Design and Performance Characterization of Practically Realizable Graph-Based Security Aware Algorithms for Hierarchical and Non-hierarchical Cloud Architectures

Applications processing massive amount of data demand superior time-performance and data-storage capabilities. Many organizations are exploring Cloud Computing to manage such applications because of scalability and convenience of access from different geographic locations, whereas data security and privacy are few of the major concerns preventing them from fully embracing it. Data security while maintaining time-performance becomes an important consideration for designing data placement strategies. We first present the reader with a quick survey on the recent approaches and solutions in data placement oriented problems that address security concern and then characterize the performance for graph based algorithms that are practically realizable. We evaluated the performance of conventional strategies such as, Random, T-coloring and revisited these algorithms in the view of providing maximum security. We refer to our strategy as Data Security Preferential (DSP) data placement strategy and evaluated via rigorous performance evaluation tests to identify which strategy will best suit the requirements of the user on three state-of-the-art hierarchical cloud platforms viz., FatTree, ThreeTier and DCell and non-hierarchical cloud platforms.

[1]  Dimitrios Zissis,et al.  Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..

[2]  Yun Tian,et al.  SecHDFS: A Secure Data Allocation Scheme for Heterogenous Hadoop Systems , 2016, 2016 IEEE International Conference on Networking, Architecture and Storage (NAS).

[3]  Abdelhamid Mellouk,et al.  ITS-cloud: Cloud computing for Intelligent transportation system , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).

[4]  Stergios V. Anastasiadis,et al.  Virtualization-aware access control for multitenant filesystems , 2014, 2014 30th Symposium on Mass Storage Systems and Technologies (MSST).

[5]  Ari Juels,et al.  New approaches to security and availability for cloud data , 2013, CACM.

[6]  Patrick Martin,et al.  Secure and Efficient Data Placement in Mobile Healthcare Services , 2014, DEXA.

[7]  Dong Lin,et al.  Data Center Networks , 2013, SpringerBriefs in Computer Science.

[8]  Wei Du,et al.  Security-aware intermediate data placement strategy in scientific cloud workflows , 2014, Knowledge and Information Systems.

[9]  Meikang Qiu,et al.  Privacy Protection for Preventing Data Over-Collection in Smart City , 2016, IEEE Transactions on Computers.

[10]  Jugal K. Kalita,et al.  Network attacks: Taxonomy, tools and systems , 2014, J. Netw. Comput. Appl..

[11]  Dianxiang Xu,et al.  Data Placement in P2P Data Grids Considering the Availability, Security, Access Performance and Load Balancing , 2012, Journal of Grid Computing.

[12]  Seungmin Kang,et al.  A Security-Aware Data Placement Mechanism for Big Data Cloud Storage Systems , 2016, 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS).

[13]  Gongjun Yan,et al.  Security challenges in vehicular cloud computing , 2013, IEEE Transactions on Intelligent Transportation Systems.

[14]  Yang Tang,et al.  Secure Overlay Cloud Storage with Access Control and Assured Deletion , 2012, IEEE Transactions on Dependable and Secure Computing.