Multi-Cloud Data Management using Shamir's Secret Sharing and Quantum Byzantine Agreement Schemes

Cloud computing is a phenomenal distributed computing paradigm that provides flexible, low-cost on-demand data management to businesses. However, this so-called outsourcing of computing resources causes business data security and privacy concerns. Although various methods have been proposed to deal with these concerns, none of these relates to multi-clouds. This paper presents a practical data management model in a public and private multi-cloud environment. The proposed model BFT-MCDB incorporates Shamir's Secret Sharing approach and Quantum Byzantine Agreement protocol to improve trustworthiness and security of business data storage, without compromising performance. The performance evaluation is carried out using a cloud computing simulator called CloudSim. The experimental results show significantly better performance in terms of data storage and data retrieval compared to other common cloud cryptographic based models. The performance evaluation based on CloudSim experiments demonstrates the feasibility of the proposed multi-cloud data management model.

[1]  John Wang Implementation and Integration of Information Systems in the Service Sector , 2012 .

[2]  Kris Luyten,et al.  A Unified Approach to Uncertainty-Aware Ubiquitous Localisation of Mobile Users , 2011, Int. J. Inf. Technol. Web Eng..

[3]  Rajkumar Buyya,et al.  NetworkCloudSim: Modelling Parallel Applications in Cloud Simulations , 2011, 2011 Fourth IEEE International Conference on Utility and Cloud Computing.

[4]  Dzmitry Kliazovich,et al.  GreenCloud: A Packet-Level Simulator of Energy-Aware Cloud Computing Data Centers , 2010, GLOBECOM.

[5]  Fred B. Schneider,et al.  Implementing fault-tolerant services using the state machine approach: a tutorial , 1990, CSUR.

[6]  Ada Scupola Developing Technologies in E-Services, Self-Services, and Mobile Communication: New Concepts , 2011 .

[7]  Massimo Villari,et al.  Achieving Federated and Self-Manageable Cloud Infrastructures: Theory and Practice , 2012 .

[8]  Jie Wu,et al.  Time-based proxy re-encryption scheme for secure data sharing in a cloud environment , 2014, Inf. Sci..

[9]  Bruce Schneier,et al.  Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish) , 1993, FSE.

[10]  Alice Good,et al.  Impact of EU data protection laws on cloud-computing:capturing cloud-computing challenges and fault lines , 2015 .

[11]  Ernesto Damiani,et al.  An Agent-Based Model for Awareness-Based Sustainability , 2015 .

[12]  Leslie Lamport,et al.  The Byzantine Generals Problem , 1982, TOPL.

[13]  Barry W. Johnson Design & analysis of fault tolerant digital systems , 1988 .

[14]  Rajkumar Buyya,et al.  CloudAnalyst: A CloudSim-Based Visual Modeller for Analysing Cloud Computing Environments and Applications , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.

[15]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[16]  Elisa Bertino,et al.  Privacy-preserving Digital Identity Management for Cloud Computing , 2009, IEEE Data Eng. Bull..

[17]  Mark de Reuver,et al.  Opening Up the Smart Home: A Classification of Smart Living Service Platforms , 2013, Int. J. E Serv. Mob. Appl..

[18]  Jaime Gómez,et al.  Tool Support for Model-driven Development of Web Applications , 2005, Int. J. Inf. Technol. Web Eng..

[19]  James A. Thom,et al.  Cloud Computing Security: From Single to Multi-clouds , 2012, 2012 45th Hawaii International Conference on System Sciences.

[20]  Kyrill Meyer,et al.  How IT-Enabled Services Can Help to Change our World Building Networks for the Energy-Efficient City of Tomorrow , 2011, Int. J. Serv. Sci. Manag. Eng. Technol..

[21]  Hui Li,et al.  Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud , 2015, IEEE Transactions on Services Computing.

[22]  Divyakant Agrawal,et al.  Database Management as a Service: Challenges and Opportunities , 2009, 2009 IEEE 25th International Conference on Data Engineering.

[23]  Xiaolei Dong,et al.  Security and privacy for storage and computation in cloud computing , 2014, Inf. Sci..

[24]  Abdelkader Bousselham,et al.  GPU Scaling: From Personal Supercomputing to the Cloud , 2014, Int. J. Inf. Technol. Web Eng..

[25]  Rajkumar Buyya,et al.  CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms , 2011, Softw. Pract. Exp..

[26]  Anirban Kundu,et al.  Page Ranking Validation using Cellular Automata in Cloud , 2015, Int. J. Cloud Appl. Comput..

[27]  Raj Kumar,et al.  Handbook of Research on Promotional Strategies and Consumer Influence in the Service Sector , 2016 .

[28]  Kirk D. Fiedler,et al.  The Impact of Location-Aware Systems in Hospitals: A Tri-Core Perspective , 2011, Int. J. Inf. Syst. Serv. Sect..

[29]  Rajkumar Buyya,et al.  Modeling and simulation of scalable Cloud computing environments and the CloudSim toolkit: Challenges and opportunities , 2009, 2009 International Conference on High Performance Computing & Simulation.

[30]  Naveen Sharma,et al.  Towards autonomic workload provisioning for enterprise Grids and clouds , 2009, 2009 10th IEEE/ACM International Conference on Grid Computing.

[31]  Ramakrishna Kotla,et al.  Zyzzyva: speculative byzantine fault tolerance , 2007, TOCS.

[32]  Andrey Bogdanov,et al.  Biclique Cryptanalysis of the Full AES , 2011, ASIACRYPT.