Lightweight Optimal Technique for Auditable Secure Cloud Using Hybrid Artificial Intelligence

Authors

  • Ranadeep Reddy Palle  

Keywords:

Cloud Security, Cloud Computing, Constraints Optimization, Data Dynamics, Hybrid, Artificial Intelligent

Abstract

In the era of big data, the exponential growth of data poses significant challenges for storage, leading many entities to migrate their data to cloud storage services. While cloud storage offers numerous advantages, it also introduces substantial risks, including the potential loss or unauthorized modification of data by service providers. The extensive data gathered in the cloud, originating from various datasets and storage devices necessitates a thorough analysis of storage performance. Each data instance is defined by specific features, while devices are characterized by their hardware or software components. General restrictions for data allocation and device capacity are also considered. The computation of structural constraints is based on the interactions between cloud-based devices and data instances. In order to address these issues, we introduce a hybrid artificial intelligence approach that is lightweight and ideal for constraint optimization. It focuses on auditable secure cloud storage with dynamic data. Our approach begins with the development of the enhanced electric fish optimization (EEFO) algorithm for constraints optimization to ensure the integrity of data stored in the cloud. To accommodate dynamic data operations, including block modification, insertion, and deletion, we employ the triple tree-seed algorithm (TTSA) to record the location of each data operation within the system. The proposed model's performance is validated, and results are systematically analyzed, compared against existing approaches, demonstrating its effectiveness in appropriately managing cloud data.

References

  1. Ebejer, J.P., Fulle, S., Morris, G.M. and Finn, P.W., 2013. The emerging role of cloud computing in molecular modelling. Journal of Molecular Graphics and Modelling, 44, pp.177-187.
  2. Abbadi, I.M. and Martin, A., 2011. Trust in the Cloud. information security technical report, 16(3-4), pp.108-114.
  3. Apostu, A., Rednic, E. and Puican, F., 2012. Modeling cloud architecture in banking systems. Procedia economics and finance, 3, pp.543-548.
  4. Xu, X., 2012. From cloud computing to cloud manufacturing. Robotics and computer-integrated manufacturing, 28(1), pp.75-86.
  5. Jorissen, K., Vila, F.D. and Rehr, J.J., 2012. A high performance scientific cloud computing environment for materials simulations. Computer Physics Communications, 183(9), pp.1911-1919.
  6. Chonka, A., Xiang, Y., Zhou, W. and Bonti, A., 2011. Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks. Journal of Network and Computer Applications, 34(4), pp.1097-1107.
  7. Fu, Y., Wang, Y. and Biersack, E., 2013. A general scalable and accurate decentralized level monitoring method for large-scale dynamic service provision in hybrid clouds. Future Generation Computer Systems, 29(5), pp.1235-1253.
  8. Das, S.K., Kant, K. and Zhang, N., 2012. Handbook on securing cyber-physical critical infrastructure. Elsevier.
  9. McClintock, W.E., Rusch, D.W., Thomas, G.E., Merkel, A.W., Lankton, M.R., Drake, V.A., Bailey, S.M. and Russell III, J.M., 2009. The cloud imaging and particle size experiment on the Aeronomy of Ice in the mesosphere mission: Instrument concept, design, calibration, and on-orbit performance. Journal of Atmospheric and Solar-Terrestrial Physics, 71(3-4), pp.340-355.
  10. Fernandez, E.B., La Red, D.L. and Peláez, J.I., 2013. A conceptual approach to secure electronic elections based on patterns. Government Information Quarterly, 30(1), pp.64-73.
  11. Liu, C., Zhang, X., Yang, C. and Chen, J., 2013. CCBKE—Session key negotiation for fast and secure scheduling of scientific applications in cloud computing. Future Generation Computer Systems, 29(5), pp.1300-1308.
  12. Pervez, Z., Khattak, A.M., Lee, S. and Lee, Y.K., 2012. SAPDS: self-healing attribute-based privacy aware data sharing in cloud. The Journal of Supercomputing, 62, pp.431-460.
  13. Wang, C., Wang, Q., Ren, K., Cao, N. and Lou, W., 2011. Toward secure and dependable storage services in cloud computing. IEEE transactions on Services Computing, 5(2), pp.220-232.
  14. Sun, Z. and Shen, J., 2013. A high performance peer to cloud and peer model augmented with hierarchical secure communications. Journal of Systems and Software, 86(7), pp.1790-1796.
  15. Huang, Q.L., YANG, Y.X., FU, J.Y. and NIU, X.X., 2013. Secure and privacy-preserving DRM scheme using homomorphic encryption in cloud computing. The Journal of China Universities of Posts and Telecommunications, 20(6), pp.88-95.
  16. Han, J., Susilo, W. and Mu, Y., 2013. Identity-based data storage in cloud computing. Future Generation Computer Systems, 29(3), pp.673-681.
  17. Yeh, S.C., Su, M.Y., Chen, H.H. and Lin, C.Y., 2013. An efficient and secure approach for a cloud collaborative editing. Journal of Network and Computer Applications, 36(6), pp.1632-1641.
  18. Cheng, Y., Wang, Z.Y., Ma, J., Wu, J.J., Mei, S.Z. and Ren, J.C., 2013. Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage. Journal of Zhejiang University SCIENCE C, 14(2), pp.85-97.
  19. Pervez, Z., Awan, A.A., Khattak, A.M., Lee, S. and Huh, E.N., 2013. Privacy-aware searching with oblivious term matching for cloud storage. The Journal of Supercomputing, 63, pp.538-560.
  20. Itani, W., Kayssi, A. and Chehab, A., 2013. SNUAGE: an efficient platform-as-a-service security framework for the cloud. Cluster computing, 16, pp.707-724.
  21. Wang, Q., Wang, C., Ren, K., Lou, W. and Li, J., 2010. Enabling public auditability and data dynamics for storage security in cloud computing. IEEE transactions on parallel and distributed systems, 22(5), pp.847-859.

Downloads

Published

2014-01-30

Issue

Section

Research Articles

How to Cite

[1]
Ranadeep Reddy Palle, " Lightweight Optimal Technique for Auditable Secure Cloud Using Hybrid Artificial Intelligence, International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 1, Issue 1, pp.972-988, Year-2007_14.