Ensuring the security and balancing the load in the cloud computing by DCRI-RI hybrid method
Keywords:
cloud environment, security, load balancing, cryptographyAbstract
In the cloud environment, the confidentiality of data is improved by protecting the cloud data from unauthorized user access. During data communication, the balancing of load across cloud servers helps to maintain the cloud service's reliability. Through intrusion detection, the performance of secured data communication is enhanced in a significant way. Some techniques were developed in the field of cloud computing to provide secure communication between the cloud server and cloud user. These developed techniques failed to improve the security and load balancing efficiency simultaneously during the data transmission on a cloud. There is no sufficient algorithm in the present situation to detect the intrusions and to provide improved results in the load balancing. In this research work we propose a novel "Dynamic Certificateless Random Identity (DCRI)" algorithm for ensuring cloud security and a "Rank-Indexing (RI)" algorithm based on weightage for load balancing. Our proposed DCRI-RI hybrid method will ensure a better rate of intrusion detection with higher load balancing efficiency. The DCRI algorithm is relied on a cryptographic concept based on advanced encryption and decryption signature authentication process performed on both cloud server and user end to detect and remove the unauthorized users in a significant way.
Downloads
References
Yousif, M. (2017). The State of the Cloud. IEEE Cloud Computing, 4(1), 4-5. doi:10.1109/mcc.2017.4
Bhardwaj, A., & Goundar, S. (2020). Cloud Computing Security Services to Mitigate DDoS Attacks. Cloud Computing Security [Working Title]. doi:10.5772/intechopen.92683
N. Moustafa, B. Turnbull and K.-K.-R. Choo, "An ensemble intrusion detection technique based on proposed statistical flow features for protecting network traffic of Internet of Things", IEEE Internet Things J., vol. 6, no. 3, pp. 4815-4830, Jun. 2019.
N. Moustafa, G. Creech, E. Sitnikova and M. Keshk, "Collaborative anomaly detection framework for handling big data of cloud computing", Proc. Mil. Commun. Inf. Syst. Conf. (MilCIS), pp. 1-6, Nov. 2017.
N. Moustafa, G. Creech and J. Slay, "Anomaly detection system using beta mixture models and outlier detection", Progress in Computing Analytics and Networking, pp. 125-135, 2018.
M. Keshk, E. Sitnikova, N. Moustafa, J. Hu and I. Khalil, "An integrated framework for privacy-preserving based anomaly detection for cyber-physical systems", IEEE Trans. Sustain. Comput., 2019.
M. Keshk, N. Moustafa, E. Sitnikova and B. Turnbull, "Privacy-preserving big data analytics for cyber-physical systems", Wireless Netw., vol. 24, pp. 1-9, Dec. 2018.
Herman, M., Iorga, M., Salim, A. M., Jackson, R. H., Hurst, M. R., Leo, R., Sardinas, R. (2020). NIST Cloud Computing Forensic Science Challenges. doi:10.6028/nist.ir.8006
Zhang, J., Chen, B., Zhao, Y., Cheng, X., & Hu, F. (2018). Data Security and Privacy-Preserving in Edge Computing Paradigm: Survey and Open Issues. IEEE Access, 6, 18209-18237. doi:10.1109/access.2018.2820162
H. A. Alharbi, T. E. H. Elgorashi and J. M. H. Elmirghani, "Energy Efficient Virtual Machines Placement Over Cloud-Fog Network Architecture," in IEEE Access, vol. 8, pp. 94697-94718, 2020, doi: 10.1109/ACCESS.2020.2995393.
Wenhai Sun, Shucheng Yu, Wenjing Lou & Thomas Hou, Y, Hui Li 2016, ‘Protecting Your Right: Verification Attribute-Based Keyboard Search with Fine-Grained Owner-Enforced Authorization in the Cloud’, IEEE Transactions on Parallel and Distributed Systems, vol. 27, no. 4, pp. 1187-1198.
Abdul Razaque & Syed S Rizvi 2017, ‘Privacy preserving model: a new scheme for auditing cloud stakeholders’, Journal of Cloud Computing: Advances, Systems and Applications, Springer, vol. 6, no.7, pp. 1-17.
Mehdi Sookhak, Abdullah Gania, Muhammad Khurram Khan & Rajkumar Buyya 2017, ‘Dynamic Remote Data Auditing For Securing Big Data Storage In Cloud Computing’, Information Sciences, Elsevier, vol. 380, pp. 101-116.
Patel, K., Patel, N., & Patel, H. (2016, March). ”Efficient Resource Allocation Strategy to Improve Energy Consumption in Cloud Data Centers.” In Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies (p. 76). ACM.
Naeem, M., Javaid, N., Zahid, M., Abbas, A., Rasheed, S., & Rehman, S. (2018, September). ”Cloud and Fog Based Smart Grid Environment for Efficient Energy Management.” In International Conference on Intelligent Networking and Collaborative Systems (pp. 514-525). Springer, Cham.
Abraham, A.T., Thomson Fredrik, E.J. (2022). “Ensuring the Security and Load Balancing in the Cloud Environment by BPA-SAB Method”. In: Hu, YC., Tiwari, S., Trivedi, M.C., Mishra, K.K. (eds) Ambient Communications and Computer Systems. Lecture Notes in Networks and Systems, vol 356. Springer, Singapore.
Published
How to Cite
Issue
Section
Copyright (c) 2022 International journal of health sciences

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Articles published in the International Journal of Health Sciences (IJHS) are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJHS right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.
Articles published in IJHS can be copied, communicated and shared in their published form for non-commercial purposes provided full attribution is given to the author and the journal. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
This copyright notice applies to articles published in IJHS volumes 4 onwards. Please read about the copyright notices for previous volumes under Journal History.








