Effective Data Storage Security with Efficient Computing in Cloud

Cloud Computing is well-known resource sharing model uses internet to offer several computing and data storage services. Due to distributed resources and their availability for numerous users, the level of complexity for the resource allocation and security accessing, increases. The paper mainly focuses on meta-heuristic approach for resource allocation and data security using data classification approach. In the proposed framework multi-factor verification is applied to verify the user’s credentials prior to data accessing. Encryption at user side not only ensures the integrity but also confidentiality of data. Here MCS (Modified Cuckoo Search), PSEC (Provably Secure Elliptic Curve) encryption and AES (Advanced Encryption Standard) is used for resource scheduling, user side encryption, and cloud side encryption respectively for attaining integrity, confidentiality and also efficient computation ability.

[1]  Madjid Merabti,et al.  An access control model for cloud computing , 2014, J. Inf. Secur. Appl..

[2]  Alfred Menezes,et al.  Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.

[3]  Emad Nabil,et al.  A Modified Flower Pollination Algorithm for Global Optimization , 2016, Expert Syst. Appl..

[4]  A. B. M. Shawkat Ali,et al.  A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing , 2012, Future Gener. Comput. Syst..

[5]  Shafii Muhammad Abdulhamid,et al.  Resource scheduling for infrastructure as a service (IaaS) in cloud computing: Challenges and opportunities , 2016, J. Netw. Comput. Appl..

[6]  Gary B. Wills,et al.  Protecting data in personal cloud storage with security classifications , 2015, 2015 Science and Information Conference (SAI).

[7]  S. Mary Saira Bhanu,et al.  Two layered protection for sensitive data in cloud , 2014, 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[8]  Kenneth Morgan,et al.  Modified cuckoo search: A new gradient free optimisation algorithm , 2011 .

[9]  Faraz Fatemi Moghaddam,et al.  A scalable and efficient user authentication scheme for cloud computing environments , 2014, 2014 IEEE REGION 10 SYMPOSIUM.

[10]  Kiranbir Kaur,et al.  An Adaptive Firefly Algorithm for Load Balancing in Cloud Computing , 2016, SocProS.

[11]  Arun Kumar Sangaiah,et al.  A comparative study of cuckoo search and flower pollination algorithm on solving global optimization problems , 2017, Libr. Hi Tech.

[12]  Sandeep K. Sood,et al.  A combined approach to ensure data security in cloud computing , 2012, J. Netw. Comput. Appl..

[13]  Martin Gilje Jaatun,et al.  Beyond lightning: A survey on security challenges in cloud computing , 2013, Comput. Electr. Eng..

[14]  K. Chandrasekaran,et al.  Bat algorithm for scheduling workflow applications in cloud , 2015, 2015 International Conference on Electronic Design, Computer Networks & Automated Verification (EDCAV).

[15]  Sarbjeet Singh,et al.  A review of metaheuristic scheduling techniques in cloud computing , 2015 .

[16]  David M. Nicol,et al.  Trust mechanisms for cloud computing , 2013, Journal of Cloud Computing: Advances, Systems and Applications.

[17]  Dai Yuefa Data Security Model for Cloud Computing , 2009 .

[18]  Athanasios V. Vasilakos,et al.  Security in cloud computing: Opportunities and challenges , 2015, Inf. Sci..

[19]  Rajkumar Buyya,et al.  Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility , 2022 .

[20]  Saida Makhloufi,et al.  Three powerful nature-inspired algorithms to optimize power flow in Algeria's Adrar power system , 2016 .

[21]  Xiaolei Dong,et al.  Security and privacy for storage and computation in cloud computing , 2014, Inf. Sci..