Ensuring the security and balancing the load in the cloud computing by DCRI-RI hybrid method

https://doi.org/10.53730/ijhs.v6nS2.7559

Authors

  • Abin T Abraham Department of Computer Science, Karpagam Academy of Higher Education, Coimbatore, India
  • E. J. Thomson Fredrik Department of Computer Science, Karpagam Academy of Higher Education, Coimbatore, India

Keywords:

cloud environment, security, load balancing, cryptography

Abstract

In the cloud environment, the confidentiality of data is improved by protecting the cloud data from unauthorized user access. During data communication, the balancing of load across cloud servers helps to maintain the cloud service's reliability. Through intrusion detection, the performance of secured data communication is enhanced in a significant way. Some techniques were developed in the field of cloud computing to provide secure communication between the cloud server and cloud user. These developed techniques failed to improve the security and load balancing efficiency simultaneously during the data transmission on a cloud.  There is no sufficient algorithm in the present situation to detect the intrusions and to provide improved results in the load balancing. In this research work we propose a novel "Dynamic Certificateless Random Identity (DCRI)" algorithm for ensuring cloud security and a "Rank-Indexing (RI)" algorithm based on weightage for load balancing. Our proposed DCRI-RI hybrid method will ensure a better rate of intrusion detection with higher load balancing efficiency. The DCRI algorithm is relied on a cryptographic concept based on advanced encryption and decryption signature authentication process performed on both cloud server and user end to detect and remove the unauthorized users in a significant way. 

Downloads

Download data is not yet available.

References

Yousif, M. (2017). The State of the Cloud. IEEE Cloud Computing, 4(1), 4-5. doi:10.1109/mcc.2017.4

Bhardwaj, A., & Goundar, S. (2020). Cloud Computing Security Services to Mitigate DDoS Attacks. Cloud Computing Security [Working Title]. doi:10.5772/intechopen.92683

N. Moustafa, B. Turnbull and K.-K.-R. Choo, "An ensemble intrusion detection technique based on proposed statistical flow features for protecting network traffic of Internet of Things", IEEE Internet Things J., vol. 6, no. 3, pp. 4815-4830, Jun. 2019.

N. Moustafa, G. Creech, E. Sitnikova and M. Keshk, "Collaborative anomaly detection framework for handling big data of cloud computing", Proc. Mil. Commun. Inf. Syst. Conf. (MilCIS), pp. 1-6, Nov. 2017.

N. Moustafa, G. Creech and J. Slay, "Anomaly detection system using beta mixture models and outlier detection", Progress in Computing Analytics and Networking, pp. 125-135, 2018.

M. Keshk, E. Sitnikova, N. Moustafa, J. Hu and I. Khalil, "An integrated framework for privacy-preserving based anomaly detection for cyber-physical systems", IEEE Trans. Sustain. Comput., 2019.

M. Keshk, N. Moustafa, E. Sitnikova and B. Turnbull, "Privacy-preserving big data analytics for cyber-physical systems", Wireless Netw., vol. 24, pp. 1-9, Dec. 2018.

Herman, M., Iorga, M., Salim, A. M., Jackson, R. H., Hurst, M. R., Leo, R., Sardinas, R. (2020). NIST Cloud Computing Forensic Science Challenges. doi:10.6028/nist.ir.8006

Zhang, J., Chen, B., Zhao, Y., Cheng, X., & Hu, F. (2018). Data Security and Privacy-Preserving in Edge Computing Paradigm: Survey and Open Issues. IEEE Access, 6, 18209-18237. doi:10.1109/access.2018.2820162

H. A. Alharbi, T. E. H. Elgorashi and J. M. H. Elmirghani, "Energy Efficient Virtual Machines Placement Over Cloud-Fog Network Architecture," in IEEE Access, vol. 8, pp. 94697-94718, 2020, doi: 10.1109/ACCESS.2020.2995393.

Wenhai Sun, Shucheng Yu, Wenjing Lou & Thomas Hou, Y, Hui Li 2016, ‘Protecting Your Right: Verification Attribute-Based Keyboard Search with Fine-Grained Owner-Enforced Authorization in the Cloud’, IEEE Transactions on Parallel and Distributed Systems, vol. 27, no. 4, pp. 1187-1198.

Abdul Razaque & Syed S Rizvi 2017, ‘Privacy preserving model: a new scheme for auditing cloud stakeholders’, Journal of Cloud Computing: Advances, Systems and Applications, Springer, vol. 6, no.7, pp. 1-17.

Mehdi Sookhak, Abdullah Gania, Muhammad Khurram Khan & Rajkumar Buyya 2017, ‘Dynamic Remote Data Auditing For Securing Big Data Storage In Cloud Computing’, Information Sciences, Elsevier, vol. 380, pp. 101-116.

Patel, K., Patel, N., & Patel, H. (2016, March). ”Efficient Resource Allocation Strategy to Improve Energy Consumption in Cloud Data Centers.” In Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies (p. 76). ACM.

Naeem, M., Javaid, N., Zahid, M., Abbas, A., Rasheed, S., & Rehman, S. (2018, September). ”Cloud and Fog Based Smart Grid Environment for Efficient Energy Management.” In International Conference on Intelligent Networking and Collaborative Systems (pp. 514-525). Springer, Cham.

Abraham, A.T., Thomson Fredrik, E.J. (2022). “Ensuring the Security and Load Balancing in the Cloud Environment by BPA-SAB Method”. In: Hu, YC., Tiwari, S., Trivedi, M.C., Mishra, K.K. (eds) Ambient Communications and Computer Systems. Lecture Notes in Networks and Systems, vol 356. Springer, Singapore.

Published

18-05-2022

How to Cite

Abraham, A. T., & Fredrik, E. J. T. (2022). Ensuring the security and balancing the load in the cloud computing by DCRI-RI hybrid method. International Journal of Health Sciences, 6(S2), 9776–9793. https://doi.org/10.53730/ijhs.v6nS2.7559

Issue

Section

Peer Review Articles