Skip to main content
Erschienen in: Soft Computing 12/2016

31.07.2015 | Methodologies and Application

Realization of a data traceability and recovery service for a trusted authority service co-ordination within a Cloud environment

verfasst von: Nour Zawawi, Mohamed Hamdy, R. Ghary, M. F. Tolba

Erschienen in: Soft Computing | Ausgabe 12/2016

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Data traceability and recovery are very important concerns when moving data to the Cloud. The Enhanced Watermarking Approach for Data Integrity and Non-repudiation in Rational Databases (EWRDN) provides data security means as integrity, secrecy, non-repudiation and privacy using data watermarking and compression techniques. These capabilities may enhance the whole security and trust of service providers. It gives the data owners the ability to monitor and recover data, if required. Co-ordinations between different services for data storage, manipulation and retrieval over the Cloud represents the milestone in composing the Database as a Service. Until now and to the best of our knowledge, such a service is not yet realized in a real Cloud environment. In this article, a realization for a proposed EWRDN service with data traceability capabilities is elaborated with the required performance analysis which is the main contribution of this work. A Trusted Authority service co-ordination to operate the proposed service is introduced as well. The results have shown that, the proposed service co-ordination can provide the data traceability features and stands against most of the experienced data security threats through the experiments. Moreover, EWRDN service as a differentiated quality service has been proven to provide two different data compression qualities. It has been shown that within an EWRDN co-ordination, a fixed recovery ratio of compression has been achieved.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Fußnoten
1
Version 12.04.
 
2
Version 1.7.0.25.
 
3
Version 7.
 
4
Version 2008.
 
Literatur
Zurück zum Zitat Abbadi IM (2011) Middleware services at cloud virtual layer. In: 11th IEEE international conference on computer and information technology, CIT. IEEE Computer Society, pp 115–120 Abbadi IM (2011) Middleware services at cloud virtual layer. In: 11th IEEE international conference on computer and information technology, CIT. IEEE Computer Society, pp 115–120
Zurück zum Zitat Abbadi IM, Deng M, Nalin M, Martin A, Petkovic M, Baroni I, Sanna A (2011) Trustworthy middleware services in the cloud. In: Third international workshop on cloud data management, CloudDB ’11. ACM Digital Library, pp 33–40 Abbadi IM, Deng M, Nalin M, Martin A, Petkovic M, Baroni I, Sanna A (2011) Trustworthy middleware services in the cloud. In: Third international workshop on cloud data management, CloudDB ’11. ACM Digital Library, pp 33–40
Zurück zum Zitat AlZain MA, Soh B, Pardede E (2013) A survey on data security issues in cloud computing: from single to multi-clouds. J Softw 8(6):1068–1078 AlZain MA, Soh B, Pardede E (2013) A survey on data security issues in cloud computing: from single to multi-clouds. J Softw 8(6):1068–1078
Zurück zum Zitat Bajpai D, Vardhan M, Kushwaha DS (2012) Authentication and authorization interface using security service level agreements for accessing cloud services. In: 5th international conference on contemporary computing-IC3. Communications in computer and information science, vol 306. Springer, Berlin, pp 370–382 Bajpai D, Vardhan M, Kushwaha DS (2012) Authentication and authorization interface using security service level agreements for accessing cloud services. In: 5th international conference on contemporary computing-IC3. Communications in computer and information science, vol 306. Springer, Berlin, pp 370–382
Zurück zum Zitat Bodden E, Clasen M, Kneis J (2007) Arithmetic coding revealed a guided tour from theory to praxis. Technical report, McGill University Bodden E, Clasen M, Kneis J (2007) Arithmetic coding revealed a guided tour from theory to praxis. Technical report, McGill University
Zurück zum Zitat Brandt J (2010) Transform coding for fast approximate nearest neighbor search in high dimensions. In: IEEE conference on computer vision and pattern recognition (CVPR), pp 1815–1822 Brandt J (2010) Transform coding for fast approximate nearest neighbor search in high dimensions. In: IEEE conference on computer vision and pattern recognition (CVPR), pp 1815–1822
Zurück zum Zitat Campbell RH, Montanari M, Farivar R (2012) A middleware for assured clouds. J Internet Serv Appl 3:87–94CrossRef Campbell RH, Montanari M, Farivar R (2012) A middleware for assured clouds. J Internet Serv Appl 3:87–94CrossRef
Zurück zum Zitat Chang WY, Abu-Amara H, Sanford JF (2010) Transforming enterprise cloud services, 1st edn. Springer, BerlinCrossRef Chang WY, Abu-Amara H, Sanford JF (2010) Transforming enterprise cloud services, 1st edn. Springer, BerlinCrossRef
Zurück zum Zitat Dierks T, Rescorla E (2008) The transport layer security (TLS) protocol version 1.2. In: Internet engineering task force (IETF) RFC 4346 Dierks T, Rescorla E (2008) The transport layer security (TLS) protocol version 1.2. In: Internet engineering task force (IETF) RFC 4346
Zurück zum Zitat el-Eliemy MHM (2010) Service replication in wireless mobile ad hoc networks. PhD thesis, Friedrich Schiller University of Jena el-Eliemy MHM (2010) Service replication in wireless mobile ad hoc networks. PhD thesis, Friedrich Schiller University of Jena
Zurück zum Zitat El-Zawawi N, Hamdy M, El-Gohary R, Tolba MF (2013) A database watermarking service with a trusted authority architecture for cloud environment. Int J Comput Appl 69(13):1–9 El-Zawawi N, Hamdy M, El-Gohary R, Tolba MF (2013) A database watermarking service with a trusted authority architecture for cloud environment. Int J Comput Appl 69(13):1–9
Zurück zum Zitat Erl T (2005) Service-oriented architecture: concepts, technology, and design. Pearson Education, New York Erl T (2005) Service-oriented architecture: concepts, technology, and design. Pearson Education, New York
Zurück zum Zitat Esposito C, Ficco M, Palmieri F, Castiglione A (2013) Interconnecting federated clouds by using publish-subscribe service. Clust Comput 16(4):887–903CrossRef Esposito C, Ficco M, Palmieri F, Castiglione A (2013) Interconnecting federated clouds by using publish-subscribe service. Clust Comput 16(4):887–903CrossRef
Zurück zum Zitat Ficco M, Rak M (2015) Stealthy denial of service strategy in cloud computing. IEEE Trans Cloud Comput 3(1):80–94CrossRef Ficco M, Rak M (2015) Stealthy denial of service strategy in cloud computing. IEEE Trans Cloud Comput 3(1):80–94CrossRef
Zurück zum Zitat Freier A, Kocher P, Karlton P (2011) The secure sockets layer (SSL) protocol version 3.0. In: Internet Engineering task force (IETF) Freier A, Kocher P, Karlton P (2011) The secure sockets layer (SSL) protocol version 3.0. In: Internet Engineering task force (IETF)
Zurück zum Zitat Garca-Snchez P, Gonzlez J, Castillo P, Arenas M, Merelo-Guervs J (2013) Service oriented evolutionary algorithms. Soft Comput 17(6):1059–1075CrossRef Garca-Snchez P, Gonzlez J, Castillo P, Arenas M, Merelo-Guervs J (2013) Service oriented evolutionary algorithms. Soft Comput 17(6):1059–1075CrossRef
Zurück zum Zitat Gong Y, Ying Z, Lin M (2013) A survey of cloud computing. In: Yang Y, Ma M (eds) 2nd international conference on green communications and networks 2012 (GCN 2012): Volume 3. Lecture notes in electrical engineering, vol 225. Springer, Berlin, pp 79–84 Gong Y, Ying Z, Lin M (2013) A survey of cloud computing. In: Yang Y, Ma M (eds) 2nd international conference on green communications and networks 2012 (GCN 2012): Volume 3. Lecture notes in electrical engineering, vol 225. Springer, Berlin, pp 79–84
Zurück zum Zitat Grandison T, Maximilien EM, Thorpe S, Alba A (2010) Towards a formal definition of a computing cloud. In: 6th world congress on services, SERVICES. IEEE Computer Society, pp 191–192 Grandison T, Maximilien EM, Thorpe S, Alba A (2010) Towards a formal definition of a computing cloud. In: 6th world congress on services, SERVICES. IEEE Computer Society, pp 191–192
Zurück zum Zitat Han J, Kamber M, Pei J (2011) Data mining concepts and techniques, Chapter 3, 3rd edn. Elsevier (Morgan Kaufmann), Amsterdam Han J, Kamber M, Pei J (2011) Data mining concepts and techniques, Chapter 3, 3rd edn. Elsevier (Morgan Kaufmann), Amsterdam
Zurück zum Zitat Hubbard D, Sutton M (2010) Top threats to cloud computing. Technical report, Cloud Security Alliance Hubbard D, Sutton M (2010) Top threats to cloud computing. Technical report, Cloud Security Alliance
Zurück zum Zitat Itani W, Kayssi A, Chehab A (2009) Privacy as a service: privacy-aware data storage and processing in cloud computing architectures. In: IEEE international conference on dependable, autonomic and secure computing Itani W, Kayssi A, Chehab A (2009) Privacy as a service: privacy-aware data storage and processing in cloud computing architectures. In: IEEE international conference on dependable, autonomic and secure computing
Zurück zum Zitat Ladner R, Petry F, Gupta K, Warner E, Moore P, Aha D (2008) Soft computing techniques for web services brokering. Soft Comput 12(11):1089–1098CrossRef Ladner R, Petry F, Gupta K, Warner E, Moore P, Aha D (2008) Soft computing techniques for web services brokering. Soft Comput 12(11):1089–1098CrossRef
Zurück zum Zitat Lemoudden M, Bouazza NB, Ouahidi BE, Bourget D (2013) A survey of cloud computing security overview of attack vectors and defense mechanisms. J Theor Appl Inf Technol 54(2) Lemoudden M, Bouazza NB, Ouahidi BE, Bourget D (2013) A survey of cloud computing security overview of attack vectors and defense mechanisms. J Theor Appl Inf Technol 54(2)
Zurück zum Zitat Mell P, Grance T (2011) The NIST definition of cloud computing. Technical report SP 800–145 Mell P, Grance T (2011) The NIST definition of cloud computing. Technical report SP 800–145
Zurück zum Zitat Modi C, Patel D, Borisaniya B, Patel A, Rajarajan M (2013) A survey on security issues and solutions at different layers of cloud computing. J Supercomput 63(2):561–592CrossRef Modi C, Patel D, Borisaniya B, Patel A, Rajarajan M (2013) A survey on security issues and solutions at different layers of cloud computing. J Supercomput 63(2):561–592CrossRef
Zurück zum Zitat Mohammed A, Hussein J (2010) Hybrid transform coding scheme for medical image application. In: IEEE international symposium on signal processing and information technology (ISSPIT), pp 237–240 Mohammed A, Hussein J (2010) Hybrid transform coding scheme for medical image application. In: IEEE international symposium on signal processing and information technology (ISSPIT), pp 237–240
Zurück zum Zitat Motahari-Nezhad HR, Stephenson B, Singhal S (2009) Outsourcing business to cloud computing services: opportunities and challenges. IEEE Internet Comput 10 Motahari-Nezhad HR, Stephenson B, Singhal S (2009) Outsourcing business to cloud computing services: opportunities and challenges. IEEE Internet Comput 10
Zurück zum Zitat National Institute of Standards and Technology (2009) FIPS PUB 186-3 digital signature standard (DSS). pub-NIST. Federal Information Processing Standard 186-3 National Institute of Standards and Technology (2009) FIPS PUB 186-3 digital signature standard (DSS). pub-NIST. Federal Information Processing Standard 186-3
Zurück zum Zitat Pearson S, Yee G (2013) Privacy and security for cloud computing. Springer, BerlinCrossRef Pearson S, Yee G (2013) Privacy and security for cloud computing. Springer, BerlinCrossRef
Zurück zum Zitat Rong C, Nguyen ST, Jaatun MG (2013) Beyond lightning: a survey on security challenges in cloud computing. Comput Electr Eng 39(1):47–54 Rong C, Nguyen ST, Jaatun MG (2013) Beyond lightning: a survey on security challenges in cloud computing. Comput Electr Eng 39(1):47–54
Zurück zum Zitat Ruan A, Martin A (2011) RepCloud: achieving fine-grained cloud TCB attestation with reputation systems. In: Proceedings of the sixth ACM workshop on scalable trusted computing, STC ’11. ACM Digital Library, pp 3–14 Ruan A, Martin A (2011) RepCloud: achieving fine-grained cloud TCB attestation with reputation systems. In: Proceedings of the sixth ACM workshop on scalable trusted computing, STC ’11. ACM Digital Library, pp 3–14
Zurück zum Zitat Ryan MD (2013) Cloud computing security: the scientific challenge, and a survey of solutions. J Syst Softw 86(9):2263–2268 Ryan MD (2013) Cloud computing security: the scientific challenge, and a survey of solutions. J Syst Softw 86(9):2263–2268
Zurück zum Zitat Sako K (2011) Digital signature schemes. In: Encyclopedia of cryptography and security, 2nd edn. Springer, Berlin, pp 343–344 Sako K (2011) Digital signature schemes. In: Encyclopedia of cryptography and security, 2nd edn. Springer, Berlin, pp 343–344
Zurück zum Zitat Sayood K (2004) Lossless compression handbook, chapter 5. Academic Press, San Diego, pp 101–152 Sayood K (2004) Lossless compression handbook, chapter 5. Academic Press, San Diego, pp 101–152
Zurück zum Zitat Sood SK (2012) A combined approach to ensure data security in cloud computing. J Netw Comput Appl 35:1831–1838CrossRef Sood SK (2012) A combined approach to ensure data security in cloud computing. J Netw Comput Appl 35:1831–1838CrossRef
Zurück zum Zitat Turner S, Polk T (2011) Prohibiting secure sockets layer (SSL) version 2.0. Internet engineering task force (IETF). doi:10.17487/RFC6176 Turner S, Polk T (2011) Prohibiting secure sockets layer (SSL) version 2.0. Internet engineering task force (IETF). doi:10.​17487/​RFC6176
Zurück zum Zitat Wang C, Wang Q, Ren K, Lou W (2010) Privacy preserving public auditing for data storage security in cloud computing. In: IEEE INFOCOM, pp 1–9 Wang C, Wang Q, Ren K, Lou W (2010) Privacy preserving public auditing for data storage security in cloud computing. In: IEEE INFOCOM, pp 1–9
Zurück zum Zitat Zhang L-J, Zhou Q (2009) CCOA: Cloud computing open architecture. In: IEEE international conference on web services, 2009. ICWS 2009, pp 607–616 Zhang L-J, Zhou Q (2009) CCOA: Cloud computing open architecture. In: IEEE international conference on web services, 2009. ICWS 2009, pp 607–616
Metadaten
Titel
Realization of a data traceability and recovery service for a trusted authority service co-ordination within a Cloud environment
verfasst von
Nour Zawawi
Mohamed Hamdy
R. Ghary
M. F. Tolba
Publikationsdatum
31.07.2015
Verlag
Springer Berlin Heidelberg
Erschienen in
Soft Computing / Ausgabe 12/2016
Print ISSN: 1432-7643
Elektronische ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-015-1792-4

Weitere Artikel der Ausgabe 12/2016

Soft Computing 12/2016 Zur Ausgabe

Premium Partner