Skip to main content
Top

2016 | OriginalPaper | Chapter

Secured Data Storage and Computation Technique for Effective Utilization of Servers in Cloud Computing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Cloud computing delivers digital services over the internet by using various applications which were carried out at distributed datacenters by computer systems. It provides protocol based high performance computing which permits shared storage and computation over long distances. This proposed work bridges the efficient computation and secure storage in cloud environment. Secure cloud storing includes receiving the data by cloud server for storage after applying security steps like authentication, encryption of data and allocation of storage space. In cloud computing, a secured computing infrastructure is provided to cloud user through computing request and commitment generation. Dynamic server stipulation by cuckoo algorithm is utilized after the completion of successful user access. The uncheatable computation, secure access and storage of proposed work achieve confidentiality. It improves the efficiency and manages concurrent users’ requests.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Kumar, K., Lu, Y.H.: Cloud computing for mobile users: can offloading computation save energy. J. Comput. 4, 51–56 (2010) Kumar, K., Lu, Y.H.: Cloud computing for mobile users: can offloading computation save energy. J. Comput. 4, 51–56 (2010)
2.
go back to reference Pallis, G.: Cloud computing the new frontier of internet computing. J. Comput. 14(5), 70–73 (2010) Pallis, G.: Cloud computing the new frontier of internet computing. J. Comput. 14(5), 70–73 (2010)
3.
go back to reference Koehler, M.: An adaptive framework for utility-based optimization of scientific applications in the cloud. J. Cloud Comput. Adv. Syst. Appl. 3(4), 1–12 (2014) Koehler, M.: An adaptive framework for utility-based optimization of scientific applications in the cloud. J. Cloud Comput. Adv. Syst. Appl. 3(4), 1–12 (2014)
4.
go back to reference Buyyaa, R., Yeoa, C.S, Venugopala, S., Broberg, J., Brandic, I.: Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility. J. Future Gener. Comput. Syst. 25, 599–616 (2009) Buyyaa, R., Yeoa, C.S, Venugopala, S., Broberg, J., Brandic, I.: Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility. J. Future Gener. Comput. Syst. 25, 599–616 (2009)
5.
go back to reference Sultan, N.: Cloud computing for education: a new dawn. J. Inf. Manag. 30, 109–116 (2010) Sultan, N.: Cloud computing for education: a new dawn. J. Inf. Manag. 30, 109–116 (2010)
6.
go back to reference Marc, M., Stephan G., Alexander, S.: User-controlled resource management in federated clouds. J. Cloud Comput. Adv. Syst. Appl. 3(10), 1–18 (2014) Marc, M., Stephan G., Alexander, S.: User-controlled resource management in federated clouds. J. Cloud Comput. Adv. Syst. Appl. 3(10), 1–18 (2014)
7.
go back to reference Voss, A., Barker, A., Targhi, M.A., Ballegooijen, A.V., Sommerville, I.: An elastic virtual infrastructure for research applications (ELVIRA). J. Cloud Comput. Adv. Syst. Appl. 2(20), 1–11 (2013) Voss, A., Barker, A., Targhi, M.A., Ballegooijen, A.V., Sommerville, I.: An elastic virtual infrastructure for research applications (ELVIRA). J. Cloud Comput. Adv. Syst. Appl. 2(20), 1–11 (2013)
8.
go back to reference Lombardi, F., Pietro, R.D.: Secure virtualization for cloud computing. J. Netw. Comput. Appl. 34(4), 1113–1122 (2011) Lombardi, F., Pietro, R.D.: Secure virtualization for cloud computing. J. Netw. Comput. Appl. 34(4), 1113–1122 (2011)
9.
go back to reference Ali, M., Khan, S.U., Vasilakos, V.A.: Security in cloud computing: opportunities and challenges. J. Inf. Sci. 305, 357–383 (2015) Ali, M., Khan, S.U., Vasilakos, V.A.: Security in cloud computing: opportunities and challenges. J. Inf. Sci. 305, 357–383 (2015)
10.
go back to reference Sheikh, M.H., Sascha, H., Sebastian, R., Max, M.: Trust as a facilitator in cloud computing: a survey. J. Cloud Comput. Adv. Syst. Appl. 1, 1–18 (2012) Sheikh, M.H., Sascha, H., Sebastian, R., Max, M.: Trust as a facilitator in cloud computing: a survey. J. Cloud Comput. Adv. Syst. Appl. 1, 1–18 (2012)
11.
go back to reference Hashizume, K., Rosado, D.G., Medina, E.F., Fernandez, E.B.: An analysis of security issues for cloud computing. J. Internet Serv. Appl. 4, 1–13 (2013) Hashizume, K., Rosado, D.G., Medina, E.F., Fernandez, E.B.: An analysis of security issues for cloud computing. J. Internet Serv. Appl. 4, 1–13 (2013)
12.
go back to reference Gonzalez, N., Milers, C., Redigolo, F., Simplicio, M., Carvalho, T., Naslund, M., Pourzandi, M.: A quantitative analysis of current security concerns and solutions for cloud computing. J. Cloud Comput. Adv. Syst. Appl. 1, 1–18 (2012) Gonzalez, N., Milers, C., Redigolo, F., Simplicio, M., Carvalho, T., Naslund, M., Pourzandi, M.: A quantitative analysis of current security concerns and solutions for cloud computing. J. Cloud Comput. Adv. Syst. Appl. 1, 1–18 (2012)
13.
go back to reference Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. J. Trans. Parallel Distrib. Syst. 25(1), 222–233 (2014) Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. J. Trans. Parallel Distrib. Syst. 25(1), 222–233 (2014)
14.
go back to reference Yang, K., Jia, X.: An efficient and secure dynamic auditing protocol for data storage in cloud computing. J. Parallel Distrib. Syst. 24, 1717–1726 (2013) Yang, K., Jia, X.: An efficient and secure dynamic auditing protocol for data storage in cloud computing. J. Parallel Distrib. Syst. 24, 1717–1726 (2013)
15.
go back to reference Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., Vasilakos, A.V,: Security and privacy for storage and computation in cloud computing. J. Inf. Sci. 258, 371–386 (2014) Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., Vasilakos, A.V,: Security and privacy for storage and computation in cloud computing. J. Inf. Sci. 258, 371–386 (2014)
16.
go back to reference Moghaddam, F., Alrashdan, M., Karimi, O.: A hybrid encription algorithm based on RSA small-e and efficient-RSA for cloud computing environments. J. Adv. Comput. Netw. 1(3) (2013) Moghaddam, F., Alrashdan, M., Karimi, O.: A hybrid encription algorithm based on RSA small-e and efficient-RSA for cloud computing environments. J. Adv. Comput. Netw. 1(3) (2013)
17.
go back to reference Yuwen, Z., Hongqi, Z., Yibao, B.: Study of the AES realization method on the reconfigurable hardware. In: International Conference on Computer Sciences and Applications, pp. 72–76. IEEE, Wuhan (2013) Yuwen, Z., Hongqi, Z., Yibao, B.: Study of the AES realization method on the reconfigurable hardware. In: International Conference on Computer Sciences and Applications, pp. 72–76. IEEE, Wuhan (2013)
18.
go back to reference Kemal. B., Devrim, U., Nadir, A., Oktay, A.: Mobile authentication secure against man-in-the-middle attacks. In: 2nd International Conference on Mobile Cloud Computing, Services and Engineering, pp. 273–276. IEEE, Oxford (2014) Kemal. B., Devrim, U., Nadir, A., Oktay, A.: Mobile authentication secure against man-in-the-middle attacks. In: 2nd International Conference on Mobile Cloud Computing, Services and Engineering, pp. 273–276. IEEE, Oxford (2014)
19.
go back to reference Yang, S.X., Deb, S.: Cuckoo search via Levy flights. In: World Congress on Nature and Biologically Inspired Computing, pp. 210–214. IEEE, Coimbatore (2009) Yang, S.X., Deb, S.: Cuckoo search via Levy flights. In: World Congress on Nature and Biologically Inspired Computing, pp. 210–214. IEEE, Coimbatore (2009)
20.
go back to reference Xingquan, Z., Guoxiang, Z., Wei, T.: Self-adaptive learning PSO-based deadline constrained task scheduling for hybrid IaaS Cloud. J. Autom. Sci. Eng. 11(2), 564–573 (2014) Xingquan, Z., Guoxiang, Z., Wei, T.: Self-adaptive learning PSO-based deadline constrained task scheduling for hybrid IaaS Cloud. J. Autom. Sci. Eng. 11(2), 564–573 (2014)
21.
go back to reference Zineddine, M.: Vulnerabilities and mitigation techniques toning in the cloud: a cost and vulnerabilities coverage optimization approach using cuckoo search algorithm with Levy flights. J. Comput. Secur. 48, 1–18 (2015) Zineddine, M.: Vulnerabilities and mitigation techniques toning in the cloud: a cost and vulnerabilities coverage optimization approach using cuckoo search algorithm with Levy flights. J. Comput. Secur. 48, 1–18 (2015)
22.
go back to reference Singh, S., Kalra, M.: Scheduling of independent tasks in cloud computing using modified genetic algorithm. In: International Conference on Computational Intelligence and Communication Networks (CICN), pp. 565–569, IEEE, Bhopal (2014) Singh, S., Kalra, M.: Scheduling of independent tasks in cloud computing using modified genetic algorithm. In: International Conference on Computational Intelligence and Communication Networks (CICN), pp. 565–569, IEEE, Bhopal (2014)
Metadata
Title
Secured Data Storage and Computation Technique for Effective Utilization of Servers in Cloud Computing
Authors
Manoj Tyagi
Manish Manoria
Copyright Year
2016
DOI
https://doi.org/10.1007/978-3-319-30933-0_53

Premium Partner