Secured Data Storage and Computation Technique for Effective Utilization of Servers in Cloud Computing

Cloud computing delivers digital services over the internet by using various applications which were carried out at distributed datacenters by computer systems. It provides protocol based high performance computing which permits shared storage and computation over long distances. This proposed work bridges the efficient computation and secure storage in cloud environment. Secure cloud storing includes receiving the data by cloud server for storage after applying security steps like authentication, encryption of data and allocation of storage space. In cloud computing, a secured computing infrastructure is provided to cloud user through computing request and commitment generation. Dynamic server stipulation by cuckoo algorithm is utilized after the completion of successful user access. The uncheatable computation, secure access and storage of proposed work achieve confidentiality. It improves the efficiency and manages concurrent users’ requests.

[1]  Athanasios V. Vasilakos,et al.  Security in cloud computing: Opportunities and challenges , 2015, Inf. Sci..

[2]  Xin-She Yang,et al.  Cuckoo Search via Lévy flights , 2009, 2009 World Congress on Nature & Biologically Inspired Computing (NaBIC).

[3]  Marcos A. Simplício,et al.  A Quantitative Analysis of Current Security Concerns and Solutions for Cloud Computing , 2011, CloudCom.

[4]  Yung-Hsiang Lu,et al.  Cloud Computing for Mobile Users: Can Offloading Computation Save Energy? , 2010, Computer.

[5]  George Pallis,et al.  Cloud Computing: The New Frontier of Internet Computing , 2010, IEEE Internet Computing.

[6]  Siegfried Benkner,et al.  Design of an Adaptive Framework for Utility-Based Optimization of Scientific Applications in the Cloud , 2012, 2012 IEEE Fifth International Conference on Utility and Cloud Computing.

[7]  Rajkumar Buyya,et al.  Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility , 2022 .

[8]  Xiaolei Dong,et al.  Security and privacy for storage and computation in cloud computing , 2014, Inf. Sci..

[9]  Roberto Di Pietro,et al.  Secure virtualization for cloud computing , 2011, J. Netw. Comput. Appl..

[10]  Alexander Schill,et al.  User-controlled resource management in federated clouds , 2014, Journal of Cloud Computing.

[11]  Cong Wang,et al.  Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data , 2014 .

[12]  Faraz Fatemi Moghaddam,et al.  A Hybrid Encryption Algorithm Based on RSA Small-e and Efficient-RSA for Cloud Computing Environments , 2013 .

[13]  Xiaohua Jia,et al.  An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing , 2013, IEEE Transactions on Parallel and Distributed Systems.

[14]  Mala Kalra,et al.  Scheduling of Independent Tasks in Cloud Computing Using Modified Genetic Algorithm , 2014, 2014 International Conference on Computational Intelligence and Communication Networks.

[15]  Wei Tan,et al.  Self-Adaptive Learning PSO-Based Deadline Constrained Task Scheduling for Hybrid IaaS Cloud , 2014, IEEE Transactions on Automation Science and Engineering.

[16]  Ian Sommerville,et al.  An elastic virtual infrastructure for research applications (ELVIRA) , 2013, Journal of Cloud Computing: Advances, Systems and Applications.

[17]  Nabil Sultan,et al.  loud computing for education : A new dawn ? , 2009 .

[18]  Mhamed Zineddine,et al.  Vulnerabilities and mitigation techniques toning in the cloud: A cost and vulnerabilities coverage optimization approach using Cuckoo search algorithm with Lévy flights , 2015, Comput. Secur..

[19]  Hongqi Zhang,et al.  Study of the AES Realization Method on the Reconfigurable Hardware , 2013, 2013 International Conference on Computer Sciences and Applications.

[20]  Max Mühlhäuser,et al.  Trust as a facilitator in cloud computing: a survey , 2012, Journal of Cloud Computing: Advances, Systems and Applications.

[21]  Eduardo B. Fernández,et al.  An analysis of security issues for cloud computing , 2013, Journal of Internet Services and Applications.

[22]  Kemal Bicakci,et al.  Mobile Authentication Secure against Man-in-the-Middle Attacks , 2014, MobileCloud.