Skip to main content
Top

2018 | OriginalPaper | Chapter

24. SCORS: Smart Cloud Optimal Resource Selection

Authors : Fahad Alsolami, Yaqoob Sayid, Nawal Zaied, Isaac Sayid, Iman Ismail

Published in: Information Technology - New Generations

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Cloud storages have recently increased rapidly in many organizations as they provide many benefits and advantages for the users. These advantages include easiness in use, unlimited capacity in storage, scalability and cost effectiveness. This has motivated the concerns regarding the cloud issues including cost, performance and security. Many different schemes have been proposed to address the issues of cloud storage. Each scheme considers these issues from different perspectives without employing an optimal solution that fully satisfies the user requirements. In real world applications, the client's objectives to move to cloud storage vary from single objective to several conflicting objectives. As a result, there is a need to find a tradeoff setup for a multiple cloud storage scheme. This paper proposed Smart Cloud Optimal Resource Selection (SCORS) scheme by applying non-dominated sorting genetic algorithm (NSGA-2) to resolve the user's conflicting requirements. Our optimal solution facilitates setting up multiple cloud storages in an optimized way based on the objectives specified. Since each user has different objectives, all combinations of cloud storage client needs are collected and transformed into different multi-objective optimization problems with constraints and bounds. Experiment results show that SCORS scheme determine the optimal solution from the set of feasible solutions in an efficient way.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Alsolami, F. J. (2015). Toward secure sensitive data in the cloud. Ph.D. dissertation, University of Colorado, Colorado Springs. Alsolami, F. J. (2015). Toward secure sensitive data in the cloud. Ph.D. dissertation, University of Colorado, Colorado Springs.
2.
go back to reference Deb, K., Pratap, A., Agarwal, S., & Meyarivan, T. (2002). A fast and elitist multiobjective genetic algorithm: NSGA-II. IEEE Transactions on Evolutionary Computation, 6, 182–197.CrossRef Deb, K., Pratap, A., Agarwal, S., & Meyarivan, T. (2002). A fast and elitist multiobjective genetic algorithm: NSGA-II. IEEE Transactions on Evolutionary Computation, 6, 182–197.CrossRef
3.
go back to reference Latha, B., Senthilkumar, V. S. (2009). Simulation optimization of process parameters in composite drilling process using multi-objective evolutionary algorithm. In ARTCom’09. International conference on advances in recent technologies in communication and computing, 2009 (pp. 79–82). IEEE. Kottayam, Kerala. Latha, B., Senthilkumar, V. S. (2009). Simulation optimization of process parameters in composite drilling process using multi-objective evolutionary algorithm. In ARTCom’09. International conference on advances in recent technologies in communication and computing, 2009 (pp. 79–82). IEEE. Kottayam, Kerala.
4.
go back to reference Xiong, H., Zhang, X., Yao, D., Wu, X., Wen, Y. (2012). Towards end-to-end secure content storage and delivery with public cloud. In Proceedings of the second ACM conference on data and application security and privacy (pp. 257–266). ACM. San Antonio, TX. Xiong, H., Zhang, X., Yao, D., Wu, X., Wen, Y. (2012). Towards end-to-end secure content storage and delivery with public cloud. In Proceedings of the second ACM conference on data and application security and privacy (pp. 257–266). ACM. San Antonio, TX.
5.
go back to reference Kumbhare, A., & Simmhan, Y., Prasanna, V. (2012). Cryptonite: A secure and performant data repository on public clouds. In 2012 I.E. 5th international conference on cloud computing (CLOUD) (pp. 510–517). IEEE. Honolulu, Hawaii. Kumbhare, A., & Simmhan, Y., Prasanna, V. (2012). Cryptonite: A secure and performant data repository on public clouds. In 2012 I.E. 5th international conference on cloud computing (CLOUD) (pp. 510–517). IEEE. Honolulu, Hawaii.
6.
go back to reference Alsolami, F., & Chow, C. E. ( 2013). N-cloud: Improving performance and security in cloud storage. In 2013 I.E. 14th international conference on high performance switching and routing (HPSR) (pp. 221–222) IEEE. Taipei, Taiwan. Alsolami, F., & Chow, C. E. ( 2013). N-cloud: Improving performance and security in cloud storage. In 2013 I.E. 14th international conference on high performance switching and routing (HPSR) (pp. 221–222) IEEE. Taipei, Taiwan.
7.
go back to reference Alsolami, F., & Boult, T. E. (2014). Cloudstash: Using secret-sharing scheme to secure data, not keys, in multi-clouds. In 2014 11th international conference on information technology: New generations (ITNG) (pp. 315–320). IEEE. Las Vegas, NV, USA. Alsolami, F., & Boult, T. E. (2014). Cloudstash: Using secret-sharing scheme to secure data, not keys, in multi-clouds. In 2014 11th international conference on information technology: New generations (ITNG) (pp. 315–320). IEEE. Las Vegas, NV, USA.
8.
go back to reference Bessani, A., Correia, M., Quaresma, B., André, F., & Sousa, P. (2013). Depsky: Dependable and secure storage in a cloud-of-clouds. ACM Transactions on Storage (TOS), 9, 12. Bessani, A., Correia, M., Quaresma, B., André, F., & Sousa, P. (2013). Depsky: Dependable and secure storage in a cloud-of-clouds. ACM Transactions on Storage (TOS), 9, 12.
10.
go back to reference AlZain, M. A., Pardede, E., Soh, B., Thom, J. A. (2012). Cloud computing security: From single to multi-clouds. In 2012 45th Hawaii international conference on system science (HICSS) (pp. 5490–5499). IEEE. Maui, HI. AlZain, M. A., Pardede, E., Soh, B., Thom, J. A. (2012). Cloud computing security: From single to multi-clouds. In 2012 45th Hawaii international conference on system science (HICSS) (pp. 5490–5499). IEEE. Maui, HI.
11.
go back to reference Feldman, A. J., Zeller, W. P., Freedman, M. J., Felten, E. W. (2010). SPORC: Group collaboration using untrusted cloud resources. In OSDI’10 proceedings of the 9th USENIX conference on operating systems design and implementation (pp. 337–350). Berkeley, CA: USENIX Association. Feldman, A. J., Zeller, W. P., Freedman, M. J., Felten, E. W. (2010). SPORC: Group collaboration using untrusted cloud resources. In OSDI’10 proceedings of the 9th USENIX conference on operating systems design and implementation (pp. 337–350). Berkeley, CA: USENIX Association.
12.
go back to reference Santos, N., Gummadi, K. P., Rodrigues, R. (2009). Towards trusted cloud computing. In HotCloud’09 proceedings of the 2009 conference on hot topics in cloud computing. Berkeley, CA: USENIX Association Santos, N., Gummadi, K. P., Rodrigues, R. (2009). Towards trusted cloud computing. In HotCloud’09 proceedings of the 2009 conference on hot topics in cloud computing. Berkeley, CA: USENIX Association
13.
go back to reference Wang, H., Zhao, Z., Li, X., He, C., Qi, Q., Sun, J. (2013). A scheme to ensure data security of cloud storage. In 2013 I.E. international conference on service operations and logistics, and informatics (SOLI) (pp. 79–82). IEEE. Dongguan. Wang, H., Zhao, Z., Li, X., He, C., Qi, Q., Sun, J. (2013). A scheme to ensure data security of cloud storage. In 2013 I.E. international conference on service operations and logistics, and informatics (SOLI) (pp. 79–82). IEEE. Dongguan.
14.
go back to reference Lei, D., Zhou, K., Jin, H., Liu, J., Wei, R. (2014). SFDS: A security and flexible data sharing scheme in cloud environment. In 2014 international conference on cloud computing and big data (CCBD). Wuhan, Hubei. (pp. 101–108). Lei, D., Zhou, K., Jin, H., Liu, J., Wei, R. (2014). SFDS: A security and flexible data sharing scheme in cloud environment. In 2014 international conference on cloud computing and big data (CCBD). Wuhan, Hubei. (pp. 101–108).
15.
go back to reference Sarvabhatla, M., Vorugunti, C. S. (2015). A robust mutual authentication scheme for data security in cloud architecture. In 2015 7th international conference on communication systems and networks (COMSNETS) (pp. 1–6). IEEE. Bangalore. Sarvabhatla, M., Vorugunti, C. S. (2015). A robust mutual authentication scheme for data security in cloud architecture. In 2015 7th international conference on communication systems and networks (COMSNETS) (pp. 1–6). IEEE. Bangalore.
16.
go back to reference Deshmukh, A., Mihovska, A., Prasad, R. (2012). A cloud computing security schemes: TGOS [threshold group- oriented signature] and TMS [threshold multisignature schemes]. In 2012 world congress on information and communication technologies (WICT). (pp. 203–208). IEEE. Trivandrum. Deshmukh, A., Mihovska, A., Prasad, R. (2012). A cloud computing security schemes: TGOS [threshold group- oriented signature] and TMS [threshold multisignature schemes]. In 2012 world congress on information and communication technologies (WICT). (pp. 203–208). IEEE. Trivandrum.
17.
go back to reference Mazur, S., Blasch, E., Chen, Y., Skormin, V. (2011). Mitigating cloud computing security risks using a self-monitoring defensive scheme. In Proceedings of the 2011 I.E. national aerospace and electronics conference (NAECON) (pp. 39–45). IEEE. Dayton, OH. Mazur, S., Blasch, E., Chen, Y., Skormin, V. (2011). Mitigating cloud computing security risks using a self-monitoring defensive scheme. In Proceedings of the 2011 I.E. national aerospace and electronics conference (NAECON) (pp. 39–45). IEEE. Dayton, OH.
18.
go back to reference Cachin, C., Haas, R., Vukolic, M. (2010) Dependable storage in the intercloud (Research Report RZ, 3783). Cachin, C., Haas, R., Vukolic, M. (2010) Dependable storage in the intercloud (Research Report RZ, 3783).
19.
go back to reference Balasaraswathi, V. R., Manikandan, S. (2014). Enhanced security for multi-cloud storage using cryptographic data splitting with dynamic approach. In 2014 international conference on advanced communication control and computing technologies (ICACCCT) (pp. 1190–1194). IEEE. Tamilnadu. Balasaraswathi, V. R., Manikandan, S. (2014). Enhanced security for multi-cloud storage using cryptographic data splitting with dynamic approach. In 2014 international conference on advanced communication control and computing technologies (ICACCCT) (pp. 1190–1194). IEEE. Tamilnadu.
20.
go back to reference Popa, R. A., Lorch, J. R., Molnar, D., Wang, H. J., & Zhuang, L. (2011). Enabling security in cloud storage slas with cloudproof. USENIX Annual Technical Conference, 242, 31. Popa, R. A., Lorch, J. R., Molnar, D., Wang, H. J., & Zhuang, L. (2011). Enabling security in cloud storage slas with cloudproof. USENIX Annual Technical Conference, 242, 31.
21.
go back to reference Mahajan, P., Setty, S., Lee, S., Clement, A., Alvisi, L., Dahlin, M., & Walfish, M. (2011). Depot: Cloud storage with minimal trust. ACM Transactions on Computer Storage (TOCS), 29, 12. Mahajan, P., Setty, S., Lee, S., Clement, A., Alvisi, L., Dahlin, M., & Walfish, M. (2011). Depot: Cloud storage with minimal trust. ACM Transactions on Computer Storage (TOCS), 29, 12.
24.
go back to reference Anthes, G. (2010). Security in the cloud. Communications of the ACM, 53(11), 16–18.CrossRef Anthes, G. (2010). Security in the cloud. Communications of the ACM, 53(11), 16–18.CrossRef
25.
go back to reference Choo, K.-K.R. (2010). Cloud computing: Challenges and future directions. Trends and Issues in Crime and Criminal Justice, 400, 1. Choo, K.-K.R. (2010). Cloud computing: Challenges and future directions. Trends and Issues in Crime and Criminal Justice, 400, 1.
26.
go back to reference Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., et al. (2010). A view of cloud computing. Communications of the ACM, 53(4), 50–58.CrossRef Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., et al. (2010). A view of cloud computing. Communications of the ACM, 53(4), 50–58.CrossRef
27.
go back to reference Cachin, C., Keidar, I., & Shraer, A. (2009). Trusting the cloud. ACM SIGACT News, 40(2), 81–86.CrossRef Cachin, C., Keidar, I., & Shraer, A. (2009). Trusting the cloud. ACM SIGACT News, 40(2), 81–86.CrossRef
28.
go back to reference Rocha, F., & Correia, M. (2011). Lucy in the sky without diamonds: Stealing confidential data in the cloud. In 2011 IEEE/IFIP 41st international conference on dependable systems and networks workshops (DSN-W) (pp. 129–134). IEEE. Hong Kong. Rocha, F., & Correia, M. (2011). Lucy in the sky without diamonds: Stealing confidential data in the cloud. In 2011 IEEE/IFIP 41st international conference on dependable systems and networks workshops (DSN-W) (pp. 129–134). IEEE. Hong Kong.
29.
go back to reference Patterson, D. A., Gibson, G., & Katz, R. H. (1988). A case for redundant arrays of inexpensive disks (RAID). ACM SIGMOD Record, 17(3), 109–116.CrossRef Patterson, D. A., Gibson, G., & Katz, R. H. (1988). A case for redundant arrays of inexpensive disks (RAID). ACM SIGMOD Record, 17(3), 109–116.CrossRef
Metadata
Title
SCORS: Smart Cloud Optimal Resource Selection
Authors
Fahad Alsolami
Yaqoob Sayid
Nawal Zaied
Isaac Sayid
Iman Ismail
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-319-54978-1_24

Premium Partner