A Security-Aware Data Placement Mechanism for Big Data Cloud Storage Systems

Public clouds have become an attractive candidate to meet the ever-growing storage demands. However, storing data in public clouds increases data retrieval time and threat level for data security. These challenges drive the need for intelligent methods that solve the data placement problem to achieve high performance while satisfying the security requirement. In this paper, we propose a novel approach for data placement in cloud storage systems addressing the above challenges. With the security constraint, we first formulate the data placement problem as a linear programming model that minimizes the total retrieval time of a data, which is divided and distributed over storage nodes. We then develop a heuristic algorithm namely Security-awarE Data placement mechanism for cLOUd storage Systems (SEDuLOUS) to solve the problem. We demonstrate the effectiveness of the proposed algorithm through comprehensive simulations. The simulation results show that the proposed algorithm significantly reduces the retrieval time by up to 20% for the random-network-topology systems and 19% for the Internet2-topology system compared to baseline methods, which consider only the security requirement.

[1]  Albert Y. Zomaya,et al.  Energy-efficient data replication in cloud computing datacenters , 2013, GLOBECOM Workshops.

[2]  Peng Li,et al.  On the optimal placement of secure data objects over Internet , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.

[3]  Kefei Chen,et al.  YI Cloud: Improving user privacy with secret key recovery in cloud storage , 2011, Proceedings of 2011 IEEE 6th International Symposium on Service Oriented System (SOSE).

[4]  Andrew V. Goldberg,et al.  Computing the shortest path: A search meets graph theory , 2005, SODA '05.

[5]  P. Pardalos,et al.  The Graph Coloring Problem: A Bibliographic Survey , 1998 .

[6]  Chaitanya Swamy,et al.  Approximation Algorithms for Data Placement Problems , 2008, SIAM J. Comput..

[7]  Bin Tang,et al.  Data Replication in Data Intensive Scientific Applications with Performance Guarantee , 2011, IEEE Transactions on Parallel and Distributed Systems.

[8]  Ayman I. Kayssi,et al.  Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.

[9]  Tao Xie,et al.  A static data placement strategy towards perfect load-balancing for distributed storage clusters , 2008, 2008 IEEE International Symposium on Parallel and Distributed Processing.

[10]  Wenying Zeng,et al.  Research on cloud storage architecture and key technologies , 2009, ICIS.

[11]  Seungmin Kang,et al.  ESPRESSO: An Encryption as a Service for Cloud Storage Systems , 2014, AIMS.

[12]  Cong Wang,et al.  Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.

[13]  Meikang Qiu,et al.  Privacy Protection for Preventing Data Over-Collection in Smart City , 2016, IEEE Transactions on Computers.

[14]  W. K. Hale Frequency assignment: Theory and applications , 1980, Proceedings of the IEEE.