scholarly journals USE OF DISTRIBUTED HASH TABLES TO PROVIDE ACCESS TO CLOUD SERVICES

Author(s):  
Y.P. Klots ◽  
I.V. Muliar ◽  
V.M. Cheshun ◽  
O.V. Burdyug

In the article the urgency of the problem of granting access to services of distributed cloud system is disclosed, in particular, the peer distributed cloud system is characterized. The process of interaction of the main components is provided to access the domain name web resource. It is researched that the distribution of resources between nodes of a peer distributed cloud system with the subsequent provision of services on request is implemented using the Kademlia protocol on a local network or Internet and contains processes for publishing the resource at the initial stage of its owner, replication and directly providing access to resources. Application of modern technologies of adaptive information security systems does not allow full control over the information flows of the cloud computing environment, since they function at the upper levels of the hierarchy. Therefore, to create effective mechanisms for protecting software in a cloud computing environment, it is necessary to develop new threat models and to create methods for displaying computer attacks that allow operatively to identify hidden and potentially dangerous processes of information interaction. Rules of access form the basis of security policy and include restrictions on the mechanisms of initialization processes access. Under the developed operations model, the formalized description of hidden threats is reduced to the emergence of context-dependent transitions in the multigraph transactions. The method of granting access to the services of the distributed cloud system is substantiated. It is determined that the Distributed Hash Table (DHT) infrastructure is used to find a replication node that has a replica of the requested resource or part of it. The study identified the stages of identification of the node's validation. The process of adding a new node, validating authenticity, publishing a resource, and accessing a resource is described in the form of a step-by-step sequence of actions within the framework of the method of granting access to services of a distributed cloud system by graphical description of information flows, interaction of processes of information and objects processing.

The cloud computing has utilization of pervasive or distributed models on demand access to highly configurable computing devices for fast provision and less management efforts. The complex architecture, multitenant and virtual environment in cloud infrastructure asks for risks identification and mitigation. The cloud computing model business needs reassurances so it’s prime consideration for testing the cloud services. This research primarily identifies various risks, threats, testing models and vulnerabilities in cloud computing environment. This research has implemented the risk assessment and cloud readiness for PaaS environment by scanning its code with a software vendor. The research makes an emphasis on risk minimization strategies and trust evaluation in cloud computing environment.


Distributed Denial of Service (DDoS) attacks has become the most powerful cyber weapon to target the businesses that operate on the cloud computing environment. The sophisticated DDoS attack affects the functionalities of the cloud services and affects its core capabilities of cloud such as availability and reliability. The current intrusion detection system (IDS) must cope with the dynamicity and intensity of immense traffic at the cloud hosted applications and the security attack must be inspected based on the attack flow characteristics. Hence, the proposed Adaptive Learning and Automatic Filtering of Distributed Denial of Service (DDoS) Attacks in Cloud Computing Environment is designed to adapt with varying kind of protocol attacks using misuse detection. The system is equipped with custom and threshold techniques that satisfies security requirements and can identify the different DDoS security attacks. The proposed system provides promising results in detecting the DDoS attacks in cloud environment with high detection accuracy and good alert reduction. Threshold method provides 98% detection accuracy with 99.91%, 99.92% and 99.94% alert reduction for ICMP, UDP and TCP SYN flood attack. The defense system filters the attack sources at the target virtual instance and protects the cloud applications from DDoS attacks.


Author(s):  
Howard Hamilton ◽  
Hadi Alasti

Data security in the cloud continues to be a huge concern. The adoption of cloud services continues to increase with more businesses transitioning from on premise technology infrastructures to outsourcing cloud-based infrastructures. As the cloud becomes more popular, users are increasingly demanding control over critical security elements of the data and technology assets that are in the cloud. In addition, there are still cries for greater data and security in the cloud. The goal of this paper is to provide cloud service users with greater control over data security in the cloud while at the same time optimizing overall security in the multi-tenant cloud computing environment. This paper introduces cloud-based intelligent agents that are configurable by the users and are expected to give greater compliance for data security in any of the cloud service models.


Author(s):  
K. Vinod Kumar ◽  
Ranvijay Ranvijay

<p><span>Recently, the utilization of cloud services like storage, various software, networking resources has extremely enhanced due to widespread demand of these cloud services all over the world. On the other hand, it requires huge amount of storage and resource management to accurately cope up with ever-increasing demand. The high demand of these cloud services can lead to high amount of energy consumption in these cloud centers. Therefore, to eliminate these drawbacks and improve energy consumption and storage enhancement in real time for cloud computing devices, we have presented Cache Optimization Cloud Scheduling (COCS) Algorithm Based on Last Level Caches to ensure high cache memory Optimization and to enhance the processing speed of I/O subsystem in a cloud computing environment which rely upon Dynamic Voltage and Frequency Scaling (DVFS). The proposed COCS technique helps to reduce last level cache failures and the latencies of average memory in cloud computing multi-processor devices. This proposed COCS technique provides an efficient mathematical modelling to minimize energy consumption. We have tested our experiment on Cybershake scientific dataset and the experimental results are compared with different conventional techniques in terms of time taken to accomplish task, power consumed in the VMs and average power required to handle tasks.</span></p>


2018 ◽  
pp. 471-484
Author(s):  
Howard Hamilton ◽  
Hadi Alasti

Data security in the cloud continues to be a huge concern. The adoption of cloud services continues to increase with more businesses transitioning from on premise technology infrastructures to outsourcing cloud-based infrastructures. As the cloud becomes more popular, users are increasingly demanding control over critical security elements of the data and technology assets that are in the cloud. In addition, there are still cries for greater data and security in the cloud. The goal of this paper is to provide cloud service users with greater control over data security in the cloud while at the same time optimizing overall security in the multi-tenant cloud computing environment. This paper introduces cloud-based intelligent agents that are configurable by the users and are expected to give greater compliance for data security in any of the cloud service models.


2020 ◽  
Vol 2020 ◽  
pp. 1-6
Author(s):  
Baoyuan Kang ◽  
Yanbao Han ◽  
Kun Qian ◽  
Jianqi Du

Recently, a number of authentication protocols integrated with the Internet of Things (IoT) and cloud computing have been proposed for secure access control on large-scale IoT networks. In this paper, we carefully analyze Amin et al.’s authentication protocol for IoT-enabled devices in distributed cloud computing environment and find that Amin et al.’s protocol is vulnerable to several weaknesses. The main shortcoming of Amin et al.’s protocol is in authentication phase; a malicious cloud server can counterfeit the cloud server chosen by a user, and the control server cannot find this counterfeit. To overcome the shortcomings of Amin et al.’s protocol, we propose an improved protocol. In the registration phase of the improved protocol, the pseudoidentity and real identity of a user or a cloud server are bundled up with the control server’s secret numbers. This measure can effectively prevent impersonation attack. We also compare the improved protocol with several existing authentication protocols in security and computational efficiency.


Sign in / Sign up

Export Citation Format

Share Document