Optimizing Performance in Migrating Data between Non-cloud Infrastructure and Cloud Using Parallel Computing

Clouds have offered users a very rich and flexible internet computing experience. Therefore, many individuals, companies, organizations and institutions migrated from traditional local computing services to the cloud environment. Despite the numerous benefits of cloud computing, there are still major concerns when it comes to security. Among the major security vulnerabilities is the migration process from the physical local servers to the cloud servers. During this migration, data can be lost due to corruption, incomplete transmission and interception. To address these threats, we have designed and implemented a system that will secure the data throughout the migration process. The method being implemented combines different security techniques to ensure that data is fully transferred from the source non-cloud computing environment to the cloud servers without being corrupted or intercepted by a malicious third party. The combination of data segmentation, error control/correction, encryption, decryption and hashing of data, which are applied in our system will ensure that the highest level of data security during the migration process is attained. However, due to the associated heavy computation processes, the whole system can slow down, which can result in poor and inefficient performance. Most chips today are multicore and parallelization, therefore, can be leveraged to enhance the overall system performance and efficiency. In this research, we detail the security improvements of our system and demonstrate the implementations and performance improvements of the parallel implementation.

[1]  Hiroyuki Ohsaki,et al.  On Parameter Tuning of Data Transfer Protocol GridFTP for Wide-Area Networks , 2008 .

[2]  Razvan Rughinis Enhancing performance of searchable encryption in cloud computing , 2013, CODASPY '13.

[3]  Smita A. Bhosale,et al.  AES encryption engines of many core processor arrays on FPGA by using parallel, pipeline and sequential technique , 2015, 2015 International Conference on Energy Systems and Applications.

[4]  Zhen Huang,et al.  Design and Implementation of a Low Power RSA Processor for Smartcard , 2011 .

[5]  Shaik Rasool,et al.  SECURE DATA TRANSMISSION OVER NETWORKS , 2013 .

[6]  Barry K. Gilbert,et al.  A highly parallel AES-GCM core for authenticated encryption of 400 Gb/s network protocols , 2015, 2015 International Conference on ReConFigurable Computing and FPGAs (ReConFig).

[7]  Norafida Ithnin,et al.  State of the Art Practical Parallel Cryptographic Approaches , 2011 .

[8]  Anne-Marie Kermarrec,et al.  Proceedings of the 13th international Euro-Par conference on Parallel Processing , 2007 .

[9]  Tevfik Kosar,et al.  Prediction of Optimal Parallelism Level in Wide Area Data Transfers , 2011, IEEE Transactions on Parallel and Distributed Systems.

[10]  Anna Morajko Dynamic tuning of parallel/distributed applications , 2004 .

[11]  Seyed H. Roosta Parallel processing and parallel algorithms - theory and computation , 1999 .

[12]  S. Sivanantham,et al.  Implementation of Blake 256 hash function for password encryption and parallel CRC , 2015, 2015 Online International Conference on Green Engineering and Technologies (IC-GET).

[13]  Brian D. Noble,et al.  The end-to-end performance effects of parallel TCP sockets on a lossy wide-area network , 2002, Proceedings 16th International Parallel and Distributed Processing Symposium.

[14]  Tanmoy Bhattacharya Data-aware distributed scientific computing for big-data problems in bio-surveillance , 2013 .

[15]  Wei Li,et al.  Parallel mapping implementation of AES for Coarse-Grained Reconfigurable Block Encryption Array , 2016, 2016 10th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID).

[16]  John S. Heidemann,et al.  Effects of ensemble-TCP , 2000, CCRV.

[17]  Calvin Boey Mun Lek,et al.  Cloud-to-cloud parallel data transfer via spawning intermediate nodes , 2017, TENCON 2017 - 2017 IEEE Region 10 Conference.

[18]  Robert L. Grossman,et al.  PSockets: The Case for Application-level Network Striping for Data Intensive Applications using High Speed Wide Area Networks , 2000, ACM/IEEE SC 2000 Conference (SC'00).

[19]  D J Evans,et al.  Parallel processing , 1986 .

[20]  Peter A. Dinda,et al.  Modeling and taming parallel TCP on the wide area network , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.

[21]  Masayuki Murata,et al.  Scalable socket buffer tuning for high-performance Web servers , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.

[22]  Mehmet Balman,et al.  Data-Aware Distributed Computing , 2012 .

[23]  Hyunseung Choo,et al.  Efficient Resource Management Scheme of TCP Buffer Tuned Parallel Stream to Optimize System Performance , 2005, EUC Workshops.

[24]  Keqin Li,et al.  Velocity-Aware Parallel Encryption Algorithm with Low Energy Consumption for Streams , 2017 .

[25]  Jon Crowcroft,et al.  Differentiated end-to-end Internet services using a weighted proportional fair sharing TCP , 1998, CCRV.

[26]  Manish Jain,et al.  Socket Buffer Auto-Sizing for High-Performance Data Transfers , 2003, Journal of Grid Computing.

[27]  Tevfik Kosar,et al.  A Data Throughput Prediction and Optimization Service for Widely Distributed Many-Task Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.

[28]  Tevfik Kosar,et al.  Application-Level Optimization of Big Data Transfers through Pipelining, Parallelism and Concurrency , 2016, IEEE Transactions on Cloud Computing.

[29]  Eitan Altman,et al.  Parallel TCP Sockets: Simple Model, Throughput and Validation , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.