Sie sind auf Seite 1von 9

International Journal of Printing, Packaging & Allied Sciences, Vol. 4, No.

1, December 2016 571

An Efficient Security MultiSky Model in


Cloud Environment
S. Sridharan and A. Arokiasamy

Abstract--- Cloud computing has become an important tool in the provisioning of computing resources due to its
flexible and proven reliability. Security and performance are the two important metrics in single cloud platform, But
the growth in cloud services have also increased bottlenecks and security risks due to potential problems such as
service availability failure and the possibility that there are malicious insiders in the single cloud affects the level of
performance through the threats that influence the performance of parts of the single cloud platform. In this paper
security related issues in the single cloud platform can be solved by Single-inter-Cloud mechanism called MultiSky
Cloud Model. We identify various security parameters such as data integrity, data consistency and data availability
that are practically relevant for addressing the requirements. The effort in this paper broadens the notion of cloud
security monitoring and provides a methodical practical approach to solving a security related issue.

Keywords--- Cloud Security, Single-Inter-Cloud Data Integrity, Data Availability, Consistency, MultiSky Cloud
Model.

I. INTRODUCTION
Cloud computing is a new technology which describes the collection of information as the development of
distributed computing derives from distributed systems, networks and distributed databases. If we want to analyze
the term computerized networks, we say that they are collection of networks to identify the geographical areas and
are connected together by a mediator like hub. However, computerized networks are a term which indicates that the
group of devices is connected through the exchange of information. Distributed computing is a technology which
links the devices together individually across geographical areas that constitute a single environment and share the
resource. All the devices are connected together to implement several jobs. The cloud develops with the progress of
the public and private Internet, because the cloud capabilities are limited in order to provide security on the basis of
performance. Most of the software industries that seek to take advantage of cloud services like Iaas, Paas, Saas
follow the protocol related to the security issues in cloud security and performance on the other hand, for it
renounces its security through contact on public cloud services in which case default resources are obtained, and this
exposes the enterprise content and data to identify the weakness of the internet. Various issues in the single cloud
platform can be identified such as privacy, security, latency, reliability availability and integrity. Both public and
private service internet based threats and attacks can be identified in the single cloud platform. And also it can be
address privacy and security issues as a matter of high and urgent priority. Data availability failure and the
possibility that there are malicious insiders in the single cloud platform.

S. Sridharan, Assistant Professor, Dept of CSE, University College of Engineering, Thirukkuvalai, Tamilnadu, India.
A. Arokiasamy, Professor, Dept of CSE, E.G.S.Pillay Engineering College, Nagappattinam.

ISSN 2320-4387 | EDITOR IJPPAS


International Journal of Printing, Packaging & Allied Sciences, Vol. 4, No. 1, December 2016 572

In order to avoid these types of attacks and providing secure environment in the cloud platform we propose an
effective and flexible single Inter cloud model called with explicit dynamic data support to ensure the correctness of
users data in the cloud. Single Inter cloud platform prevents the malicious types of attacks and to improve the better
read performance in the data storage cloud platform minimizing the data corruptions reduced hardware and
maintenance cost, accessibility around the world, and flexibility can be improved in the systems. Single -inter cloud
deals with the integrity which comprises of originality of the information can be maintained as well as cloud service
availability ensures the security of their customers data and should be responsible if any security risk affects their
customers service infrastructure.

Further, the paper flow is organized as, the proposed system based related work is narrated. The next part
describes about the Security-requirements with MultiSky Cloud, which is the proposed system. The next section
describes the MultiSky Cloud algorithm. The next section presents the proposed framework security model with
comparison of different cloud security parameters. The last section pointed out the analysis and concludes this work.

II. RELATED WORKS


To advance cloud computing, the community must take active measures to ensure security. A movement exists
to adopt universal standards (for example, open source) to ensure interoperability among service providers. Included
in this effort are attempts to develop security standards to ensure data consistency. Even though the community there
is several existing works in the area of cloud security. Although, our work include a systematic literature review of
the single cloud platform. It also cloud components in order to identify and respond to various types of threats and
vulnerabilities within a cloud service. Security monitoring in the cloud systems incorporate various analysis of data
in the cloud provide relevant data output which can be correlated and analyzed. Single cloud architecture exclusively
utilizes the dynamicity of cloud properties and collects irrelevant data in accordance with pre-established metrics,
rules and policies through a broad range of security systems. These security systems, fault to identify such as
intrusion detection/prevention systems, firewalls, and other solutions to prevent the cloud systems from the various
types of unwanted attacks. To successfully strengthen transparency, visibility and eliminate uncertainty surrounding
cloud services .focuses on cloud security monitoring by the way of Single-Inter-Cloud architecture.

Security is an essential property of every information technology environment including cloud systems, which
plays an important role of ensuring the protection of information from a wide range of threats within the context of
information systems, security requirements could be described as a subset of nonfunctional requirements that relates
to ensuring the confidentiality, integrity and availability of cloud services. Confidentiality deals with providing
assurance that a cloud services is not accessed or disclosed to unauthorized processes, systems or persons. Integrity
involves the originality of the information with the assurances of preventing unauthorized systems, processes or
persons to modify create or delete an originality of the information. Availability on the other hand is concerned with
ensuring the ability of users and applications to access cloud services at any time and in the available format. These
security requirements constitute the inherent expectations that must be met. We intend to use the concepts of
confidentiality, integrity and availability in classifying user security requirements and the ways in which monitoring
systems fulfill them.

ISSN 2320-4387 | EDITOR IJPPAS


International Journal of Printing, Packaging & Allied Sciences, Vol. 4, No. 1, December 2016 573

III. MULTISKY MODEL


Recent developments of cloud computing have materialized a concrete platform for rapid realization of the
service-oriented computing paradigm single - inter cloud provides the model of MultiSky where multiple cloud
service providers connected to their clients. Basic problem that needs to be addressed in the cloud for storing data is
to guarantee protection from unauthorized entity (i.e., confidentiality, integrity, and availability) to the stored data in
the single cloud can be addressed by MultiSky with current solutions; users typically need to completely trust the
cloud providers. In fact, although cloud providers apply security measure parameters to the services they offer, such
measures allow them to have full access to the content of data. For instance, Google, Amazon(EC2) or IBM support
encryption of the data both in transit and in storage but they also manage the encryption keys, and therefore users do
not have direct control on who can access their data. Whenever data confidentiality needs to be guaranteed in
MultiSky Platform by various types of encryption and decryption standards .The design principle of Single-Inter-
Cloud in the multisky model have no trust on individual cloud providers but it is a distributed trust environment can
be built by using multiple clouds. Storage level clouds are used to store the cloud data frequently, so there are no
duplication types of protocols can be used at the server side. Every data in the MultiSky model can be updatable
replication protocols for maintaining consistency in the cloud platform. . The MultiSky system model contains three
parts: readers, writers, and cloud storage providers, where readers and writers are the clients tasks. Readers and
writers can update their information frequently.

MultiSky cloud model performs of two types of operation in cloud namely Read and Write operation. In Read
operation client requests the cloud model to read the data content from the disk and write operation performs to
write the data content to the disk. Nclient model will generates of 2N Cloud models. Here both read and write
operations uses Meta data for data consistency. State model of MultiSky cloud represents the transitions from client
to the MultiSky by invoking both read and write operations. The client initiates the connection by sending the meta
data to the MultiSky cloud with the attachment of sequence numbers. Sequence numbers to verify the correctness of
the data in the integer format. Server replies to the client by ACK signal with the reference number, same way write
operations also invoked.

Fig. 1: MultiSky Cloud

ISSN 2320-4387 | EDITOR IJPPAS


International Journal of Printing, Packaging & Allied Sciences, Vol. 4, No. 1, December 2016 574

Fig. 2: State diagram of MultiSky model

Security Algorithms for Multisky Model


MultiSky Cloud generates its own encryption algorithm. It uses a variable key length of 1 to n to initialize a state
table of n bytes. State table is initialized in the form of array matrix. So the array is used for generating pseudo-
random key bytes and then pseudo-random stream with S-box values used in encryption algorithm. The key setup
and key generation is performed for every new key to generate unique key operations. MultiSky model consists of
three step operations

1. MultiSky Key set up


2. MultiSky Key generation
3. Encrypted data block to produce decrypted data.

1. MultiSky Key Setup


1. S-Box arrays are initialized. It contains linear number such as such as S0=0, S1=1, S2=2Sn=n
2. Select variable i, j as zero,
3. Calculate j= ( j + S[i]) mod n,
4. Swap S[i], S[j],
5. Increment i by 1 i.e. i=i+1,
6. If I <n goto step c else end.

2. MultiSky Key Generation


1. S[i] is the modified S-Box during key set up phase.
2. Select variable i, j as zero,
3. Calculate length of encrypted data such that
MultiSkylen = length (encrypted data),
4. Calculate i= ( i+1 ) mod n
j= ( j + S[i] ) mod n
5. Swap S[i], S[j],

ISSN 2320-4387 | EDITOR IJPPAS


International Journal of Printing, Packaging & Allied Sciences, Vol. 4, No. 1, December 2016 575

6. Calculate Key as
Key = S[ ( S[i] + S[j] ) mod n]
7. Decrease plaintext length by 1 i.e.
MultiSkylen = MultiSkylen -1
8. If MultiSkylen> 0 goto step d else end.

3. Encrypt Data Block Using MultiSky Cloud


Encrypted data XOR with Key to produce decrypted data

Fig. 3: Security Algorithms Implementation

IV. PROPOSED SECURITY FRAMEWORK


Step 1: Upon successful authentication of the client by server, the data is encrypted using a MultiSky algorithm
to generate decrypted data.

Step 2: Data can be fetched and check whether the data performs Read or Write operation, if its true then goto
the next step else for check the condition again

Step 3: S-box setup can be initialized and to check n numbers will generates random key.

Step 4: Apply Data encryption techniques of MultiSky Cloud to generates encrypted data

Step 5: Apply the reverse process .i.e. the whole string is decrypted at receiver end by the recipient private key
and the required MultiSky key is obtained on decryption.

Step 6: Original message is decrypted using MultiSky encryption algorithm, then the validation and verification
of the sender is done.

ISSN 2320-4387 | EDITOR IJPPAS


International Journal of Printing, Packaging & Allied Sciences, Vol. 4, No. 1, December 2016 576

Step 7: MultiSky Cloud encryption algorithm is used of generating value for checking integrity of the data
availability of data, and consistent of the data

Following were the steps to transfer secure data over clouds with the help of hybrid framework. Proposed
algorithm for Hybrid Framework.

Fig. 4: MultiSky Cloud Security Framework

ISSN 2320-4387 | EDITOR IJPPAS


International Journal of Printing, Packaging & Allied Sciences, Vol. 4, No. 1, December 2016 577

V. COMPARISON OF SECURITY PARAMETERS IN MULTISKY CLOUD


Data Integrity: The data stored in the cloud may suffer from damage during transition operations from or to the
cloud storage provider. The Results the marginal improvement in the MultiSky model when compared to the other
models.

Data Availability: Data availability is a term used by some computer storage manufacturers and storage service
providers (SSPs) to describe products and services that ensure that data continues to be available at a required level
.Continual improvement of 33% can be achieved at the MultiSky model.

Data Consistency: Data consistency means that data values are the same for all instances of an application. This
data belongs together and describes a specific process at a specific time, meaning that the data is not changed during
the execution of the process. Consistency can be maintained by the MultiSky model.

Data Consistency Data Availabilty Data Integrity

33% 34%

33%

Fig. 5: Comparison of Security Parameters

VI. RESULTS
The highest average scores were the different hybrid models shown in FIGS 6, which offer savings over Cloud
services while retaining adequate levels of security for many. The highest average scoring of the four types of
Cloud Computing is the MultiSky Cloud model, where the sharing of resources with other users is maximum when
compared to the others. The least standard deviation scoring of the four types of cloud computing is the Public cloud
model.

Table 1: Comparison between Cloud Service Models

ISSN 2320-4387 | EDITOR IJPPAS


International Journal of Printing, Packaging & Allied Sciences, Vol. 4, No. 1, December 2016 578

16
14
12
10
8 Data Integrity
6 Data Availabilty
4 Data Consistency
2
0
Public Cloud Private Cloud Single Cloud MultiSky
Cloud

Fig. 6: Comparison Cloud Service Model

VII. CONCLUSION
The use of cloud computing has rapidly increased; cloud computing security is still considered the major issue in
the cloud computing environment. Customers do not want to lose their private information as a result of malicious
insiders in the cloud. In addition, the loss of service availability has caused many problems for a large number of
customers recently. We support the migration to MultiSky Cloud model due to its ability to decrease security risks
that affect the cloud computing user and maximizing the security parameters of data availability, data consistency
and data integrity.

REFERENCES
[1] http://www.nist.gov/itl/cloud/.
[2] I. Abraham, G. Chockler, I. Keidar and D. Malkhi, Byzantine disk paxos: optimal resilience with
Byzantineshared memory, Distributed Computing, Vol. 18, No. 5, Pp. 387-408, 2006.
[3] H. Abu-Libdeh, L. Princehouse and H. Weatherspoon, RACS: a case for cloud storage diversity, Proc.
1st ACM symposium on Cloud computing, Pp. 229-240, 2010.
[4] D. Agrawal, A. El Abbadi, F. Emekci and A. Metwally, Database Management as a Service: Challenges
and Opportunities, 25thIntl. Conf. on Data Engineering, Pp. 1709-1716, 2009.
[5] M.A. AlZain and E. Pardede, Using Multi Shares for Ensuring Privacy in Database-as-a-Service, 44th
Hawaii Intl. Conf. on System Sciences (HICSS), Pp. 1-9, 2011.
[6] Amazon, Amazon Web Services, Web services licensing agreement, 2006.
[7] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson and D. Song, Provable data
possession at untrusted stores, Proceedings of the 14th ACM conference on Computer and
communications security, Pp. 598-609, 2007.
[8] https://www.reference.com/technology/data-consistency-58b028890c673b3c
[9] www.trendmicro.com/cloudcontent/us/pdfs/business/white-papers/wp-hybrid-cloud-analysts
[10] www.security.com/content/hybrid-cloud-its-not-secure-you-think
[11] http://it candor.net/2010/11/22 cloud-computing benefits-q410/
[12] Niloofar Khanghahi and Reza Ravanmehr, Cloud Computing Performance Evaluation: Issues And
Challenges, International Journal on Cloud Computing: Services and Architecture (IJCCSA), Vol.3, No.5,
Pp. 29-41, 2013.
[13] Shailesh Paliwal, Performance Challenges in Cloud Computing, 2014. https://www.cmg.org
[14] A.K. Bardsiri and S.M. Hashem, QoS Metrics for Cloud Computing Services Evaluation, International
Journal of Intelligent Systems and Applications, Vol. 6, No. 12, Pp. 27-33, 2014.

ISSN 2320-4387 | EDITOR IJPPAS


International Journal of Printing, Packaging & Allied Sciences, Vol. 4, No. 1, December 2016 579

[15] Elisabeth Stahl and Lydia Duijvestijn and others, Performance Implications of Cloud Computing, 2012.
ibm.com/Redbooks.
[16] D. Ardagna, G. Casale, M. Ciavotta, J.F. Prez and W. Wang, Quality-of-service in cloud computing:
modeling techniques and their applications, Journal of Internet Services and Applications, Vol.5, No. 1,
2014.
[17] Technical Report ,CLOUD; SLAs for Cloud services, ETSI TR 103 125 V1.1.1, 2012.
http://www.etsi.org/
[18] Cloud computing in higher education a guide to evaluation and adopting-Cisco 2010.
https://www.cisco.com/web/strategy/docs/education/Cloud_Computing_in_Higher_Education.pdf
[19] S. Radack, Cloud computing: a review of features, benefits, and risks, and recommendations for secure,
efficient implementations, National Institute of Standards and Technology, 2012.
[20] A. Reeve, Managing Data in Motion: Data Integration Best Practice Techniques, Newnes, 2013.
[21] N. Lutade, A. Kolhe and A. Dhok, A Survey on Scalable Data Security and Load Balancing in Multi
Cloud Environment, International Journal for Innovative Research in Science and Technology, Vol. 1,
No.8, Pp. 232-236, 2015.
[22] S. Sreedharan and G.Kalpana, Security Issues and Solutions for Cloud Computing, International Journal
of Computer Trends and Technology (IJCTT), Vol.4, No.4, Pp. 494-498, 2013.
[23] N. Kshetri, Privacy and security issues in cloud computing: The role of institutions and institutional
evolution, Telecommunications Policy, Vol. 37, No. 4, Pp. 372-386, 2013.
[24] Stefan Frey, Claudia Luthje, and Christoph Reich, Key Performance Indicators for Cloud Computing
SLAs, The Fifth International Conference on Emerging Network Intelligence, Pp. 60-64, 2013.

ISSN 2320-4387 | EDITOR IJPPAS

Das könnte Ihnen auch gefallen