Skip to main content
Erschienen in: Cluster Computing 6/2019

15.03.2018

Efficient data integrity and data replication in cloud using stochastic diffusion method

verfasst von: M. Ramanan, P. Vivekanandan

Erschienen in: Cluster Computing | Sonderheft 6/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cloud computing will provide scalable computing as well as storage resources where more data intensive applications will be developed in a computing environment. Owing to the existence of such security threats in the cloud, several mechanisms are being proposed for allowing the users to audit the integrity of data along with the public key of the owner of the data even before making use of the cloud data. Replicating of data in cloud servers through multiple data centers offers better availability, scalability, and durability. The correctness of choice of the right type of public key of the previous mechanisms is based on the security of the public key infrastructure (PKI). Although traditional PKI has been widely used in the construction of public key cryptography, it still faces many security risks, especially in the aspect of managing certificates. There are different applications having different types of quality of service (QoS) needs. In order to support the QoS requirement continuously, the application of such data corruption for this work will be an efficient integrity of data replication that makes use of a stochastic diffusion search (SDS) algorithm that has been proposed. This SDS is that technique of a multi-agent global optimisation which has been based on the behaviour of ants that has been rooted in the partial evaluation of that of an objective function along with direct communication among agents. The proposed SDS algorithm will minimize the replication cost of data. The results of these experiments have shown that the mechanism will be able to demonstrate the effectiveness of this proposed algorithm which is in the replication of data as well as its recovery. The proposed method when appropriately compared with the cost effective replication of dynamic data given by Li et al. proves that the average recovery time is less by 18.18% for the 250 number of requested nodes, by 14.28% for the 500 number of requested nodes, by 11.11% for the 750 number of requested nodes and by 8.69% for the 1000 number of requested nodes.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Jouini, M., Rabai, L.B.A.: A security framework for secure cloud computing environments. Int. J. Cloud Appl. Comput. 6(3), 32–44 (2016) Jouini, M., Rabai, L.B.A.: A security framework for secure cloud computing environments. Int. J. Cloud Appl. Comput. 6(3), 32–44 (2016)
2.
Zurück zum Zitat Zunnurhain, K., Vrbsky, S. V.: Security in cloud computing. In: Proceedings of the 2011 International Conference on Security and Management (2011) Zunnurhain, K., Vrbsky, S. V.: Security in cloud computing. In: Proceedings of the 2011 International Conference on Security and Management (2011)
3.
Zurück zum Zitat Hussein, M.K., Mousa, M.H.: A light-weight data replication for cloud data centers environment. Int. J. Eng. Innov. Technol. 1(6), 169–175 (2012) Hussein, M.K., Mousa, M.H.: A light-weight data replication for cloud data centers environment. Int. J. Eng. Innov. Technol. 1(6), 169–175 (2012)
4.
Zurück zum Zitat Boru, D., Kliazovich, D., Granelli, F., Bouvry, P., Zomaya, A.Y.: Energy-efficient data replication in cloud computing datacenters. Clust. Comput. 18(1), 385–402 (2015)CrossRef Boru, D., Kliazovich, D., Granelli, F., Bouvry, P., Zomaya, A.Y.: Energy-efficient data replication in cloud computing datacenters. Clust. Comput. 18(1), 385–402 (2015)CrossRef
5.
Zurück zum Zitat Liu, C.W., Hsien, W.F., Yang, C.C., Hwang, M.S.: A survey of public auditing for shared data storage with user revocation in cloud computing. IJ Netw. Secur. 18(4), 650–666 (2016) Liu, C.W., Hsien, W.F., Yang, C.C., Hwang, M.S.: A survey of public auditing for shared data storage with user revocation in cloud computing. IJ Netw. Secur. 18(4), 650–666 (2016)
6.
Zurück zum Zitat Zhang, J., Dong, Q.: Efficient ID-based public auditing for the outsourced data in cloud storage. Inf. Sci. 343, 1–14 (2016)MathSciNet Zhang, J., Dong, Q.: Efficient ID-based public auditing for the outsourced data in cloud storage. Inf. Sci. 343, 1–14 (2016)MathSciNet
7.
Zurück zum Zitat Zhang, Y., Xu, C., Li, H., Liang, X.: Cryptographic public verification of data integrity for cloud storage systems. IEEE Cloud Comput. 3(5), 44–52 (2016)CrossRef Zhang, Y., Xu, C., Li, H., Liang, X.: Cryptographic public verification of data integrity for cloud storage systems. IEEE Cloud Comput. 3(5), 44–52 (2016)CrossRef
8.
Zurück zum Zitat Darwazeh, N.S., Al-Qassas, R.S., AlDosari, F.: A secure cloud computing model based on data classification. Proc. Comput. Sci. 52, 1153–1158 (2015)CrossRef Darwazeh, N.S., Al-Qassas, R.S., AlDosari, F.: A secure cloud computing model based on data classification. Proc. Comput. Sci. 52, 1153–1158 (2015)CrossRef
9.
Zurück zum Zitat Fabian, B., Ermakova, T., Junghanns, P.: Collaborative and secure sharing of healthcare data in multi-clouds. Inf. Syst. 48, 132–150 (2015)CrossRef Fabian, B., Ermakova, T., Junghanns, P.: Collaborative and secure sharing of healthcare data in multi-clouds. Inf. Syst. 48, 132–150 (2015)CrossRef
10.
Zurück zum Zitat Jiang, T., Chen, X., Ma, J.: Public integrity auditing for shared dynamic cloud data with group user revocation. IEEE Trans. Comput. 65(8), 2363–2373 (2016)MathSciNetCrossRef Jiang, T., Chen, X., Ma, J.: Public integrity auditing for shared dynamic cloud data with group user revocation. IEEE Trans. Comput. 65(8), 2363–2373 (2016)MathSciNetCrossRef
11.
Zurück zum Zitat Ali, M., Bilal, K., Khan, S., Veeravalli, B., Li, K., Zomaya, A.: DROPS: division and replication of data in the cloud for optimal performance and security. In: IEEE Transactions on Cloud computing (2015) Ali, M., Bilal, K., Khan, S., Veeravalli, B., Li, K., Zomaya, A.: DROPS: division and replication of data in the cloud for optimal performance and security. In: IEEE Transactions on Cloud computing (2015)
12.
Zurück zum Zitat Zhang, Y., Ni, J., Tao, X., Wang, Y., Yu, Y.: Provable multiple replication data possession with full dynamics for secure cloud storage. Concurr. Comput.: Pract. Exp. 28(4), 1161–1173 (2016)CrossRef Zhang, Y., Ni, J., Tao, X., Wang, Y., Yu, Y.: Provable multiple replication data possession with full dynamics for secure cloud storage. Concurr. Comput.: Pract. Exp. 28(4), 1161–1173 (2016)CrossRef
13.
Zurück zum Zitat Gai, K., Qiu, L., Chen, M., Zhao, H., Qiu, M.: SA-EAST: security-aware efficient data transmission for ITS in mobile heterogeneous cloud computing. ACM Trans. Embed. Comput. Syst. 16(2), 60 (2017)CrossRef Gai, K., Qiu, L., Chen, M., Zhao, H., Qiu, M.: SA-EAST: security-aware efficient data transmission for ITS in mobile heterogeneous cloud computing. ACM Trans. Embed. Comput. Syst. 16(2), 60 (2017)CrossRef
14.
Zurück zum Zitat Sookhak, M., Gani, A., Khan, M.K., Buyya, R.: Dynamic remote data auditing for securing big data storage in cloud computing. Inf. Sci. 380, 101–116 (2017)CrossRef Sookhak, M., Gani, A., Khan, M.K., Buyya, R.: Dynamic remote data auditing for securing big data storage in cloud computing. Inf. Sci. 380, 101–116 (2017)CrossRef
15.
Zurück zum Zitat Dashti, S.E., Rahmani, A.M.: Dynamic VMs placement for energy efficiency by PSO in cloud computing. J. Exp. Theor. Artif. Intell. 28(1–2), 97–112 (2016)CrossRef Dashti, S.E., Rahmani, A.M.: Dynamic VMs placement for energy efficiency by PSO in cloud computing. J. Exp. Theor. Artif. Intell. 28(1–2), 97–112 (2016)CrossRef
16.
Zurück zum Zitat Li, H., Zhu, G., Cui, C., Tang, H., Dou, Y., He, C.: Energy-efficient migration and consolidation algorithm of virtual machines in data centers for cloud computing. Computing 98(3), 303–317 (2016)MathSciNetCrossRef Li, H., Zhu, G., Cui, C., Tang, H., Dou, Y., He, C.: Energy-efficient migration and consolidation algorithm of virtual machines in data centers for cloud computing. Computing 98(3), 303–317 (2016)MathSciNetCrossRef
17.
Zurück zum Zitat Lin, Y.K., Chong, C.S.: Fast GA-based project scheduling for computing resources allocation in a cloud manufacturing system. J. Intell. Manuf. 28(5), 1189–1201 (2017)CrossRef Lin, Y.K., Chong, C.S.: Fast GA-based project scheduling for computing resources allocation in a cloud manufacturing system. J. Intell. Manuf. 28(5), 1189–1201 (2017)CrossRef
18.
Zurück zum Zitat Wang, B., Li, B., Li, H., Li, F.: Certificateless public auditing for data integrity in the cloud. In: 2013 IEEE Conference on Communications and Network Security (CNS), pp. 136–144. IEEE (2013) Wang, B., Li, B., Li, H., Li, F.: Certificateless public auditing for data integrity in the cloud. In: 2013 IEEE Conference on Communications and Network Security (CNS), pp. 136–144. IEEE (2013)
19.
Zurück zum Zitat Williams, H., Bishop, M.: Stochastic diffusion search: a comparison of swarm intelligence parameter estimation algorithms with ransac. Algorithms 7(2), 206–228 (2014)CrossRef Williams, H., Bishop, M.: Stochastic diffusion search: a comparison of swarm intelligence parameter estimation algorithms with ransac. Algorithms 7(2), 206–228 (2014)CrossRef
21.
Zurück zum Zitat Al-Rifaie, M. M., Bishop, M. J., Blackwell, T.: An investigation into the merger of stochastic diffusion search and particle swarm optimisation. In: Proceedings of the 13th annual conference on Genetic and evolutionary computation, pp. 37–44. ACM (2011) Al-Rifaie, M. M., Bishop, M. J., Blackwell, T.: An investigation into the merger of stochastic diffusion search and particle swarm optimisation. In: Proceedings of the 13th annual conference on Genetic and evolutionary computation, pp. 37–44. ACM (2011)
22.
Zurück zum Zitat Lin, J.W., Chen, C.H., Chang, J.M.: QoS-aware data replication for data-intensive applications in cloud computing systems. IEEE Trans. Cloud Comput. 1(1), 101–115 (2013)CrossRef Lin, J.W., Chen, C.H., Chang, J.M.: QoS-aware data replication for data-intensive applications in cloud computing systems. IEEE Trans. Cloud Comput. 1(1), 101–115 (2013)CrossRef
Metadaten
Titel
Efficient data integrity and data replication in cloud using stochastic diffusion method
verfasst von
M. Ramanan
P. Vivekanandan
Publikationsdatum
15.03.2018
Verlag
Springer US
Erschienen in
Cluster Computing / Ausgabe Sonderheft 6/2019
Print ISSN: 1386-7857
Elektronische ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-018-2480-9

Weitere Artikel der Sonderheft 6/2019

Cluster Computing 6/2019 Zur Ausgabe