IJMECS Vol. 6, No. 12, 8 Dec. 2014
Cover page and Table of Contents: PDF (size: 563KB)
Full Text (PDF, 563KB), PP.26-33
Views: 0 Downloads: 0
Information Interpretation Code, Cloud Services, Security Level, Multi-server Information, Verifier, Data Integrity.
Data security is one of the biggest concerns in cloud computing environment. Although the advantages of storing data in cloud computing environment is extremely high, there arises a problem related to data missing. CyberLiveApp (CLA) supports secure application development between multiple users, even though cloud users distinguish their vision privileges during storing of data. But CyberLiveApp failed to integrate the system with certain cloud-based computing environments on multi-server. Environmental Decision Support Systems (EDSS) move away the technical load and focus mainly on decision-making activities. EDDS does not have a secure collaborative decision-making experience on cloud services. To integrate the security level for multi-server cloud infrastructure, Information Interpretation Code on Multi-Server (IICM-S) is proposed in this paper. To ensure the information with relevance to security on cloud-based computing environments, Information Interpretation Code (IIC) algorithm is initially developed. Thus, IIC guarantee that all information pertaining to cloud is in secured condition in order to prove the trustworthiness of data. In addition, the multi-sever cloud infrastructure in IIC provides access point for secure information recovery from cloud data server. The multi-server cloud infrastructure with IIC algorithm performs the recovery task on multi-server cloud infrastructure. The Multi-server Information (MI) scheme measures the integrity level with effective data recovery process. The integrity level on multi-server cloud infrastructure is ensured using two components, verifier and verify shifter. MI scheme proficiently check integrity using these two components so that not only the data integrity is provided as well as security is ensured in all cases using IICM-S. Experiment is conducted in the Cloudsim platform on the factors such as average integration time on multi-server, security level, recovery efficiency level.
Sathiya Moorthy Srinivsan, Chandrasekar Chaillah,"Information Interpretation Code For Providing Secure Data Integrity On Multi-Server Cloud Infrastructure", International Journal of Modern Education and Computer Science (IJMECS), vol.6, no.12, pp. 26-33, 2014. DOI:10.5815/ijmecs.2014.12.04
[1]Jianxin Li., Yu Jia., Lu Liu., Tianyu Woa., “CyberLiveApp: A secure sharing and migration approach for live virtual desktop applications in a cloud environment,” Future Generation Computer Systems., Elsevier Journal., 2013.
[2]Alexander Sun., “Enabling collaborative decision-making in watershed management using cloud-computing services,” Environmental Modeling & Software., Elsevier Journal., 2013.
[3]Smitha Sundareswaran, Anna C. Squicciarini, and Dan Lin,” Ensuring Distributed Accountability for Data Sharing in the Cloud”, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 9, NO. 4, JULY/AUGUST 2012.
[4]Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Mengyang Yu,” Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage”, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, Sep 2012.
[5]Olivier Beaumont, Lionel Eyraud-Dubois and Hejer Rejeb,” Heterogeneous Resource Allocation under Degree Constraints”, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, Oct 2012.
[6]Ming Li, Shucheng Yu, Yao Zheng, Kui Ren, and Wenjing Lou,” Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption”, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS VOL. X10, NO. 12, Oct 2012.
[7]Cong Wang, Kui Ren, Jia Wang, and Qian Wang,” Harnessing the Cloud for Securely Outsourcing Large-scale Systems of Linear Equations”, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, Oct 2012.
[8]Yang Tang, Patrick P. C. Lee, John C. S. Lui, Radia Perlman,” Secure Overlay Cloud Storage with Access Control and Assured Deletion”, IEEE TRANSACTIONS ON DEPEDABLE AND SECURE COMPUTING, Sep 2012.
[9]Vivek Nallur, Rami Bahsoon,” A Decentralized Self-Adaptation Mechanism For Service-Based Applications in The Cloud”, IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, Mar 2012.
[10]Zhiguo Wan, Jun’e Liu, and Robert H. Deng,” HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing”, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 7, NO. 2, APRIL 2012.
[11]Qian Wang, Cong Wang, Kui Ren, Wenjing Lou and Jin Li,” Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing”, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 22, NO. 5, MAY 2011.
[12]Yan Zhu, Hongxin Huc, Gail-Joon Ahnc, Stephen S. Yauc,” Efficient audit service outsourcing for data integrity in clouds”, The Journal of Systems and Software,Elsevier, Dec 2011.
[13]Nancy J. King, V.T. Raja,” Protecting the privacy and security of sensitive customer data in the cloud”, computer law & security review, Elsevier, Feb 2012.
[14]Dimitrios Zissis, Dimitrios Lekkas,” Addressing cloud computing security issues”, Future Generation Computer Systems, Feb 2012.
[15]Danan Thilakanathan, Shiping Chen, Surya Nepal and Rafael A. Calvo,” Secure Data Sharing in the Cloud”, Springer Jan 2014.
[16]Said Nabi, M. N. A. Khan,” An Analysis of Application Level Security in Service Oriented Architecture”, I.J. Modern Education and Computer Science, Feb 2014.
[17]Muhammad Fahad Khan, Mirza Ahsan Ullah, Aziz-ur-Rehman,” An Approach Towards Customized Multi-Tenancy”, I.J.Modern Education and Computer Science, Sep 2012.
[18]Ashraf Zia, M.N.A. Khan,” A Scheme to Reduce Response Time in Cloud Computing Environment” I.J.Modern Education and Computer Science, July 2013.