AN EFFICIENT MODEL FOR PROVIDING SECURITY IN CLOUD COMPUTING ENVIRONMENT

In this paper, we present an overview of existing cloud security algorithms. All these algorithms are described more or less on their own. Cloud security is a very popular task. We also explain the fundamentals of sequential rule mining. We describe today’s approaches for cloud security. From the broad variety of efficient algorithms that have been developed we will compare the most important ones. We will systematize the algorithms and analyze their performance based on both their run time performance and theoretical considerations. Their strengths and weaknesses are also investigated. It turns out that the behaviour of the algorithms is much more similar as to be expected. A new model for cloud security is also proposed at the end. The results show that the new model is more efficient in comparison to the existing models.

[1]  Rafail Ostrovsky,et al.  Attribute-based encryption with non-monotonic access structures , 2007, CCS '07.

[2]  A. Richard Newton,et al.  An estimation technique to guide low power resynthesis algorithms , 1995, ISLPED '95.

[3]  Hui Wang,et al.  Multi-Tiered On-Demand Resource Scheduling for VM-Based Data Center , 2009, 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid.

[4]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[5]  Rodrigo Fernandes de Mello,et al.  A novel approach for distributed application scheduling based on prediction of communication events , 2010, Future Gener. Comput. Syst..

[6]  D. Ramesh,et al.  An Analysis on Energy Efficient System Design in Grid Computing , 2012 .

[7]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[8]  Energy Consumption Estimates of Information and Communication Technology : synthesis and analysis , 2009 .

[9]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[10]  E. N. Elnozahy,et al.  Energy-Efficient Server Clusters , 2002, PACS.

[11]  Feng Zhao,et al.  Energy aware consolidation for cloud computing , 2008, CLUSTER 2008.

[12]  Reihaneh Safavi-Naini,et al.  Attribute-Based Encryption with Key Cloning Protection , 2008, IACR Cryptol. ePrint Arch..

[13]  Xiaofeng Wang,et al.  Foundations and Technological Landscape of Cloud Computing , 2013 .

[14]  Jordi Torres,et al.  Towards energy-aware scheduling in data centers using machine learning , 2010, e-Energy.

[15]  Feng Zhao,et al.  Fine-grained energy profiling for power-aware application design , 2008, PERV.

[16]  Enrique V. Carrera,et al.  Load balancing and unbalancing for power and performance in cluster-based systems , 2001 .

[17]  Tajana Simunic,et al.  vGreen: a system for energy efficient computing in virtualized environments , 2009, ISLPED.

[18]  Luiz André Barroso,et al.  The Case for Energy-Proportional Computing , 2007, Computer.

[19]  Ling Cheung,et al.  Provably secure ciphertext policy ABE , 2007, CCS '07.

[20]  Karsten Schwan,et al.  VirtualPower: coordinated power management in virtualized enterprise systems , 2007, SOSP.

[21]  Helen J. Wang,et al.  SecondNet: a data center network virtualization architecture with bandwidth guarantees , 2010, CoNEXT.

[22]  Amit Sahai,et al.  Bounded Ciphertext Policy Attribute Based Encryption , 2008, ICALP.

[23]  Brent Waters,et al.  Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.

[24]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.

[25]  Cong Wang,et al.  Enhancing Attribute-Based Encryption with Attribute Hierarchy , 2009, 2009 Fourth International Conference on Communications and Networking in China.

[26]  Melissa Chase,et al.  Multi-authority Attribute Based Encryption , 2007, TCC.