G., Cui, C., Tang, H., Dou, Y., He, C.: Energy-efficient migration and consolidation algorithm of virtual machines in data centers for cloud computing. Computing 98(3), 303–317 (2016)MathSciNetCrossRef
17.
go back to reference Lin, Y.K., Chong, C.S.: Fast GA-based project scheduling for computing resources allocation in a cloud manufacturing system. J. Intell. Manuf. 28(5), 1189–1201 (2017)CrossRef Lin, Y.K., Chong, C.S.: Fast GA-based project scheduling for computing resources allocation in a cloud manufacturing system. J. Intell. Manuf. 28(5), 1189–1201 (2017)CrossRef
18.
go back to reference Wang, B., Li, B., Li, H., Li, F.: Certificateless public auditing for data integrity in the cloud. In: 2013 IEEE Conference on Communications and Network Security (CNS), pp. 136–144. IEEE (2013) Wang, B., Li, B., Li, H., Li, F.: Certificateless public auditing for data integrity in the cloud. In: 2013 IEEE Conference on Communications and Network Security (CNS), pp. 136–144. IEEE (2013)
19.
go back to reference Williams, H., Bishop, M.: Stochastic diffusion search: a comparison of swarm intelligence parameter estimation algorithms with ransac. Algorithms 7(2), 206–228 (2014)CrossRef Williams, H., Bishop, M.: Stochastic diffusion search: a comparison of swarm intelligence parameter estimation algorithms with ransac. Algorithms 7(2), 206–228 (2014)CrossRef
21.
go back to reference Al-Rifaie, M. M., Bishop, M. J., Blackwell, T.: An investigation into the merger of stochastic diffusion search and particle swarm optimisation. In: Proceedings of the 13th annual conference on Genetic and evolutionary computation, pp. 37–44. ACM (2011) Al-Rifaie, M. M., Bishop, M. J., Blackwell, T.: An investigation into the merger of stochastic diffusion search and particle swarm optimisation. In: Proceedings of the 13th annual conference on Genetic and evolutionary computation, pp. 37–44. ACM (2011)
22.
go back to reference Lin, J.W., Chen, C.H., Chang, J.M.: QoS-aware data replication for data-intensive applications in cloud computing systems. IEEE Trans. Cloud Comput. 1(1), 101–115 (2013)CrossRef Lin, J.W., Chen, C.H., Chang, J.M.: QoS-aware data replication for data-intensive applications in cloud computing systems. IEEE Trans. Cloud Comput. 1(1), 101–115 (2013)CrossRef
Metadata
Title
Efficient data integrity and data replication in cloud using stochastic diffusion method
Authors
M. Ramanan
P. Vivekanandan
Publication date
15-03-2018
Publisher
Springer US
Published in
Cluster Computing / Issue Special Issue 6/2019
Print ISSN: 1386-7857
Electronic ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-018-2480-9

Other articles of this Special Issue 6/2019

Cluster Computing 6/2019 Go to the issue

Premium Partner