A novel redundancy technique to enhance the security of cloud computing

被引:0
作者
Syed Ismail A. [1 ]
Asha S. [1 ]
机构
[1] SCSE, VIT University, Chennai
关键词
cloud computing; MCDB; multi-cloud database; reliability; security; Shamir’s secret sharing algorithm; TMR; triple modular redundancy;
D O I
10.1504/IJCC.2023.134002
中图分类号
学科分类号
摘要
Cloud computing is an emerging technology that offers computing, storage, and software as a service to IT organisations and individuals. To prevent cloud resources from external threats, data leakage, and various attacks, security controls, and technological safeguards should be offered to the data centres of the cloud. This paper proposes a novel approach known as the multi-cloud database (MCDB) which uses multiple cloud service providers (CSP) instead of a single CSP. For this purpose, a Shamir’s secret sharing algorithm and a sequential triple modular redundancy (TMR) technique are implemented to improve the reliability and offer enhanced security to the MCDB. The proposed model is compared with one single cloud (SPORC) and four multi-cloud models (DepSky, HAIL, RACS, MCDB without TMR) in terms of reliability, integrity, confidentiality, availability, and security. The maximum reliability, integrity, confidentiality, availability, and security values obtained for the proposed model were 100%, 99%, 99%, 97%, and 99%. Copyright © 2023 Inderscience Enterprises Ltd.
引用
收藏
页码:482 / 496
页数:14
相关论文
共 25 条
  • [1] Abu-Libdeh H., Princehouse L., Weatherspoon H., RACS, Proceedings of the 1st ACM Symposium on Cloud computing – SoCC 10, (2010)
  • [2] Almohri H.M.J., Watson L.T., Evans D., Predictability of IP address allocations for cloud computing platforms, IEEE Transactions on Information Forensics and Security, 15, pp. 500-511, (2020)
  • [3] Alzain M.A., Soh B., Pardede E., A new model to ensure security in cloud computing services, J. Serv. Sci. Res, 4, pp. 49-70, (2012)
  • [4] Bacis E., De Capitani di Vimercati S., Foresti S., Paraboschi S., Rosa M., Samarati P., Securing resources in decentralized cloud storage, IEEE Transactions on Information Forensics and Security, 15, pp. 286-298, (2020)
  • [5] Bessani A., Correia M., Quaresma B., Andre F., Sousa P., DepSky, ACM Transactions on Storage, 9, 4, pp. 1-33, (2013)
  • [6] Bowers K.D., Juels A., Oprea A., HAIL: a high-availability and integrity layer for cloud storage, Proceedings of the 16th ACM Conference on Computer and Communications Security – CCS 09, (2009)
  • [7] Feldman A.J., Zeller W.P., Freedman M.J., Felten E.W., SPORC: group collaboration using untrusted cloud resources, OSDI, pp. 1-14, (2010)
  • [8] Guedes T., Jesus L.A., Ocana K.A.C.S., Et al., Provenance-based fault tolerance technique recommendation for cloud-based scientific workflows: a practical approach, Cluster Comput, 23, pp. 123-148, (2020)
  • [9] Hudson S., Sundar R.S.S., Koppu S., Fault control using triple modular redundancy (TMR), Advances in Intelligent Systems and Computing Progress in Computing, Analytics and Networking, pp. 471-480, (2018)
  • [10] Kaur A., Gupta P., Singh M., Nayyar A., Data placement in era of cloud computing: a survey, taxonomy and open research issues, Scala Computing: Practice and Experience, 20, 2, pp. 377-398, (2019)