Skip to main content
Erschienen in: Soft Computing 18/2019

23.04.2019 | Focus

Prediction of availability and integrity of cloud data using soft computing technique

verfasst von: R. Pitchai, S. Babu, P. Supraja, S. Anjanayya

Erschienen in: Soft Computing | Ausgabe 18/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In cloud computing, data storage is the most important task. In cloud storage, security and privacy are the major issues. To avoid such issues, we proposed a new protocol called availability and integrity verification protocol (AIVP) to predict the available space in cloud and verify the integrity of the stored data. For availability verification, this protocol is used to learn the size of the available data before it starts the storing process. Based on the learning, can find available storage space, cloud service provider will allow to store the data. This reduces the latency, communication cost and computational cost. For integrity verification, we separate the public data and private data and this leads to avoid the privacy issues. Private data will be integrated by the cloud service providers and the public data will be integrated by the third-party verifier. By using this verification process, it can avoid the security issues. In simulation results, proposed AIVP has outperformed the high-efficiency and throughput and this will cut the latency, computational cost and communication cost.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Al-Saffar AMH (2015) Identity-based approach for cloud data integrity in multi-cloud environment. Identity 4(8):505–509 Al-Saffar AMH (2015) Identity-based approach for cloud data integrity in multi-cloud environment. Identity 4(8):505–509
Zurück zum Zitat Brandenburger M, Cachin C, Knežević N (2015) Don’t trust the cloud, verify: integrity and consistency for cloud object stores. In: Proceedings of the 8th ACM international systems and storage conference. ACM, p 16 Brandenburger M, Cachin C, Knežević N (2015) Don’t trust the cloud, verify: integrity and consistency for cloud object stores. In: Proceedings of the 8th ACM international systems and storage conference. ACM, p 16
Zurück zum Zitat Cai BL, Zhang RQ, Zhou XB (2017) Experience availability: tail-latency oriented availability in software-defined cloud computing. J Comput Sci Technol 32(2):250–257CrossRef Cai BL, Zhang RQ, Zhou XB (2017) Experience availability: tail-latency oriented availability in software-defined cloud computing. J Comput Sci Technol 32(2):250–257CrossRef
Zurück zum Zitat Chen Y, Wang F, Zhu L, Zhang Z (2015) A survey of remote data integrity checking: techniques and verification structures. Int J Grid Distrib Comput 8(4):179–198CrossRef Chen Y, Wang F, Zhu L, Zhang Z (2015) A survey of remote data integrity checking: techniques and verification structures. Int J Grid Distrib Comput 8(4):179–198CrossRef
Zurück zum Zitat Chen F, Zhang T, Chen J, Xiang T (2016) Cloud storage integrity checking: going from theory to practice. In: Proceedings of the 4th ACM international workshop on security in cloud computing, pp 24–28 Chen F, Zhang T, Chen J, Xiang T (2016) Cloud storage integrity checking: going from theory to practice. In: Proceedings of the 4th ACM international workshop on security in cloud computing, pp 24–28
Zurück zum Zitat El-Booz SA, Attiya G, El-Fishawy N (2016) A secure cloud storage system combining time-based one-time password and automatic blocker protocol. EURASIP J Inf Secur 2016(1):1–13CrossRef El-Booz SA, Attiya G, El-Fishawy N (2016) A secure cloud storage system combining time-based one-time password and automatic blocker protocol. EURASIP J Inf Secur 2016(1):1–13CrossRef
Zurück zum Zitat Endo PT, Rodrigues M, Gonçalves GE, Kelner J, Sadok JH, Curescu C (2016) High availability in clouds: systematic review and research challenges. J Cloud Comput 5:16CrossRef Endo PT, Rodrigues M, Gonçalves GE, Kelner J, Sadok JH, Curescu C (2016) High availability in clouds: systematic review and research challenges. J Cloud Comput 5:16CrossRef
Zurück zum Zitat Garg N, Bawa S (2016) Comparative analysis of cloud data integrity auditing protocols. J Netw Comput Appl 66:17–32CrossRef Garg N, Bawa S (2016) Comparative analysis of cloud data integrity auditing protocols. J Netw Comput Appl 66:17–32CrossRef
Zurück zum Zitat Glass S, Portmann M, Muthukkumarasamy V (2016) Securing route and path integrity in multihop wireless networks. In: Security of self-organizing networks: MANET, WSN, WMN, VANET Glass S, Portmann M, Muthukkumarasamy V (2016) Securing route and path integrity in multihop wireless networks. In: Security of self-organizing networks: MANET, WSN, WMN, VANET
Zurück zum Zitat Jogdand RM, Goudar RH, Sayed GB (2015) Enabling public verifiability and availability for secure data storage in cloud computing. Evol Syst 6(1):55–65CrossRef Jogdand RM, Goudar RH, Sayed GB (2015) Enabling public verifiability and availability for secure data storage in cloud computing. Evol Syst 6(1):55–65CrossRef
Zurück zum Zitat Juels A, Oprea AM, Van Dijk ME, Stefanov EP (2016) Remote verification of file protections for cloud data storage. U.S. Patent 9,230,114 Juels A, Oprea AM, Van Dijk ME, Stefanov EP (2016) Remote verification of file protections for cloud data storage. U.S. Patent 9,230,114
Zurück zum Zitat Karthiban K, Smys S (2018) Privacy preserving approaches in cloud computing. In: 2018 2nd international conference on inventive systems and control (ICISC). IEEE, pp 462–467 Karthiban K, Smys S (2018) Privacy preserving approaches in cloud computing. In: 2018 2nd international conference on inventive systems and control (ICISC). IEEE, pp 462–467
Zurück zum Zitat Liu C, Yang C, Zhang X, Chen J (2015) External integrity verification for outsourced big data in cloud and IoT: a big picture. Future Gen Comput Syst 49:58–67CrossRef Liu C, Yang C, Zhang X, Chen J (2015) External integrity verification for outsourced big data in cloud and IoT: a big picture. Future Gen Comput Syst 49:58–67CrossRef
Zurück zum Zitat Omar M, Boufaghes H, Mammeri L, Taalba A, Tari A (2016) Secure and reliable certificate chains recovery protocol for mobile ad hoc networks. J Netw Comput Appl 62:153–162CrossRef Omar M, Boufaghes H, Mammeri L, Taalba A, Tari A (2016) Secure and reliable certificate chains recovery protocol for mobile ad hoc networks. J Netw Comput Appl 62:153–162CrossRef
Zurück zum Zitat Piechotta C, Olsen MG, Jensen AE, Coleman JW, Larsen PG (2016) A secure dynamic collaboration environment in a cloud context. Future Gen Comput Syst 55:165–175CrossRef Piechotta C, Olsen MG, Jensen AE, Coleman JW, Larsen PG (2016) A secure dynamic collaboration environment in a cloud context. Future Gen Comput Syst 55:165–175CrossRef
Zurück zum Zitat Pitchai R, Jayashri S, Raja J (2016) Searchable encrypted data file sharing method using public cloud service for secure storage in cloud computing. J Wirel Pers Commun 90(2):947–960CrossRef Pitchai R, Jayashri S, Raja J (2016) Searchable encrypted data file sharing method using public cloud service for secure storage in cloud computing. J Wirel Pers Commun 90(2):947–960CrossRef
Zurück zum Zitat Sridhar S, Smys S (2016) A hybrid multilevel authentication scheme for private cloud environment. In: 2016 10th international conference on intelligent systems and control (ISCO). IEEE, pp 1–5 Sridhar S, Smys S (2016) A hybrid multilevel authentication scheme for private cloud environment. In: 2016 10th international conference on intelligent systems and control (ISCO). IEEE, pp 1–5
Zurück zum Zitat Srinivas J, Reddy KVS, Qyser AM (2012) Cloud computing basics. Int J Adv Res Comput Commun Eng 1:343–347 Srinivas J, Reddy KVS, Qyser AM (2012) Cloud computing basics. Int J Adv Res Comput Commun Eng 1:343–347
Zurück zum Zitat Talib AM, Atan R, Abdullah R, Murad MAA (2012) Ensuring security and availability of cloud data storage using multi agent system architecture. In: Lukose D, Ahmad AR, Suliman A (eds) Knowledge technology, vol 295. Communications in computer and information science. Springer, BerlinCrossRef Talib AM, Atan R, Abdullah R, Murad MAA (2012) Ensuring security and availability of cloud data storage using multi agent system architecture. In: Lukose D, Ahmad AR, Suliman A (eds) Knowledge technology, vol 295. Communications in computer and information science. Springer, BerlinCrossRef
Zurück zum Zitat Wang H, He D, Tang S (2016) Identity-based proxy-oriented data uploading and remote data integrity checking in public cloud. IEEE Trans Inf Forensics Secur 11(6):1165–1176CrossRef Wang H, He D, Tang S (2016) Identity-based proxy-oriented data uploading and remote data integrity checking in public cloud. IEEE Trans Inf Forensics Secur 11(6):1165–1176CrossRef
Zurück zum Zitat Wei J, Liu J, Zhang R, Niu X (2016) Efficient dynamic replicated data possession checking in distributed cloud storage systems. Int J Distrib Sensor Netw 12:1894713CrossRef Wei J, Liu J, Zhang R, Niu X (2016) Efficient dynamic replicated data possession checking in distributed cloud storage systems. Int J Distrib Sensor Netw 12:1894713CrossRef
Zurück zum Zitat Zhang Y, Ni J, Tao X, Wang Y, Yong Y (2016) Provable multiple replication data possession with full dynamics for secure cloud storage. Concurr Comput Pract Exp 28(4):1161–1173CrossRef Zhang Y, Ni J, Tao X, Wang Y, Yong Y (2016) Provable multiple replication data possession with full dynamics for secure cloud storage. Concurr Comput Pract Exp 28(4):1161–1173CrossRef
Metadaten
Titel
Prediction of availability and integrity of cloud data using soft computing technique
verfasst von
R. Pitchai
S. Babu
P. Supraja
S. Anjanayya
Publikationsdatum
23.04.2019
Verlag
Springer Berlin Heidelberg
Erschienen in
Soft Computing / Ausgabe 18/2019
Print ISSN: 1432-7643
Elektronische ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-019-04008-0

Weitere Artikel der Ausgabe 18/2019

Soft Computing 18/2019 Zur Ausgabe