MOVING TARGET WITH LOAD BALANCING IN A HIERARCHICAL CLOUD

MOVING TARGET WITH LOAD BALANCING IN A HIERARCHICAL CLOUD Hong Liu, Johnson Thomas and Praveen Khethavath Department of Computer Science Oklahoma State University Stillwater, USA liuh@cs.okstate.edu Abstract In this paper we propose a ‘moving target’ security mechanism for a P2P cloud where files are partitioned and sensitive sections are moved at different times without modifying the routing or finger tables, to reduce the risk of the file being compromised. Two drawbacks with this approach are the problem of determining the locality of the data and load unbalancing. We present a hierarchical P2P cloud system that leads to scalability and efficiency. A 3-step load balancing scheme for hierarchical P2P cloud system to globally balance the network is proposed. Our simulation results show that our algorithm is effective in achieving load balancing in hierarchical peer-to-peer cloud systems.

[1]  Ke Zeng,et al.  Publicly Verifiable Remote Data Integrity , 2008, ICICS.

[2]  Klaus Wehrle,et al.  A thermal-dissipation-based approach for balancing data load in distributed hash tables , 2004, 29th Annual IEEE International Conference on Local Computer Networks.

[3]  Gade Krishna,et al.  A scalable peer-to-peer lookup protocol for Internet applications , 2012 .

[4]  David R. Karger,et al.  Consistent hashing and random trees: distributed caching protocols for relieving hot spots on the World Wide Web , 1997, STOC '97.

[5]  Guillaume Urvoy-Keller,et al.  Hierarchical Peer-To-Peer Systems , 2003, Parallel Process. Lett..

[6]  Jeffrey Considine,et al.  Simple Load Balancing for Distributed Hash Tables , 2003, IPTPS.

[7]  Marten van Dijk,et al.  On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing , 2010, HotSec.

[8]  David R. Karger,et al.  Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.

[9]  Karl Aberer,et al.  Multifaceted Simultaneous Load Balancing in DHT-Based P2P Systems: A New Game with Old Balls and Bins , 2005, Self-star Properties in Complex Information Systems.

[10]  Cong Wang,et al.  Ensuring data storage security in Cloud Computing , 2009, 2009 17th International Workshop on Quality of Service.

[11]  Salve Bhagyashri Salve Bhagyashri,et al.  Privacy-Preserving Public Auditing For Secure Cloud Storage , 2014 .

[12]  David R. Karger,et al.  Wide-area cooperative storage with CFS , 2001, SOSP.

[13]  Antonio F. Gómez-Skarmeta,et al.  Cyclone: a novel design schema for hierarchical DHTs , 2005, Fifth IEEE International Conference on Peer-to-Peer Computing (P2P'05).

[14]  Wolfgang Kellerer,et al.  Load balancing in a hierarchical DHT-based P2P system , 2007, 2007 International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2007).

[15]  Leslie Lamport,et al.  Password authentication with insecure communication , 1981, CACM.