A security-aware data replica placement strategy based on fuzzy evaluation in the cloud

被引:3
|
作者
Wu Xiuguo [1 ]
机构
[1] Shandong Univ Finance & Econ, Sch Management Sci & Engn, Jinan 250014, Shandong, Peoples R China
基金
中国国家自然科学基金;
关键词
Cloud storage; replicas placements; security; fuzzy; Qos;
D O I
10.3233/JIFS-169584
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Replication technology is one of the most effective measure to improve the cloud data availability and reduce the response time, by put multiple copies on different data centers in the cloud. However, traditional replica placement strategies mainly focused on the performance improvement, such as transfer time reduction, load balancing and so on, with little attention to their safety storage, which inevitably result in new security risks towards replicas' correct access. Aimed to develop an intelligent solution to enhance the cloud storage system performance, we apply fuzzy comprehensive evaluation to candidate data centers, evaluating its security risk level as replica placements, therefore improve the quality of cloud storage system. First, a novel five-dimensional security model for replica placement is proposed. Then, a security-aware replica placement evaluation algorithm is designed and implemented based on fuzzy set and entropy weight theory to establish a fusion of multiple factors of assessment model. Through comparing the experiment results with the outcome of the different strategies, we can see that data replica availability probability of the proposed strategy is up to 85% and less wait latency can be achieved, indicating the better effectiveness and practicality.
引用
收藏
页码:243 / 255
页数:13
相关论文
共 50 条
  • [21] Security-aware multi-cloud service composition by exploiting rough sets and fuzzy FCA
    Lahmar, Fatma
    Mezni, Haithem
    SOFT COMPUTING, 2021, 25 (07) : 5173 - 5197
  • [22] A Thermal-Aware Data Replica Placement Strategy for Data-intensive Data Centers
    Li, Jie
    Deng, Yuhui
    Wu, Zhaorui
    Pang, Shujie
    PROCEEDINGS OF THE 2022 31ST INTERNATIONAL CONFERENCE ON PARALLEL ARCHITECTURES AND COMPILATION TECHNIQUES, PACT 2022, 2022, : 540 - 541
  • [23] Security-aware multi-cloud service composition by exploiting rough sets and fuzzy FCA
    Fatma Lahmar
    Haithem Mezni
    Soft Computing, 2021, 25 : 5173 - 5197
  • [24] SWORD: workload-aware data placement and replica selection for cloud data management systems
    K. Ashwin Kumar
    Abdul Quamar
    Amol Deshpande
    Samir Khuller
    The VLDB Journal, 2014, 23 : 845 - 870
  • [25] SWORD: workload-aware data placement and replica selection for cloud data management systems
    Kumar, K. Ashwin
    Quamar, Abdul
    Deshpande, Amol
    Khuller, Samir
    VLDB JOURNAL, 2014, 23 (06): : 845 - 870
  • [26] Security-Aware Data Allocation in Multicloud Scenarios
    di Vimercati, Sabrina De Capitani
    Foresti, Sara
    Livraga, Giovanni
    Piuri, Vincenzo
    Samarati, Pierangela
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (05) : 2456 - 2468
  • [27] Security-Aware and Efficient Data Deduplication for Edge-Assisted Cloud Storage Systems
    Xie, Qingyuan
    Zhang, Chen
    Jia, Xiaohua
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (03) : 2191 - 2202
  • [28] Enabling Security-Aware Virtual Machine Placement in IaaS Clouds
    Yuchi, Xuebiao
    Shetty, Sachin
    2015 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2015), 2015, : 1554 - 1559
  • [29] Security-Aware Efficient Mass Distributed Storage Approach for Cloud Systems in Big Data
    Gai, Keke
    Qiu, Meikang
    Zhao, Hui
    2016 IEEE 2ND INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY), IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC), AND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2016, : 140 - 145
  • [30] A Security-Aware Fuzzy-Based Cluster Head Selection System for VANETs
    Ozera, Kosuke
    Bylykbashi, Kevin
    Liu, Yi
    Barolli, Leonard
    INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING, IMIS-2018, 2019, 773 : 505 - 516