A CSO-based approach for secure data replication in cloud computing environment
- PDF / 7,184,446 Bytes
- 52 Pages / 439.37 x 666.142 pts Page_size
- 52 Downloads / 215 Views
A CSO‑based approach for secure data replication in cloud computing environment N. Mansouri1 · M. M. Javidi1 · B. Mohammad Hasani Zade1 Accepted: 26 October 2020 © Springer Science+Business Media, LLC, part of Springer Nature 2020
Abstract Cloud computing has a significant impact on information technology solutions for both organizations and researchers. Different users share critical data over the cloud where failures are normal rather than exceptional. Therefore, data fragmentation and data replication algorithms are useful to enhance data security. Three important questions need to be answered carefully: (1) Which files should be replicated; (2) how many appropriate new replicas should be placed; (3) where the new replicas should be stored. In this paper, we propose a CSO-based approach for secure data replication (SDR) that determines suitable data center for new replica by designing a smart fuzzy inference system with four inputs as centrality, energy, storage usage, and load. In addition, a high-quality knowledge base is designed to describe the fuzzy system of CSO algorithm. To obtain a higher level of security, we partition each popular file into several fragments with different sizes based on the ability of data centers. Then, these fragments are stored based on the T-coloring concept to prevent an attacker from determining the locations of the fragments. Consequently, SDR protects the data file without any encryption technique since each data center has a single fragment of a particular file and no meaningful data are achieved in a successful attack. We evaluate the proposed algorithm with CloudSim toolkit, and the experiments show that SDR strategy can reduce the total energy consumption and response time by 31% and 28% (on average) compared to other related algorithms, respectively. In terms of storage usage, effective network usage, hit ratio, mean latency, load variance, number of replications, efficiency, and bandwidth consumption, the obtained results indicate that our strategy outperforms previous replication methods by a significant margin. The main reason is that SDR successfully balances the trade-offs among objectives by the fuzzy system. Keywords Heuristic · Replication · Cloud computing · Security · Fuzzy
* N. Mansouri [email protected]; [email protected] 1
Department of Computer Science, Shahid Bahonar University of Kerman, Box No. 76135‑133, Kerman, Iran
13
Vol.:(0123456789)
N. Mansouri et al.
1 Introduction Cloud computing is getting more and more attention as a popular computing paradigm [1]. The first aim of cloud system is to decrease the cost and provide all the useful services for users and help them to focus on their main part of business [2–5]. Memory-aware resource management, energy-aware autonomic resource allocation, effective task scheduling, and data management are common challenges in such an environment [6–8]. There are growing trends in using data-intensive applications that work with large-scale datasets in cloud system. Therefore, a data management
Data Loading...