Simultaneous Optimization of User-Centric Security-Conscious Data Storage on Cloud Platforms

Ever-increasing big data forces enterprises to migrate data to cloud storage systems. Data retrieval time from the cloud will directly affect the overall application performance. Meanwhile, sensitive data stored on cloud necessitates a robust security arrangement against cyberattacks. Therefore, it is imperative that both data retrieval time and data security should be taken into account simultaneously when designing a data placement strategy. In this paper, we formulate, design and evaluate the performance of a multi-objective evolutionary algorithm based data placement strategy. We show that our strategy offers users a choice to strike a balance between retrieval time and security through a set of uniformly distributed Pareto-optimal solutions. We evaluate and quantify the performance of our strategy on different cloud storage systems.

[1]  Ari Juels,et al.  New approaches to security and availability for cloud data , 2013, CACM.

[2]  Bin Tang,et al.  Data Replication in Data Intensive Scientific Applications with Performance Guarantee , 2011, IEEE Transactions on Parallel and Distributed Systems.

[3]  Jin Li,et al.  Identity-Based Encryption with Outsourced Revocation in Cloud Computing , 2015, IEEE Transactions on Computers.

[4]  P. Cochat,et al.  Et al , 2008, Archives de pediatrie : organe officiel de la Societe francaise de pediatrie.

[5]  Giorgos Kappes,et al.  Dike : Virtualization-aware Access Control for Multitenant Filesystems , 2013 .

[6]  Qingfu Zhang,et al.  MOEA/D: A Multiobjective Evolutionary Algorithm Based on Decomposition , 2007, IEEE Transactions on Evolutionary Computation.

[7]  Meikang Qiu,et al.  Privacy Protection for Preventing Data Over-Collection in Smart City , 2016, IEEE Transactions on Computers.

[8]  Jemal H. Abawajy,et al.  Data Replication Approach with Consistency Guarantee for Data Grid , 2014, IEEE Transactions on Computers.

[9]  Mohammad Bsoul,et al.  A Round-based Data Replication Strategy , 2016, IEEE Transactions on Parallel and Distributed Systems.

[10]  Jugal K. Kalita,et al.  Network attacks: Taxonomy, tools and systems , 2014, J. Netw. Comput. Appl..

[11]  Stergios V. Anastasiadis,et al.  Virtualization-aware access control for multitenant filesystems , 2014, 2014 30th Symposium on Mass Storage Systems and Technologies (MSST).