Volume-6 ~ Issue-1
- Citation
- Abstract
- Reference
- Full PDF
| Paper Type | : | Research Paper |
| Title | : | Secure Model for Cloud Computing Based Storage and Retrieval |
| Country | : | India |
| Authors | : | Yaga Reddemma, Lingala Thirupath2, Sreekanth Gunti |
| : | 10.9790/0661-0610105 ![]() |
|
Abstract:Enterprises protect their internal storage and retrieval process using firewalls and also protect it
from insider attacks by formulating secure data access procedures. If the enterprises are willing to store data in
cloud, cloud computing service providers have to take care of data privacy and security. A common way to
achieve security is encryption/decryption mechanism employed by cloud service providers. However,
performing both tasks such as storage and encryption/decryption mechanism by cloud server causes security
problems as the administrators know the sensitive information and may involve in illegal practices. To
overcome this problem, this paper presents a mechanism where the storage is done by one provider while
encryption/decryption mechanisms are provided by another service provider. In the proposed system the party
that uses cloud storage services must encrypt data before sending it to cloud while the service provider who is
responsible for encryption/decryption must delete data once encryption/decryption process is completed. To
illustrate the proposed mechanism, this paper uses a CRM service example that demonstrates how the parties
involved in secure storage and retrieval when data is saved to cloud. It also provides insights into multi-party
SLAs for the proposed system.
Keywords: SLAs, cloud computing, encryption and decryption, secure storage and retrieval
Keywords: SLAs, cloud computing, encryption and decryption, secure storage and retrieval
[1] A. Weiss, "Computing in the clouds", netWorker, vol. 11, no. 4, pp. 16 -25, December 2007.
[2] C. S. Yeo, S. Venugopal, X. Chu, and R. Buyya, "Autonomic metered pricing for a utility computing service", Future Generation
Computer Systems, vol. 26, issue 8, pp. 1368-1380, October 2010.
[3] M. Baker, R. Buyya, and D. Laforenza, "Grids and grid technologies for wide-area distributed computing," International Journal
of Software: Practice and Experience, vol.32, pp. 1437-1466, 2002.
[4] B. R. Kandukuri, V, R. Paturi and A. Rakshit, "Cloud security issues," in Proceedings of the 2009 IEEE International Conference
on Services Computing, pp. 517-520, September 2009.
[5] R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, and I. Brandic, "Cloud computing and emerging IT platforms: vision, hype, and
reality for delivering computing as the 5th utility," Future Generation Computer Systems, vol. 25, issue 6, pp. 599 -616, June 2008.
[6] R. Sterritt, "Autonomic computing," Innovations in Systems and Software Engineering, vol. 1, no. 1, Springer, pp. 79-88. 2005.
[7] L. M. Vaquero,L. Rodero-Merino,J. Caceres, and M. Lindner, "A break in the clouds: towards a cloud definition," ACM
SIGCOMM Computer Communication Review, vol. 39, no. 1, pp. 50-55, January 2009.
[8] N. Hawthorn, "Finding security in the cloud," Computer Fraud & Security, vol. 2009, issue 10, pp. 19-20, October 2009.
[9] A. Parakh and S. Kak, "Online data storage using implicit security", Information Sciences, vol. 179, issue 19, pp. 3323-3333,
September 2009.
[10] R. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public key cryptosystems",
Communications of the ACM, vol. 21, no. 2, pp.120-126, 1978.
[2] C. S. Yeo, S. Venugopal, X. Chu, and R. Buyya, "Autonomic metered pricing for a utility computing service", Future Generation
Computer Systems, vol. 26, issue 8, pp. 1368-1380, October 2010.
[3] M. Baker, R. Buyya, and D. Laforenza, "Grids and grid technologies for wide-area distributed computing," International Journal
of Software: Practice and Experience, vol.32, pp. 1437-1466, 2002.
[4] B. R. Kandukuri, V, R. Paturi and A. Rakshit, "Cloud security issues," in Proceedings of the 2009 IEEE International Conference
on Services Computing, pp. 517-520, September 2009.
[5] R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, and I. Brandic, "Cloud computing and emerging IT platforms: vision, hype, and
reality for delivering computing as the 5th utility," Future Generation Computer Systems, vol. 25, issue 6, pp. 599 -616, June 2008.
[6] R. Sterritt, "Autonomic computing," Innovations in Systems and Software Engineering, vol. 1, no. 1, Springer, pp. 79-88. 2005.
[7] L. M. Vaquero,L. Rodero-Merino,J. Caceres, and M. Lindner, "A break in the clouds: towards a cloud definition," ACM
SIGCOMM Computer Communication Review, vol. 39, no. 1, pp. 50-55, January 2009.
[8] N. Hawthorn, "Finding security in the cloud," Computer Fraud & Security, vol. 2009, issue 10, pp. 19-20, October 2009.
[9] A. Parakh and S. Kak, "Online data storage using implicit security", Information Sciences, vol. 179, issue 19, pp. 3323-3333,
September 2009.
[10] R. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public key cryptosystems",
Communications of the ACM, vol. 21, no. 2, pp.120-126, 1978.
- Citation
- Abstract
- Reference
- Full PDF
Abstract:IT has moved into next generation with cloud computing being realized. The way application
software and databases are stored has been changed. Now they are stored in cloud data centers in which
security is a concern from client point of view. The new phenomenon which is used to store and manage data
without capital investment has brought many security challenges which are not thoroughly understood. This
paper focuses on the security and integrity of data stored in cloud data servers. The data integrity verification is
done by using a third party auditor who is authorized to check integrity of data periodically on behalf of client.
The client of the data gets notifications from third party auditor when data integrity is lost. Not only verification
of data integrity, the proposed system also supports data dynamics. The work that has been done in this line
lacks data dynamics and true public auditability. The auditing task monitors data modifications, insertions and
deletions. The proposed system is capable of supporting both public auditability and data dynamics. The review
of literature has revealed the problems with existing systems and that is the motivation behind taking up this
work. Merkle Hash Tree is used to improve block level authentication. In order to handle auditing tasks
simultaneously, bilinear aggregate signature is used. This enables TPA to perform auditing concurrently for
multiple clients. The experiments reveal that the proposed system is very efficient and also secure.
Keywords - Cloud computing, public audit ability, cloud storage, cloud service provider
Keywords - Cloud computing, public audit ability, cloud storage, cloud service provider
[1] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z.Peterson, and D. Song, "Provable Data Possession at
UntrustedStores," Proc. 14th ACM Conf. Computer and Comm. Security (CCS'07), pp. 598-609, 2007.
[2] A. Juels and B.S. Kaliski Jr., "Pors: Proofs of Retrievability forLarge Files," Proc. 14th ACM Conf. Computer and Comm.
Security(CCS '07), pp. 584-597, 2007.
[3] H. Shacham and B. Waters, "Compact Proofs of Retrievability,"Proc. 14th Int'l Conf. Theory and Application of Cryptology
andInformation Security: Advances in Cryptology (ASIACRYPT '08),pp. 90-107, 2008.
[4] K.D. Bowers, A. Juels, and A. Oprea, "Proofs of Retrievability:Theory and Implementation," Report 2008/175, Cryptology
ePrintArchive, 2008.
[5] M. Naor and G.N. Rothblum, "The Complexity of Online MemoryChecking," Proc. 46th Ann. IEEE Symp. Foundations of
ComputerScience (FOCS '05), pp. 573-584, 2005.
[6] E.-C. Chang and J. Xu, "Remote Integrity Check with DishonestStorage Server," Proc. 13th European Symp. Research in
ComputerSecurity (ESORICS '08), pp. 223-237, 2008.
[7] M.A. Shah, R. Swaminathan, and M. Baker, "Privacy-PreservingAudit and Extraction of Digital Contents," Report
2008/186,Cryptology ePrint Archive, 2008.
[8] A. Oprea, M.K. Reiter, and K. Yang, "Space-Efficient Block Storage Integrity," Proc. 12th Ann. Network and Distributed System
Security Symp. (NDSS '05), 2005.
[9] T. Schwarz and E.L. Miller, "Store, Forget, and Check: UsingAlgebraic Signatures to Check Remotely Administered
Storage,"Proc. 26th IEEE Int'l Conf. Distributed Computing Systems (ICDCS'06), p. 12, 2006.
[10] Q. Wang, K. Ren, W. Lou, and Y. Zhang, "Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance,"
Proc.IEEE INFOCOM, pp. 954-962, Apr. 2009.
UntrustedStores," Proc. 14th ACM Conf. Computer and Comm. Security (CCS'07), pp. 598-609, 2007.
[2] A. Juels and B.S. Kaliski Jr., "Pors: Proofs of Retrievability forLarge Files," Proc. 14th ACM Conf. Computer and Comm.
Security(CCS '07), pp. 584-597, 2007.
[3] H. Shacham and B. Waters, "Compact Proofs of Retrievability,"Proc. 14th Int'l Conf. Theory and Application of Cryptology
andInformation Security: Advances in Cryptology (ASIACRYPT '08),pp. 90-107, 2008.
[4] K.D. Bowers, A. Juels, and A. Oprea, "Proofs of Retrievability:Theory and Implementation," Report 2008/175, Cryptology
ePrintArchive, 2008.
[5] M. Naor and G.N. Rothblum, "The Complexity of Online MemoryChecking," Proc. 46th Ann. IEEE Symp. Foundations of
ComputerScience (FOCS '05), pp. 573-584, 2005.
[6] E.-C. Chang and J. Xu, "Remote Integrity Check with DishonestStorage Server," Proc. 13th European Symp. Research in
ComputerSecurity (ESORICS '08), pp. 223-237, 2008.
[7] M.A. Shah, R. Swaminathan, and M. Baker, "Privacy-PreservingAudit and Extraction of Digital Contents," Report
2008/186,Cryptology ePrint Archive, 2008.
[8] A. Oprea, M.K. Reiter, and K. Yang, "Space-Efficient Block Storage Integrity," Proc. 12th Ann. Network and Distributed System
Security Symp. (NDSS '05), 2005.
[9] T. Schwarz and E.L. Miller, "Store, Forget, and Check: UsingAlgebraic Signatures to Check Remotely Administered
Storage,"Proc. 26th IEEE Int'l Conf. Distributed Computing Systems (ICDCS'06), p. 12, 2006.
[10] Q. Wang, K. Ren, W. Lou, and Y. Zhang, "Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance,"
Proc.IEEE INFOCOM, pp. 954-962, Apr. 2009.
- Citation
- Abstract
- Reference
- Full PDF
| Paper Type | : | Research Paper |
| Title | : | Efficiency of Prediction Algorithms for Mining Biological Databases |
| Country | : | India |
| Authors | : | A. Lekha, Dr. C V Srikrishna , Dr. Viji Vinod |
| : | 10.9790/0661-0611221 ![]() |
Abstract: The paper deals with the analysis of the efficiency of prediction algorithms for mining biological
databases and also suggests possible ways of improving the efficiency for a given dataset. The study reveals that
the efficiency of a mining algorithm is a function of many variables of the dataset. The study proposes a
predictive model through a case study
Keywords: Biological databases, Breast Cancer, Efficiency Predictive algorithms, Statistical Analysis
Keywords: Biological databases, Breast Cancer, Efficiency Predictive algorithms, Statistical Analysis
[1] Avery, John. Information Theory and Evolution. USA: World Scientific Publishing Co. 2003.
[2] David Weatherall, Brian Greenwood, Heng Leng Chee and Prawase Wasi, Science and Technology for Disease Control: Past,
Present, and Future, Disease Control Priorities in Developing Countries
[3] Leser, Ulf, et al. Data integration in the Life Science. USA: Springer. 2006.
[4] Paradis, Emmanuel. Analysis of Phylogenetics and Evolution with R.USA: Springer. 2011.
[5] Selzer, Paul. Applied Bioinformatics: An Introduction. USA: Springer. 2008.
[6] Rob, Peter, et al. Database systems: design, implementation and management. USA: Cengage Learning. 2009.
[7] SDART. Software Design and Research Technology Ltd., n.d. Web. 29 April 2012.
[8] Ramaswamy, Sridhar, et al. Efficient Algorithms for Mining Outliers from Large Data Sets. The Pennsylvania State University,
2010. Web. 29 April 2012.
[9] Cornell University Library. "A Comparison Between Data Mining Prediction Algorithms for Fault Detection (Case study:
Ahanpishegan co.)" 2012. Web. 29 April 2012.
[10] Pandey, Hari. Design Analysis and Algorithm. New Delhi: University Science Press. 2008.
[2] David Weatherall, Brian Greenwood, Heng Leng Chee and Prawase Wasi, Science and Technology for Disease Control: Past,
Present, and Future, Disease Control Priorities in Developing Countries
[3] Leser, Ulf, et al. Data integration in the Life Science. USA: Springer. 2006.
[4] Paradis, Emmanuel. Analysis of Phylogenetics and Evolution with R.USA: Springer. 2011.
[5] Selzer, Paul. Applied Bioinformatics: An Introduction. USA: Springer. 2008.
[6] Rob, Peter, et al. Database systems: design, implementation and management. USA: Cengage Learning. 2009.
[7] SDART. Software Design and Research Technology Ltd., n.d. Web. 29 April 2012.
[8] Ramaswamy, Sridhar, et al. Efficient Algorithms for Mining Outliers from Large Data Sets. The Pennsylvania State University,
2010. Web. 29 April 2012.
[9] Cornell University Library. "A Comparison Between Data Mining Prediction Algorithms for Fault Detection (Case study:
Ahanpishegan co.)" 2012. Web. 29 April 2012.
[10] Pandey, Hari. Design Analysis and Algorithm. New Delhi: University Science Press. 2008.
