Beruflich Dokumente
Kultur Dokumente
Abstract--- Cloud computing has become an important tool in the provisioning of computing resources due to its
flexible and proven reliability. Security and performance are the two important metrics in single cloud platform, But
the growth in cloud services have also increased bottlenecks and security risks due to potential problems such as
service availability failure and the possibility that there are malicious insiders in the single cloud affects the level of
performance through the threats that influence the performance of parts of the single cloud platform. In this paper
security related issues in the single cloud platform can be solved by Single-inter-Cloud mechanism called MultiSky
Cloud Model. We identify various security parameters such as data integrity, data consistency and data availability
that are practically relevant for addressing the requirements. The effort in this paper broadens the notion of cloud
security monitoring and provides a methodical practical approach to solving a security related issue.
Keywords--- Cloud Security, Single-Inter-Cloud Data Integrity, Data Availability, Consistency, MultiSky Cloud
Model.
I. INTRODUCTION
Cloud computing is a new technology which describes the collection of information as the development of
distributed computing derives from distributed systems, networks and distributed databases. If we want to analyze
the term computerized networks, we say that they are collection of networks to identify the geographical areas and
are connected together by a mediator like hub. However, computerized networks are a term which indicates that the
group of devices is connected through the exchange of information. Distributed computing is a technology which
links the devices together individually across geographical areas that constitute a single environment and share the
resource. All the devices are connected together to implement several jobs. The cloud develops with the progress of
the public and private Internet, because the cloud capabilities are limited in order to provide security on the basis of
performance. Most of the software industries that seek to take advantage of cloud services like Iaas, Paas, Saas
follow the protocol related to the security issues in cloud security and performance on the other hand, for it
renounces its security through contact on public cloud services in which case default resources are obtained, and this
exposes the enterprise content and data to identify the weakness of the internet. Various issues in the single cloud
platform can be identified such as privacy, security, latency, reliability availability and integrity. Both public and
private service internet based threats and attacks can be identified in the single cloud platform. And also it can be
address privacy and security issues as a matter of high and urgent priority. Data availability failure and the
possibility that there are malicious insiders in the single cloud platform.
S. Sridharan, Assistant Professor, Dept of CSE, University College of Engineering, Thirukkuvalai, Tamilnadu, India.
A. Arokiasamy, Professor, Dept of CSE, E.G.S.Pillay Engineering College, Nagappattinam.
In order to avoid these types of attacks and providing secure environment in the cloud platform we propose an
effective and flexible single Inter cloud model called with explicit dynamic data support to ensure the correctness of
users data in the cloud. Single Inter cloud platform prevents the malicious types of attacks and to improve the better
read performance in the data storage cloud platform minimizing the data corruptions reduced hardware and
maintenance cost, accessibility around the world, and flexibility can be improved in the systems. Single -inter cloud
deals with the integrity which comprises of originality of the information can be maintained as well as cloud service
availability ensures the security of their customers data and should be responsible if any security risk affects their
customers service infrastructure.
Further, the paper flow is organized as, the proposed system based related work is narrated. The next part
describes about the Security-requirements with MultiSky Cloud, which is the proposed system. The next section
describes the MultiSky Cloud algorithm. The next section presents the proposed framework security model with
comparison of different cloud security parameters. The last section pointed out the analysis and concludes this work.
Security is an essential property of every information technology environment including cloud systems, which
plays an important role of ensuring the protection of information from a wide range of threats within the context of
information systems, security requirements could be described as a subset of nonfunctional requirements that relates
to ensuring the confidentiality, integrity and availability of cloud services. Confidentiality deals with providing
assurance that a cloud services is not accessed or disclosed to unauthorized processes, systems or persons. Integrity
involves the originality of the information with the assurances of preventing unauthorized systems, processes or
persons to modify create or delete an originality of the information. Availability on the other hand is concerned with
ensuring the ability of users and applications to access cloud services at any time and in the available format. These
security requirements constitute the inherent expectations that must be met. We intend to use the concepts of
confidentiality, integrity and availability in classifying user security requirements and the ways in which monitoring
systems fulfill them.
MultiSky cloud model performs of two types of operation in cloud namely Read and Write operation. In Read
operation client requests the cloud model to read the data content from the disk and write operation performs to
write the data content to the disk. Nclient model will generates of 2N Cloud models. Here both read and write
operations uses Meta data for data consistency. State model of MultiSky cloud represents the transitions from client
to the MultiSky by invoking both read and write operations. The client initiates the connection by sending the meta
data to the MultiSky cloud with the attachment of sequence numbers. Sequence numbers to verify the correctness of
the data in the integer format. Server replies to the client by ACK signal with the reference number, same way write
operations also invoked.
6. Calculate Key as
Key = S[ ( S[i] + S[j] ) mod n]
7. Decrease plaintext length by 1 i.e.
MultiSkylen = MultiSkylen -1
8. If MultiSkylen> 0 goto step d else end.
Step 2: Data can be fetched and check whether the data performs Read or Write operation, if its true then goto
the next step else for check the condition again
Step 3: S-box setup can be initialized and to check n numbers will generates random key.
Step 4: Apply Data encryption techniques of MultiSky Cloud to generates encrypted data
Step 5: Apply the reverse process .i.e. the whole string is decrypted at receiver end by the recipient private key
and the required MultiSky key is obtained on decryption.
Step 6: Original message is decrypted using MultiSky encryption algorithm, then the validation and verification
of the sender is done.
Step 7: MultiSky Cloud encryption algorithm is used of generating value for checking integrity of the data
availability of data, and consistent of the data
Following were the steps to transfer secure data over clouds with the help of hybrid framework. Proposed
algorithm for Hybrid Framework.
Data Availability: Data availability is a term used by some computer storage manufacturers and storage service
providers (SSPs) to describe products and services that ensure that data continues to be available at a required level
.Continual improvement of 33% can be achieved at the MultiSky model.
Data Consistency: Data consistency means that data values are the same for all instances of an application. This
data belongs together and describes a specific process at a specific time, meaning that the data is not changed during
the execution of the process. Consistency can be maintained by the MultiSky model.
33% 34%
33%
VI. RESULTS
The highest average scores were the different hybrid models shown in FIGS 6, which offer savings over Cloud
services while retaining adequate levels of security for many. The highest average scoring of the four types of
Cloud Computing is the MultiSky Cloud model, where the sharing of resources with other users is maximum when
compared to the others. The least standard deviation scoring of the four types of cloud computing is the Public cloud
model.
16
14
12
10
8 Data Integrity
6 Data Availabilty
4 Data Consistency
2
0
Public Cloud Private Cloud Single Cloud MultiSky
Cloud
VII. CONCLUSION
The use of cloud computing has rapidly increased; cloud computing security is still considered the major issue in
the cloud computing environment. Customers do not want to lose their private information as a result of malicious
insiders in the cloud. In addition, the loss of service availability has caused many problems for a large number of
customers recently. We support the migration to MultiSky Cloud model due to its ability to decrease security risks
that affect the cloud computing user and maximizing the security parameters of data availability, data consistency
and data integrity.
REFERENCES
[1] http://www.nist.gov/itl/cloud/.
[2] I. Abraham, G. Chockler, I. Keidar and D. Malkhi, Byzantine disk paxos: optimal resilience with
Byzantineshared memory, Distributed Computing, Vol. 18, No. 5, Pp. 387-408, 2006.
[3] H. Abu-Libdeh, L. Princehouse and H. Weatherspoon, RACS: a case for cloud storage diversity, Proc.
1st ACM symposium on Cloud computing, Pp. 229-240, 2010.
[4] D. Agrawal, A. El Abbadi, F. Emekci and A. Metwally, Database Management as a Service: Challenges
and Opportunities, 25thIntl. Conf. on Data Engineering, Pp. 1709-1716, 2009.
[5] M.A. AlZain and E. Pardede, Using Multi Shares for Ensuring Privacy in Database-as-a-Service, 44th
Hawaii Intl. Conf. on System Sciences (HICSS), Pp. 1-9, 2011.
[6] Amazon, Amazon Web Services, Web services licensing agreement, 2006.
[7] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson and D. Song, Provable data
possession at untrusted stores, Proceedings of the 14th ACM conference on Computer and
communications security, Pp. 598-609, 2007.
[8] https://www.reference.com/technology/data-consistency-58b028890c673b3c
[9] www.trendmicro.com/cloudcontent/us/pdfs/business/white-papers/wp-hybrid-cloud-analysts
[10] www.security.com/content/hybrid-cloud-its-not-secure-you-think
[11] http://it candor.net/2010/11/22 cloud-computing benefits-q410/
[12] Niloofar Khanghahi and Reza Ravanmehr, Cloud Computing Performance Evaluation: Issues And
Challenges, International Journal on Cloud Computing: Services and Architecture (IJCCSA), Vol.3, No.5,
Pp. 29-41, 2013.
[13] Shailesh Paliwal, Performance Challenges in Cloud Computing, 2014. https://www.cmg.org
[14] A.K. Bardsiri and S.M. Hashem, QoS Metrics for Cloud Computing Services Evaluation, International
Journal of Intelligent Systems and Applications, Vol. 6, No. 12, Pp. 27-33, 2014.
[15] Elisabeth Stahl and Lydia Duijvestijn and others, Performance Implications of Cloud Computing, 2012.
ibm.com/Redbooks.
[16] D. Ardagna, G. Casale, M. Ciavotta, J.F. Prez and W. Wang, Quality-of-service in cloud computing:
modeling techniques and their applications, Journal of Internet Services and Applications, Vol.5, No. 1,
2014.
[17] Technical Report ,CLOUD; SLAs for Cloud services, ETSI TR 103 125 V1.1.1, 2012.
http://www.etsi.org/
[18] Cloud computing in higher education a guide to evaluation and adopting-Cisco 2010.
https://www.cisco.com/web/strategy/docs/education/Cloud_Computing_in_Higher_Education.pdf
[19] S. Radack, Cloud computing: a review of features, benefits, and risks, and recommendations for secure,
efficient implementations, National Institute of Standards and Technology, 2012.
[20] A. Reeve, Managing Data in Motion: Data Integration Best Practice Techniques, Newnes, 2013.
[21] N. Lutade, A. Kolhe and A. Dhok, A Survey on Scalable Data Security and Load Balancing in Multi
Cloud Environment, International Journal for Innovative Research in Science and Technology, Vol. 1,
No.8, Pp. 232-236, 2015.
[22] S. Sreedharan and G.Kalpana, Security Issues and Solutions for Cloud Computing, International Journal
of Computer Trends and Technology (IJCTT), Vol.4, No.4, Pp. 494-498, 2013.
[23] N. Kshetri, Privacy and security issues in cloud computing: The role of institutions and institutional
evolution, Telecommunications Policy, Vol. 37, No. 4, Pp. 372-386, 2013.
[24] Stefan Frey, Claudia Luthje, and Christoph Reich, Key Performance Indicators for Cloud Computing
SLAs, The Fifth International Conference on Emerging Network Intelligence, Pp. 60-64, 2013.