A novel redundancy technique to enhance the security of cloud computing

被引:0
作者
Syed Ismail A. [1 ]
Asha S. [1 ]
机构
[1] SCSE, VIT University, Chennai
关键词
cloud computing; MCDB; multi-cloud database; reliability; security; Shamir’s secret sharing algorithm; TMR; triple modular redundancy;
D O I
10.1504/IJCC.2023.134002
中图分类号
学科分类号
摘要
Cloud computing is an emerging technology that offers computing, storage, and software as a service to IT organisations and individuals. To prevent cloud resources from external threats, data leakage, and various attacks, security controls, and technological safeguards should be offered to the data centres of the cloud. This paper proposes a novel approach known as the multi-cloud database (MCDB) which uses multiple cloud service providers (CSP) instead of a single CSP. For this purpose, a Shamir’s secret sharing algorithm and a sequential triple modular redundancy (TMR) technique are implemented to improve the reliability and offer enhanced security to the MCDB. The proposed model is compared with one single cloud (SPORC) and four multi-cloud models (DepSky, HAIL, RACS, MCDB without TMR) in terms of reliability, integrity, confidentiality, availability, and security. The maximum reliability, integrity, confidentiality, availability, and security values obtained for the proposed model were 100%, 99%, 99%, 97%, and 99%. Copyright © 2023 Inderscience Enterprises Ltd.
引用
收藏
页码:482 / 496
页数:14
相关论文
共 25 条
  • [21] 15 Top Cloud Computing Service Provider Companies, (2019)
  • [22] Sun D., Chang G., Miao C., Wang X., Building a high serviceability model by checkpointing and replication strategy in cloud computing environment’s, 2012 32nd International Conference on Distributed Computing Systems Workshops, pp. 578-587, (2012)
  • [23] Sundararaj V., Optimal task assignment in mobile cloud computing by queue based ant-bee algorithm, Wireless Personal Communications, 104, 1, pp. 173-197, (2019)
  • [24] Vinu S., Muthukumar S., Kumar R.S., An optimal cluster formation based energy efficient dynamic scheduling hybrid MAC protocol for heavy traffic load in wireless sensor networks, Computers & Security, 77, pp. 277-288, (2018)
  • [25] Yang Y., Liu R., Chen Y., Li T., Tang Y., Normal cloud model-based algorithm for multi-attribute trusted cloud service selection, IEEE Access, 6, pp. 37644-37652, (2018)