Abstract
Data traceability and recovery are very important concerns when moving data to the Cloud. The Enhanced Watermarking Approach for Data Integrity and Non-repudiation in Rational Databases (EWRDN) provides data security means as integrity, secrecy, non-repudiation and privacy using data watermarking and compression techniques. These capabilities may enhance the whole security and trust of service providers. It gives the data owners the ability to monitor and recover data, if required. Co-ordinations between different services for data storage, manipulation and retrieval over the Cloud represents the milestone in composing the Database as a Service. Until now and to the best of our knowledge, such a service is not yet realized in a real Cloud environment. In this article, a realization for a proposed EWRDN service with data traceability capabilities is elaborated with the required performance analysis which is the main contribution of this work. A Trusted Authority service co-ordination to operate the proposed service is introduced as well. The results have shown that, the proposed service co-ordination can provide the data traceability features and stands against most of the experienced data security threats through the experiments. Moreover, EWRDN service as a differentiated quality service has been proven to provide two different data compression qualities. It has been shown that within an EWRDN co-ordination, a fixed recovery ratio of compression has been achieved.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Notes
Version 12.04.
Version 1.7.0.25.
Version 7.
Version 2008.
References
Abbadi IM (2011) Middleware services at cloud virtual layer. In: 11th IEEE international conference on computer and information technology, CIT. IEEE Computer Society, pp 115–120
Abbadi IM, Deng M, Nalin M, Martin A, Petkovic M, Baroni I, Sanna A (2011) Trustworthy middleware services in the cloud. In: Third international workshop on cloud data management, CloudDB ’11. ACM Digital Library, pp 33–40
AlZain MA, Soh B, Pardede E (2013) A survey on data security issues in cloud computing: from single to multi-clouds. J Softw 8(6):1068–1078
Bajpai D, Vardhan M, Kushwaha DS (2012) Authentication and authorization interface using security service level agreements for accessing cloud services. In: 5th international conference on contemporary computing-IC3. Communications in computer and information science, vol 306. Springer, Berlin, pp 370–382
Bodden E, Clasen M, Kneis J (2007) Arithmetic coding revealed a guided tour from theory to praxis. Technical report, McGill University
Brandt J (2010) Transform coding for fast approximate nearest neighbor search in high dimensions. In: IEEE conference on computer vision and pattern recognition (CVPR), pp 1815–1822
Campbell RH, Montanari M, Farivar R (2012) A middleware for assured clouds. J Internet Serv Appl 3:87–94
Chang WY, Abu-Amara H, Sanford JF (2010) Transforming enterprise cloud services, 1st edn. Springer, Berlin
Dierks T, Rescorla E (2008) The transport layer security (TLS) protocol version 1.2. In: Internet engineering task force (IETF) RFC 4346
el-Eliemy MHM (2010) Service replication in wireless mobile ad hoc networks. PhD thesis, Friedrich Schiller University of Jena
El-Zawawi N, Hamdy M, El-Gohary R, Tolba MF (2013) A database watermarking service with a trusted authority architecture for cloud environment. Int J Comput Appl 69(13):1–9
Erl T (2005) Service-oriented architecture: concepts, technology, and design. Pearson Education, New York
Esposito C, Ficco M, Palmieri F, Castiglione A (2013) Interconnecting federated clouds by using publish-subscribe service. Clust Comput 16(4):887–903
Ficco M, Rak M (2015) Stealthy denial of service strategy in cloud computing. IEEE Trans Cloud Comput 3(1):80–94
Freier A, Kocher P, Karlton P (2011) The secure sockets layer (SSL) protocol version 3.0. In: Internet Engineering task force (IETF)
Garca-Snchez P, Gonzlez J, Castillo P, Arenas M, Merelo-Guervs J (2013) Service oriented evolutionary algorithms. Soft Comput 17(6):1059–1075
Gong Y, Ying Z, Lin M (2013) A survey of cloud computing. In: Yang Y, Ma M (eds) 2nd international conference on green communications and networks 2012 (GCN 2012): Volume 3. Lecture notes in electrical engineering, vol 225. Springer, Berlin, pp 79–84
Grandison T, Maximilien EM, Thorpe S, Alba A (2010) Towards a formal definition of a computing cloud. In: 6th world congress on services, SERVICES. IEEE Computer Society, pp 191–192
Han J, Kamber M, Pei J (2011) Data mining concepts and techniques, Chapter 3, 3rd edn. Elsevier (Morgan Kaufmann), Amsterdam
Hubbard D, Sutton M (2010) Top threats to cloud computing. Technical report, Cloud Security Alliance
Itani W, Kayssi A, Chehab A (2009) Privacy as a service: privacy-aware data storage and processing in cloud computing architectures. In: IEEE international conference on dependable, autonomic and secure computing
Ladner R, Petry F, Gupta K, Warner E, Moore P, Aha D (2008) Soft computing techniques for web services brokering. Soft Comput 12(11):1089–1098
Lemoudden M, Bouazza NB, Ouahidi BE, Bourget D (2013) A survey of cloud computing security overview of attack vectors and defense mechanisms. J Theor Appl Inf Technol 54(2)
Mell P, Grance T (2011) The NIST definition of cloud computing. Technical report SP 800–145
Modi C, Patel D, Borisaniya B, Patel A, Rajarajan M (2013) A survey on security issues and solutions at different layers of cloud computing. J Supercomput 63(2):561–592
Mohammed A, Hussein J (2010) Hybrid transform coding scheme for medical image application. In: IEEE international symposium on signal processing and information technology (ISSPIT), pp 237–240
Motahari-Nezhad HR, Stephenson B, Singhal S (2009) Outsourcing business to cloud computing services: opportunities and challenges. IEEE Internet Comput 10
National Institute of Standards and Technology (2009) FIPS PUB 186-3 digital signature standard (DSS). pub-NIST. Federal Information Processing Standard 186-3
Pearson S, Yee G (2013) Privacy and security for cloud computing. Springer, Berlin
Rong C, Nguyen ST, Jaatun MG (2013) Beyond lightning: a survey on security challenges in cloud computing. Comput Electr Eng 39(1):47–54
Ruan A, Martin A (2011) RepCloud: achieving fine-grained cloud TCB attestation with reputation systems. In: Proceedings of the sixth ACM workshop on scalable trusted computing, STC ’11. ACM Digital Library, pp 3–14
Ryan MD (2013) Cloud computing security: the scientific challenge, and a survey of solutions. J Syst Softw 86(9):2263–2268
Sako K (2011) Digital signature schemes. In: Encyclopedia of cryptography and security, 2nd edn. Springer, Berlin, pp 343–344
Sayood K (2004) Lossless compression handbook, chapter 5. Academic Press, San Diego, pp 101–152
Sood SK (2012) A combined approach to ensure data security in cloud computing. J Netw Comput Appl 35:1831–1838
Turner S, Polk T (2011) Prohibiting secure sockets layer (SSL) version 2.0. Internet engineering task force (IETF). doi:10.17487/RFC6176
Wang C, Wang Q, Ren K, Lou W (2010) Privacy preserving public auditing for data storage security in cloud computing. In: IEEE INFOCOM, pp 1–9
Zhang L-J, Zhou Q (2009) CCOA: Cloud computing open architecture. In: IEEE international conference on web services, 2009. ICWS 2009, pp 607–616
Author information
Authors and Affiliations
Corresponding author
Additional information
Communicated by V. Loia.
Rights and permissions
About this article
Cite this article
Zawawi, N., Hamdy, M., Ghary, R. et al. Realization of a data traceability and recovery service for a trusted authority service co-ordination within a Cloud environment. Soft Comput 20, 5039–5050 (2016). https://doi.org/10.1007/s00500-015-1792-4
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00500-015-1792-4