Skip to main content
Top
Published in: Wireless Personal Communications 1/2021

28-03-2021

Inherent Security-aware Resource Utilizing Methodology for Cloud Environments

Authors: C. Gopala Krishnan, E. Golden Julie, Y. Harold Robinson

Published in: Wireless Personal Communications | Issue 1/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Cloud-based environments utilize a different kind of security services on the Internet in a cost effective manner. The cloud-based service providers may diminish the cost for the operational purpose by the methodology of automatic controlling of the resource utilization with the user’s demand. Moreover, the time and expenditure may expand and the amount of active utilization of computational resources is one of the high restrictions of the scalability measurement. The automatic controlling and utilization of resources are the biggest confront in a cloud computing environment. This paper proposed a solution for providing the automatic scalability of the limited resources for the multi-layered cloud applications. The Google penalty payment methodology was utilized to synchronize the expenditure for the penalty related issues and to correctly compute the actual profit. A hybrid resource utilization algorithm is used to find the valid resources in the cloud layer with a security-aware algorithm are utilized to distribute the resources to the active users based on their request. The experimental results are performed using CLOUDSIM that indicates the advancements of the proposed methodology in terms of resource utilization, providing security and profit identification.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Bhattacharjya, A., Zhong, X., & Li, X. (2019). A Lightweight and efficient secure hybrid RSA (SHRSA) messaging scheme with four-layered authentication stack. IEEE Access, 7, 30487–30506.CrossRef Bhattacharjya, A., Zhong, X., & Li, X. (2019). A Lightweight and efficient secure hybrid RSA (SHRSA) messaging scheme with four-layered authentication stack. IEEE Access, 7, 30487–30506.CrossRef
2.
go back to reference Yu, R., Wang, J., Xu, T., Gao, J., An, Y., Zhang, G., & Yu, M. (2017). Authentication with block-chain algorithm and text encryption protocol in calculation of social network. IEEE Access, 5, 24944–24951.CrossRef Yu, R., Wang, J., Xu, T., Gao, J., An, Y., Zhang, G., & Yu, M. (2017). Authentication with block-chain algorithm and text encryption protocol in calculation of social network. IEEE Access, 5, 24944–24951.CrossRef
3.
go back to reference Wong, C. K., Gouda, M., & Lam, S. S. (2000). Secure group communications using key graphs. IEEE/ACM Transactions on Networking, 8, 16–30.CrossRef Wong, C. K., Gouda, M., & Lam, S. S. (2000). Secure group communications using key graphs. IEEE/ACM Transactions on Networking, 8, 16–30.CrossRef
4.
go back to reference Cao, N., Wang, C., Li, M., Ren, K., & Lou, W. (2014). Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Transactions on Parallel and Distributed Systems, 25, 222–233.CrossRef Cao, N., Wang, C., Li, M., Ren, K., & Lou, W. (2014). Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Transactions on Parallel and Distributed Systems, 25, 222–233.CrossRef
5.
go back to reference Kamil, I.A., Ogundoyin, S.O. (2018) EPDAS: Efficient privacy-preserving data analysis scheme for smart grid network. Journal of King Saud University-Computer and Information Sciences. Kamil, I.A., Ogundoyin, S.O. (2018) EPDAS: Efficient privacy-preserving data analysis scheme for smart grid network. Journal of King Saud University-Computer and Information Sciences.
6.
go back to reference Feng, B., Ma, X., Guo, C., Shi, H., Fu, Z., & Qiu, T. (2016). An efficient protocol with bidirectional verification for storage security in cloud computing. IEEE Access, 4, 7899–7911.CrossRef Feng, B., Ma, X., Guo, C., Shi, H., Fu, Z., & Qiu, T. (2016). An efficient protocol with bidirectional verification for storage security in cloud computing. IEEE Access, 4, 7899–7911.CrossRef
7.
go back to reference Liang, K., & Susilo, W. (2015). Searchable attribute-based mechanism with efficient data sharing for secure cloud storage. IEEE Transactions on Information Forensics and Security, 10, 1981–1992.CrossRef Liang, K., & Susilo, W. (2015). Searchable attribute-based mechanism with efficient data sharing for secure cloud storage. IEEE Transactions on Information Forensics and Security, 10, 1981–1992.CrossRef
8.
go back to reference Li, M., Yu, S., Zheng, Y., Ren, K., & Lou, W. (2013). Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Transactions on Parallel and Distributed Systems, 24, 131–143.CrossRef Li, M., Yu, S., Zheng, Y., Ren, K., & Lou, W. (2013). Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Transactions on Parallel and Distributed Systems, 24, 131–143.CrossRef
9.
go back to reference Li, J., Yu, Q., & Zhang, Y. (2019). Hierarchical attribute based encryption with continuous leakage-resilience. Information Sciences, 484, 113–134.CrossRef Li, J., Yu, Q., & Zhang, Y. (2019). Hierarchical attribute based encryption with continuous leakage-resilience. Information Sciences, 484, 113–134.CrossRef
10.
go back to reference Xu, S., Yang, G., Mu, Y., & Liu, X. (2019). A secure IoT cloud storage system with fine-grained access control and decryption key exposure resistance. Future Generation Computer Systems, 97, 284–294.CrossRef Xu, S., Yang, G., Mu, Y., & Liu, X. (2019). A secure IoT cloud storage system with fine-grained access control and decryption key exposure resistance. Future Generation Computer Systems, 97, 284–294.CrossRef
11.
go back to reference Lang, B., Wang, J., & Liu, Y. (2017). Achieving flexible and self-contained data protection in cloud computing. IEEE Access, 5, 1510–1523.CrossRef Lang, B., Wang, J., & Liu, Y. (2017). Achieving flexible and self-contained data protection in cloud computing. IEEE Access, 5, 1510–1523.CrossRef
12.
go back to reference Hong, J., Wen, T., Guo, Q., Ye, Z., Yin, Y. (2017) Privacy protection and integrity verification of aggregate queries in cloud computing. Cluster Computing 1–11 Hong, J., Wen, T., Guo, Q., Ye, Z., Yin, Y. (2017) Privacy protection and integrity verification of aggregate queries in cloud computing. Cluster Computing 1–11
13.
go back to reference Ali, M., Malik, S. U., & Khan, S. U. (2017). DaSCE: Data security for cloud environment with semi-trusted third party. IEEE Transactions on Cloud Computing, 5, 642–655.CrossRef Ali, M., Malik, S. U., & Khan, S. U. (2017). DaSCE: Data security for cloud environment with semi-trusted third party. IEEE Transactions on Cloud Computing, 5, 642–655.CrossRef
14.
go back to reference Jia, X., He, D., Zeadally, S., & Li, L. (2017). Efficient revocable ID-based signature with cloud revocation server. IEEE Access, 5, 2945–2954.CrossRef Jia, X., He, D., Zeadally, S., & Li, L. (2017). Efficient revocable ID-based signature with cloud revocation server. IEEE Access, 5, 2945–2954.CrossRef
15.
go back to reference Wang, S., Zhang, D., Zhang, Y., & Liu, L. (2018). Efficiently revocable and searchable attribute-based encryption scheme for mobile cloud storage. IEEE Access, 6, 30444–30457.CrossRef Wang, S., Zhang, D., Zhang, Y., & Liu, L. (2018). Efficiently revocable and searchable attribute-based encryption scheme for mobile cloud storage. IEEE Access, 6, 30444–30457.CrossRef
16.
go back to reference Sun, Y., Susilo, W., Zhang, F., & Fu, A. (2018). CCA-secure revocable identity-based encryption with ciphertext evolution in the cloud. IEEE Access, 6, 56977–56983.CrossRef Sun, Y., Susilo, W., Zhang, F., & Fu, A. (2018). CCA-secure revocable identity-based encryption with ciphertext evolution in the cloud. IEEE Access, 6, 56977–56983.CrossRef
17.
go back to reference Ali, S., Rauf, A., Islam, N., Farman, H., Jan, B., Khan, M., et al. (2018). SGKMP: A scalable group key management protocol. Sustainable Cities and Society, 39, 37–42.CrossRef Ali, S., Rauf, A., Islam, N., Farman, H., Jan, B., Khan, M., et al. (2018). SGKMP: A scalable group key management protocol. Sustainable Cities and Society, 39, 37–42.CrossRef
18.
go back to reference Gonzales, D., Kaplan, J. M., Saltzman, E., Winkelman, Z., & Woods, D. (2017). Cloud-trust—A security assessment model for infrastructure as a service (IaaS) clouds. IEEE Transactions on Cloud Computing, 5, 523–536.CrossRef Gonzales, D., Kaplan, J. M., Saltzman, E., Winkelman, Z., & Woods, D. (2017). Cloud-trust—A security assessment model for infrastructure as a service (IaaS) clouds. IEEE Transactions on Cloud Computing, 5, 523–536.CrossRef
19.
go back to reference Shen, W., Qin, J., Yu, J., Hao, R., & Hu, J. (2019). Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage. IEEE Transactions on Information Forensics and Security, 14, 331–346.CrossRef Shen, W., Qin, J., Yu, J., Hao, R., & Hu, J. (2019). Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage. IEEE Transactions on Information Forensics and Security, 14, 331–346.CrossRef
20.
go back to reference Shao, B., Bian, G., Wang, Y., Su, S., & Guo, C. (2018). Dynamic data integrity auditing method supporting privacy protection in vehicular cloud environment. IEEE Access, 6, 43785–43797.CrossRef Shao, B., Bian, G., Wang, Y., Su, S., & Guo, C. (2018). Dynamic data integrity auditing method supporting privacy protection in vehicular cloud environment. IEEE Access, 6, 43785–43797.CrossRef
21.
go back to reference He, J., Zhang, Z., Li, M., Zhu, L., & Hu, J. (2019). Provable data integrity of cloud storage service with enhanced security in the internet of things. IEEE Access, 7, 6226–6239.CrossRef He, J., Zhang, Z., Li, M., Zhu, L., & Hu, J. (2019). Provable data integrity of cloud storage service with enhanced security in the internet of things. IEEE Access, 7, 6226–6239.CrossRef
22.
go back to reference Wu, X., Jiang, R., & Bhargava, B. (2017). On the security of data access control for multiauthority cloud storage systems. IEEE Transactions on Services Computing, 10, 258–272.CrossRef Wu, X., Jiang, R., & Bhargava, B. (2017). On the security of data access control for multiauthority cloud storage systems. IEEE Transactions on Services Computing, 10, 258–272.CrossRef
23.
go back to reference Wang, S., Zhou, J., Liu, J. K., Yu, J., Chen, J., & Xie, W. (2016). An efficient file hierarchy attribute-based encryption scheme in cloud computing. IEEE Transactions on Information Forensics and Security, 11(6), 1265–1277.CrossRef Wang, S., Zhou, J., Liu, J. K., Yu, J., Chen, J., & Xie, W. (2016). An efficient file hierarchy attribute-based encryption scheme in cloud computing. IEEE Transactions on Information Forensics and Security, 11(6), 1265–1277.CrossRef
24.
go back to reference Ateniese, G., Hohenberger S. (2005) Proxy re-signatures: New definitions, algorithms and applications. Proceedings of the 12th Computer and Communications Security (pp. 310–319), 7–11 Nov, USA. Ateniese, G., Hohenberger S. (2005) Proxy re-signatures: New definitions, algorithms and applications. Proceedings of the 12th Computer and Communications Security (pp. 310–319), 7–11 Nov, USA.
25.
go back to reference Wang, X., He, J., Cheng, P., & Chen, J. (2019). Privacy preserving collaborative computing: heterogeneous privacy guarantee and efficient incentive mechanism. IEEE Transactions on Signal Processing, 67(1), 221–233.MathSciNetCrossRef Wang, X., He, J., Cheng, P., & Chen, J. (2019). Privacy preserving collaborative computing: heterogeneous privacy guarantee and efficient incentive mechanism. IEEE Transactions on Signal Processing, 67(1), 221–233.MathSciNetCrossRef
26.
go back to reference Ganeshkumar, K., & Arivazhagan, D. (2014). Generating a digital signature based on new cryptographic scheme for user authentication and security. Indian Journal of Science and Technology, 7, 1–5.CrossRef Ganeshkumar, K., & Arivazhagan, D. (2014). Generating a digital signature based on new cryptographic scheme for user authentication and security. Indian Journal of Science and Technology, 7, 1–5.CrossRef
27.
go back to reference Institute, P. (2016) Sixth annual benchmark study on privacy and security of healthcare data. Technical report. Ponemon Institute LLC. Institute, P. (2016) Sixth annual benchmark study on privacy and security of healthcare data. Technical report. Ponemon Institute LLC.
29.
go back to reference Al-Ayyoub, M., Jararweh, Y., Daraghmeh, M., & Althebyan, Q. (2015). Multi-agent based dynamic resource provisioning and monitoring for cloud computing systems infrastructure. Cluster Computing, 18, 919.CrossRef Al-Ayyoub, M., Jararweh, Y., Daraghmeh, M., & Althebyan, Q. (2015). Multi-agent based dynamic resource provisioning and monitoring for cloud computing systems infrastructure. Cluster Computing, 18, 919.CrossRef
31.
go back to reference Yu, J., Ren, K., Wang, C., & Varadharajan, V. (2015). Enabling cloud storage auditing with key-exposure resistance. IEEE Transactions on Information forensics and security, 10(6), 1167–1179.CrossRef Yu, J., Ren, K., Wang, C., & Varadharajan, V. (2015). Enabling cloud storage auditing with key-exposure resistance. IEEE Transactions on Information forensics and security, 10(6), 1167–1179.CrossRef
32.
go back to reference Chen, X., Li, J., Huang, X., Ma, J., & Lou, W. (2015). New publicly verifiable databases with efficient updates. IEEE Transactions on Dependable and Secure Computing, 12(5), 546–556.CrossRef Chen, X., Li, J., Huang, X., Ma, J., & Lou, W. (2015). New publicly verifiable databases with efficient updates. IEEE Transactions on Dependable and Secure Computing, 12(5), 546–556.CrossRef
33.
go back to reference Libert, B., Vergmud D. (2008) Unidirectional chosen-ciphertext secure proxy re-encryption. Proceedings of the PKC 2008, 9–12 March 2008 (pp. 360–379). Springer: Berlin/Heidelberg. Libert, B., Vergmud D. (2008) Unidirectional chosen-ciphertext secure proxy re-encryption. Proceedings of the PKC 2008, 9–12 March 2008 (pp. 360–379). Springer: Berlin/Heidelberg.
34.
go back to reference Jia, G., Han, G., Xie, H., & Du, J. (2019). Hybrid-LRU caching for optimizing data storage and retrieval in edge computing-based wearable sensors. IEEE Internet of Things Journal, 6(2), 1342–1351.CrossRef Jia, G., Han, G., Xie, H., & Du, J. (2019). Hybrid-LRU caching for optimizing data storage and retrieval in edge computing-based wearable sensors. IEEE Internet of Things Journal, 6(2), 1342–1351.CrossRef
35.
go back to reference Vijayakumar, P., Pandiaraja, P., Karuppiah, M., & Deborah, L. J. (2017). An efficient secure communication for healthcare system using wearable devices. Computers & Electrical Engineering, 63, 232–245.CrossRef Vijayakumar, P., Pandiaraja, P., Karuppiah, M., & Deborah, L. J. (2017). An efficient secure communication for healthcare system using wearable devices. Computers & Electrical Engineering, 63, 232–245.CrossRef
36.
go back to reference Vijayakumar, P., Pandiaraja, P., Balamurugan, B., & Karuppiah, M. (2019). A novel performance enhancing task scheduling algorithm for cloud based E-health environment. International Journal of E-Health and Medical Communications (IJEHMC), 10(2), 102–117 IGI-Global.CrossRef Vijayakumar, P., Pandiaraja, P., Balamurugan, B., & Karuppiah, M. (2019). A novel performance enhancing task scheduling algorithm for cloud based E-health environment. International Journal of E-Health and Medical Communications (IJEHMC), 10(2), 102–117 IGI-Global.CrossRef
37.
go back to reference Mazini, M., Shirazi, B., Mahdavi, I. (2018) Anomaly network-based intrusion detection system using a reliable hybrid artificial bee colony and AdaBoost algorithms. Journal of King Saud University-Computer and Information Sciences. Mazini, M., Shirazi, B., Mahdavi, I. (2018) Anomaly network-based intrusion detection system using a reliable hybrid artificial bee colony and AdaBoost algorithms. Journal of King Saud University-Computer and Information Sciences.
39.
go back to reference Muthu, A. B. A., & Enoch, S. (2017). Optimized scheduling and resource allocation using evolutionary algorithms in cloud environment. International Journal of Intelligent Engineering and Systems, 10(5), 125–133.CrossRef Muthu, A. B. A., & Enoch, S. (2017). Optimized scheduling and resource allocation using evolutionary algorithms in cloud environment. International Journal of Intelligent Engineering and Systems, 10(5), 125–133.CrossRef
40.
go back to reference Wang, X. A., Xhafa, F., Ma, J., & Zheng, Z. (2019). Controlled secure social cloud data sharing based on a novel identity based proxy re-encryption plus scheme. Journal of Parallel and Distributed Computing, 130, 153–165.CrossRef Wang, X. A., Xhafa, F., Ma, J., & Zheng, Z. (2019). Controlled secure social cloud data sharing based on a novel identity based proxy re-encryption plus scheme. Journal of Parallel and Distributed Computing, 130, 153–165.CrossRef
41.
go back to reference Tian, H., Nan, F., Jiang, H., Chang, C.-C., Ning, J., & Huang, Y. (2019). Public auditing for shared cloud data with efficient and secure group management. Information Sciences, 472, 107–125.CrossRef Tian, H., Nan, F., Jiang, H., Chang, C.-C., Ning, J., & Huang, Y. (2019). Public auditing for shared cloud data with efficient and secure group management. Information Sciences, 472, 107–125.CrossRef
43.
go back to reference Grossman, R. L. (2019). Data lakes, clouds, and commons: A review of platforms for analyzing and sharing genomic data. Trends in Genetics, 35(3), 223–234.CrossRef Grossman, R. L. (2019). Data lakes, clouds, and commons: A review of platforms for analyzing and sharing genomic data. Trends in Genetics, 35(3), 223–234.CrossRef
44.
go back to reference Wang, H., Zhang, Y., Chen, K., Sui, G., Zhao, Y., & Huang, X. (2019). Functional broadcast encryption with applications to data sharing for cloud storage. Information Sciences, 502, 109–124.MathSciNetCrossRef Wang, H., Zhang, Y., Chen, K., Sui, G., Zhao, Y., & Huang, X. (2019). Functional broadcast encryption with applications to data sharing for cloud storage. Information Sciences, 502, 109–124.MathSciNetCrossRef
46.
go back to reference Liu, Z.L., Li, B., Huang, Y.Y., Li, J., Xiang, Y., Pedrycz, W. (2019). Newmcos: Towards a practical multi-cloud oblivious storage scheme. IEEE Transactions on Knowledge and Data Engineering 99. Liu, Z.L., Li, B., Huang, Y.Y., Li, J., Xiang, Y., Pedrycz, W. (2019). Newmcos: Towards a practical multi-cloud oblivious storage scheme. IEEE Transactions on Knowledge and Data Engineering 99.
47.
go back to reference Li, J., Huang, Y.Y., Wei, Y., Lv, S.Y., Liu, Z.L., Dong, C.Y., Lou W.J. (2019) Searchable symmetric encryption with forward search privacy. IEEE Transactions on Dependable and Secure Computing 99 Li, J., Huang, Y.Y., Wei, Y., Lv, S.Y., Liu, Z.L., Dong, C.Y., Lou W.J. (2019) Searchable symmetric encryption with forward search privacy. IEEE Transactions on Dependable and Secure Computing 99
48.
go back to reference Liu, H., Yao, X., Yang, T., & Ning, H. (2019). Cooperative privacy preservation for wearable devices in hybrid computing-based smart health. IEEE Internet of Things Journal, 6(2), 1352–1362.CrossRef Liu, H., Yao, X., Yang, T., & Ning, H. (2019). Cooperative privacy preservation for wearable devices in hybrid computing-based smart health. IEEE Internet of Things Journal, 6(2), 1352–1362.CrossRef
49.
go back to reference Chadwick, D. W., Fan, W., Constantino, G., de Lemos, R., Di Cerbo, F., Herwono, I., Manea, M., Mori, P., Sajjad, A., & Wang, X.-S. (2020). A cloud-edge based data security architecture for sharing and analysing cyber threat information. Future Generation Computer Systems, 102, 710–722.CrossRef Chadwick, D. W., Fan, W., Constantino, G., de Lemos, R., Di Cerbo, F., Herwono, I., Manea, M., Mori, P., Sajjad, A., & Wang, X.-S. (2020). A cloud-edge based data security architecture for sharing and analysing cyber threat information. Future Generation Computer Systems, 102, 710–722.CrossRef
50.
go back to reference Harold Robinson, Y., Jeena Jacob, I., Golden Julie, E., Ebby Darney, P. (2019). Hadoop mapreduce and dynamic intelligent splitter for efficient and speed transmission of cloud-based video transforming. IEEE - 3rd International Conference on Computing Methodologies and Communication (ICCMC), (pp. 400–404). IEEE. Harold Robinson, Y., Jeena Jacob, I., Golden Julie, E., Ebby Darney, P. (2019). Hadoop mapreduce and dynamic intelligent splitter for efficient and speed transmission of cloud-based video transforming. IEEE - 3rd International Conference on Computing Methodologies and Communication (ICCMC), (pp. 400–404). IEEE.
Metadata
Title
Inherent Security-aware Resource Utilizing Methodology for Cloud Environments
Authors
C. Gopala Krishnan
E. Golden Julie
Y. Harold Robinson
Publication date
28-03-2021
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 1/2021
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-021-08431-1

Other articles of this Issue 1/2021

Wireless Personal Communications 1/2021 Go to the issue