scholarly journals Secure and Selective Cloud Data Auditing using Deep Machine Learning

The tradition of moving applications, data to be consumed by the applications and the data generated by the applications is increasing and the increase is due to the advantages of cloud computing. The advantages of cloud computing are catered to the application owners, application consumers and at the same time to the cloud datacentre owners or the cloud service providers also. Since IT tasks are vital for business progression, it for the most part incorporates repetitive or reinforcement segments and framework for power supply, data correspondences associations, natural controls and different security gadgets. An extensive data centre is a mechanical scale task utilizing as much power as a community. The primary advantage of pushing the applications on the cloud-based data centres are low infrastructure maintenance with significant cost reduction for the application owners and the high profitability for the data centre cloud service providers. During the application migration to the cloud data centres, the data and few components of the application become exposed to certain users. Also, the applications, which are hosted on the cloud data centres must comply with the certain standards for being accepted by various application consumers. In order to achieve the standard certifications, the applications and the data must be audited by various auditing companies. Few of the cases, the auditors are hired by the data centre owners and few of times, the auditors are engaged by application consumers. Nonetheless, in both situations, the auditors are third party and the risk of exposing business logics in the applications and the data always persists. Nevertheless, the auditor being a third-party user, the data exposure is a high risk. Also, in a data centre environment, it is highly difficult to ensure isolation of the data from different auditors, who may not be have the right to audit the data. Significant number of researches have attempted to provide a generic solution to this problem. However, the solutions are highly criticized by the research community for making generic assumptions during the permission verification process. Henceforth, this work produces a novel machine learning based algorithm to assign or grant audit access permissions to specific auditors in a random situation without other approvals based on the characteristics of the virtual machine, in which the application and the data is deployed, and the auditing user entity. The results of the proposed algorithm are highly satisfactory and demonstrates nearly 99% accuracy on data characteristics analysis, nearly 98% accuracy on user characteristics analysis and 100% accuracy on secure auditor selection process

Author(s):  
Kenga Mosoti Derdus ◽  
Vincent Oteke Omwenga ◽  
Patrick Job Ogao

Datacenters are becoming the indispensable infrastructure for supporting the services offered by cloud computing. Unfortunately, datacenters consume a lot of energy, which currently stands at 3% of global electrical energy consumption. Consequently, cloud service providers (CSP) experience high operating costs (in terms of electricity bills), which is, in turn, passed to the cloud users. In addition, there is an increased emission of carbon dioxide to the environment. Before one embarks on addressing the problem of energy wastage in a datacenter, it is important to understand the causes of energy wastage in datacenter servers. In this paper, we elaborate on the concept of cloud computing and virtualization. Later, we present a survey of the main causes of energy wastage in datacenter servers as well as proposed solutions to address the problem.


Author(s):  
R.Santha Maria Rani ◽  
Dr.Lata Ragha

Cloud computing provides elastic computing and storage resource to users. Because of the characteristic the data is not under user’s control, data security in cloud computing is becoming one of the most concerns in using cloud computing resources. To improve data reliability and availability, Public data auditing schemes is used to verify the outsourced data storage without retrieving the whole data. However, users may not fully trust the cloud service providers (CSPs) because sometimes they might be dishonest. Therefore, to maintain the integrity of cloud data, many auditing schemes have been proposed. In this paper, analysis of various existing auditing schemes with their consequences is discussed.  Keywords: — Third Party Auditor (TPA), Cloud Service Provider (CSP), Merkle-Hash Tree (MHT), Provable data Possession (PDP), Dynamic Hash Table (DHT).


Author(s):  
Shivani Bajaj

Energy Efficiency can be defined as reduction of energy used by a given service or level of activity. In spite of scale and complexity of data centre equipment it can be highly difficult to define the proper activity that could be examined for the efficiency of energy. So there can be four scenarios which may define within the system where the energy is not utilised in an efficient manner. The main goal of Cloud service providers is creation of usage of Cloud computing resources proficiently for efficient cloud computing. Cloud computing has many serious issues such as load manager, security and fault tolerance. This chapter discusses the energy efficient approaches in cloud computing environment. The energy efficiency has become the major concern for the service providers. In this chapter, the major concern is the high lightly of resource allocation challenges and there are some which will be given in the data center energy consumption. The focus is done on the power management task and even the virtualization of saving the energy.


Author(s):  
Sunil Kumar ◽  
Dilip Kumar ◽  
Hemraj Shobharam Lamkuche

Over the last decade, many enterprises around the world migrating from traditional infrastructure to cloud resources in order to cut down operational and capital expenditure. With cloud computing, huge amount of data transactions is communicated between cloud consumers and cloud service providers. However, this cloud computing enables surplus security challenges associated to unauthorized access and data breaches. We proposed in this paper a trusted third-party auditor (TPA) model which uses lightweight cryptographic system and lightweight hashing technique to ensure data security and data integrity to audit the cloud users outsourced data from cloud service providers. With our proposed system, we solve the concern of data reliability using data correctness and verification analysis and error recovery analysis. The time complexity of our proposed system is less as compared with other TPA model. Our proposed system also shows resistance against various known cryptanalytic attacks, the performance and extensive compression technique of our proposed system are probably secure and highly proficient.


Author(s):  
J. Craig Mudge

Cloud computing is a mode of acquisition of infrastructure where a cloud service provides on demand computing and on-demand storage, accessible over the web, with a matching business model, namely pay-per-use. Lower cost, sometimes a factor of five, is achieved by automating operations in warehouse-sized data centres, sharing the hefty burden of cooling, physical security, and power backup, and the use of commodity components. As access to storage managed by cloud service providers gained market acceptance, the phrase “the cloud” came into use to refer to the location of information stored with a cloud service provider to be shared (business documents and photos) or copied for backup (against losing a phone or deleting information on a laptop).  Security, and to a lesser extent privacy, concerns are the major barriers to the adoption of cloud computing, but the leading cloud service providers have responded to the point that sensitive information, such as medical records and credit-card-holder data, is now held in the cloud. 


Author(s):  
Shivani Bajaj

Energy Efficiency can be defined as reduction of energy used by a given service or level of activity. In spite of scale and complexity of data centre equipment it can be highly difficult to define the proper activity that could be examined for the efficiency of energy. So there can be four scenarios which may define within the system where the energy is not utilised in an efficient manner. The main goal of Cloud service providers is creation of usage of Cloud computing resources proficiently for efficient cloud computing. Cloud computing has many serious issues such as load manager, security and fault tolerance. This chapter discusses the energy efficient approaches in cloud computing environment. The energy efficiency has become the major concern for the service providers. In this chapter, the major concern is the high lightly of resource allocation challenges and there are some which will be given in the data center energy consumption. The focus is done on the power management task and even the virtualization of saving the energy.


Author(s):  
Kenga Mosoti Derdus ◽  
Vincent Oteke Omwenga ◽  
Patrick Job Ogao

Virtual machine (VM) consolidation in data centres is a technique that is used to ensure minimum use of physical servers (hosts) leading to better utilization of computing resources and energy savings. To achieve these goals, this technique requires that the estimated VM size is on the basis of application workload resource demands so as to maximize resources utilization, not only at host-level but also at VM-level. This is challenging especially in Infrastructure as a Service (IaaS) public clouds where customers select VM sizes set beforehand by the Cloud Service Providers (CSPs) without the knowledge of the amount of resources their applications need. More often, the resources are overprovisioned and thus go to waste, yet these resources consume power and are paid for by the customers. In this paper, we propose a technique for determining fixed VM sizes, which satisfy application workload resource demands. Because of the dynamic nature of cloud workloads, we show that any resource demands that exceed fixed VM resources can be addressed via statistical multiplexing. The proposed technique is evaluated using VM usage data obtained from a production data centre consisting of 49 hosts and 520 VMs. The evaluations show that the proposed technique reduces energy consumption, memory wastage and CPU wastage by at least 40%, 61% and 41% respectively.


Electronics ◽  
2021 ◽  
Vol 10 (20) ◽  
pp. 2493
Author(s):  
Mueen Uddin ◽  
Anjum Khalique ◽  
Awais Khan Jumani ◽  
Syed Sajid Ullah ◽  
Saddam Hussain

Cloud computing is a well-known technology that provides flexible, efficient, and cost-effective IT solutions for multinationals to offer improved and enhanced quality of business services to end-users. The cloud computing paradigm is instigated from the grid and parallel computing models. It uses virtualization, server consolidation, utility computing, and other computing technologies and models for providing better IT solutions for large-scale computational data centres. It encompasses different services for supporting data storage, networking, and computing for facilities and amenities for businesses and multinational corporations. The enormous elastic on-demand cloud provisioning resources and services and datasets are processed and stored in tier-level virtualized cloud data centres operated by third-party service providers called cloud owners. The primary issue with these cloud service providers is to provide and maintain data security, privacy, and confidentiality and service availability and data support for end-users. This paper reviews, highlights, and discusses some of the common cloud computing vulnerabilities primarily related to virtualization platforms and their implementations while outsourcing services and resources to different end-users and business enterprises. We then provided blockchain-enabled solutions for virtualized cloud platforms involving both the end-users and cloud service providers (CSP) to address and solve various security and privacy-related vulnerabilities. These solutions will help the data centre industry to improve its virtualized cloud services and resource provisioning facilities. Finally, we discussed different blockchain-related implementation challenges in cloud infrastructures.


Author(s):  
Peter Awon-natemi Agbedemnab ◽  
Salifu Abdul-Mumin ◽  
Zakaria Abdulrahim

The cloud computing architecture is a berth in which third party, virtual machine and cloud service providers are involved in data uploading and downloading. A major challenge in this architecture, however, is the security of the data as there exist various forms of attacks from malicious peopleand devices. Among these security attacks, the zombie attack is the most advance type of attack. The zombie attack reduces network performance in terms of delay and bandwidth consumption. With zombie attack, some malicious users may join the network which, in turn takes off the data of legitimate users and at the same time enable zombie nodes to communicate with a virtual machine on behalf of the legitimate user. In this paper, a technique based on strong authentication which, is able to detect malicious users from a network and isolates them from the cloud architecture is proposed.


2014 ◽  
Vol 13 (7) ◽  
pp. 4625-4632
Author(s):  
Jyh-Shyan Lin ◽  
Kuo-Hsiung Liao ◽  
Chao-Hsing Hsu

Cloud computing and cloud data storage have become important applications on the Internet. An important trend in cloud computing and cloud data storage is group collaboration since it is a great inducement for an entity to use a cloud service, especially for an international enterprise. In this paper we propose a cloud data storage scheme with some protocols to support group collaboration. A group of users can operate on a set of data collaboratively with dynamic data update supported. Every member of the group can access, update and verify the data independently. The verification can also be authorized to a third-party auditor for convenience.


Sign in / Sign up

Export Citation Format

Share Document