Nothing Special   »   [go: up one dir, main page]

Skip to main content
Log in

Realization of a data traceability and recovery service for a trusted authority service co-ordination within a Cloud environment

  • Methodologies and Application
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

Data traceability and recovery are very important concerns when moving data to the Cloud. The Enhanced Watermarking Approach for Data Integrity and Non-repudiation in Rational Databases (EWRDN) provides data security means as integrity, secrecy, non-repudiation and privacy using data watermarking and compression techniques. These capabilities may enhance the whole security and trust of service providers. It gives the data owners the ability to monitor and recover data, if required. Co-ordinations between different services for data storage, manipulation and retrieval over the Cloud represents the milestone in composing the Database as a Service. Until now and to the best of our knowledge, such a service is not yet realized in a real Cloud environment. In this article, a realization for a proposed EWRDN service with data traceability capabilities is elaborated with the required performance analysis which is the main contribution of this work. A Trusted Authority service co-ordination to operate the proposed service is introduced as well. The results have shown that, the proposed service co-ordination can provide the data traceability features and stands against most of the experienced data security threats through the experiments. Moreover, EWRDN service as a differentiated quality service has been proven to provide two different data compression qualities. It has been shown that within an EWRDN co-ordination, a fixed recovery ratio of compression has been achieved.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

Notes

  1. Version 12.04.

  2. Version 1.7.0.25.

  3. Version 7.

  4. Version 2008.

References

  • Abbadi IM (2011) Middleware services at cloud virtual layer. In: 11th IEEE international conference on computer and information technology, CIT. IEEE Computer Society, pp 115–120

  • Abbadi IM, Deng M, Nalin M, Martin A, Petkovic M, Baroni I, Sanna A (2011) Trustworthy middleware services in the cloud. In: Third international workshop on cloud data management, CloudDB ’11. ACM Digital Library, pp 33–40

  • AlZain MA, Soh B, Pardede E (2013) A survey on data security issues in cloud computing: from single to multi-clouds. J Softw 8(6):1068–1078

    Google Scholar 

  • Bajpai D, Vardhan M, Kushwaha DS (2012) Authentication and authorization interface using security service level agreements for accessing cloud services. In: 5th international conference on contemporary computing-IC3. Communications in computer and information science, vol 306. Springer, Berlin, pp 370–382

  • Bodden E, Clasen M, Kneis J (2007) Arithmetic coding revealed a guided tour from theory to praxis. Technical report, McGill University

  • Brandt J (2010) Transform coding for fast approximate nearest neighbor search in high dimensions. In: IEEE conference on computer vision and pattern recognition (CVPR), pp 1815–1822

  • Campbell RH, Montanari M, Farivar R (2012) A middleware for assured clouds. J Internet Serv Appl 3:87–94

    Article  Google Scholar 

  • Chang WY, Abu-Amara H, Sanford JF (2010) Transforming enterprise cloud services, 1st edn. Springer, Berlin

    Book  Google Scholar 

  • Dierks T, Rescorla E (2008) The transport layer security (TLS) protocol version 1.2. In: Internet engineering task force (IETF) RFC 4346

  • el-Eliemy MHM (2010) Service replication in wireless mobile ad hoc networks. PhD thesis, Friedrich Schiller University of Jena

  • El-Zawawi N, Hamdy M, El-Gohary R, Tolba MF (2013) A database watermarking service with a trusted authority architecture for cloud environment. Int J Comput Appl 69(13):1–9

    Google Scholar 

  • Erl T (2005) Service-oriented architecture: concepts, technology, and design. Pearson Education, New York

    Google Scholar 

  • Esposito C, Ficco M, Palmieri F, Castiglione A (2013) Interconnecting federated clouds by using publish-subscribe service. Clust Comput 16(4):887–903

    Article  Google Scholar 

  • Ficco M, Rak M (2015) Stealthy denial of service strategy in cloud computing. IEEE Trans Cloud Comput 3(1):80–94

    Article  Google Scholar 

  • Freier A, Kocher P, Karlton P (2011) The secure sockets layer (SSL) protocol version 3.0. In: Internet Engineering task force (IETF)

  • Garca-Snchez P, Gonzlez J, Castillo P, Arenas M, Merelo-Guervs J (2013) Service oriented evolutionary algorithms. Soft Comput 17(6):1059–1075

    Article  Google Scholar 

  • Gong Y, Ying Z, Lin M (2013) A survey of cloud computing. In: Yang Y, Ma M (eds) 2nd international conference on green communications and networks 2012 (GCN 2012): Volume 3. Lecture notes in electrical engineering, vol 225. Springer, Berlin, pp 79–84

  • Grandison T, Maximilien EM, Thorpe S, Alba A (2010) Towards a formal definition of a computing cloud. In: 6th world congress on services, SERVICES. IEEE Computer Society, pp 191–192

  • Han J, Kamber M, Pei J (2011) Data mining concepts and techniques, Chapter 3, 3rd edn. Elsevier (Morgan Kaufmann), Amsterdam

  • Hubbard D, Sutton M (2010) Top threats to cloud computing. Technical report, Cloud Security Alliance

  • Itani W, Kayssi A, Chehab A (2009) Privacy as a service: privacy-aware data storage and processing in cloud computing architectures. In: IEEE international conference on dependable, autonomic and secure computing

  • Ladner R, Petry F, Gupta K, Warner E, Moore P, Aha D (2008) Soft computing techniques for web services brokering. Soft Comput 12(11):1089–1098

    Article  Google Scholar 

  • Lemoudden M, Bouazza NB, Ouahidi BE, Bourget D (2013) A survey of cloud computing security overview of attack vectors and defense mechanisms. J Theor Appl Inf Technol 54(2)

  • Mell P, Grance T (2011) The NIST definition of cloud computing. Technical report SP 800–145

  • Modi C, Patel D, Borisaniya B, Patel A, Rajarajan M (2013) A survey on security issues and solutions at different layers of cloud computing. J Supercomput 63(2):561–592

    Article  Google Scholar 

  • Mohammed A, Hussein J (2010) Hybrid transform coding scheme for medical image application. In: IEEE international symposium on signal processing and information technology (ISSPIT), pp 237–240

  • Motahari-Nezhad HR, Stephenson B, Singhal S (2009) Outsourcing business to cloud computing services: opportunities and challenges. IEEE Internet Comput 10

  • National Institute of Standards and Technology (2009) FIPS PUB 186-3 digital signature standard (DSS). pub-NIST. Federal Information Processing Standard 186-3

  • Pearson S, Yee G (2013) Privacy and security for cloud computing. Springer, Berlin

    Book  Google Scholar 

  • Rong C, Nguyen ST, Jaatun MG (2013) Beyond lightning: a survey on security challenges in cloud computing. Comput Electr Eng 39(1):47–54

  • Ruan A, Martin A (2011) RepCloud: achieving fine-grained cloud TCB attestation with reputation systems. In: Proceedings of the sixth ACM workshop on scalable trusted computing, STC ’11. ACM Digital Library, pp 3–14

  • Ryan MD (2013) Cloud computing security: the scientific challenge, and a survey of solutions. J Syst Softw 86(9):2263–2268

  • Sako K (2011) Digital signature schemes. In: Encyclopedia of cryptography and security, 2nd edn. Springer, Berlin, pp 343–344

  • Sayood K (2004) Lossless compression handbook, chapter 5. Academic Press, San Diego, pp 101–152

    Google Scholar 

  • Sood SK (2012) A combined approach to ensure data security in cloud computing. J Netw Comput Appl 35:1831–1838

    Article  Google Scholar 

  • Turner S, Polk T (2011) Prohibiting secure sockets layer (SSL) version 2.0. Internet engineering task force (IETF). doi:10.17487/RFC6176

  • Wang C, Wang Q, Ren K, Lou W (2010) Privacy preserving public auditing for data storage security in cloud computing. In: IEEE INFOCOM, pp 1–9

  • Zhang L-J, Zhou Q (2009) CCOA: Cloud computing open architecture. In: IEEE international conference on web services, 2009. ICWS 2009, pp 607–616

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohamed Hamdy.

Additional information

Communicated by V. Loia.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zawawi, N., Hamdy, M., Ghary, R. et al. Realization of a data traceability and recovery service for a trusted authority service co-ordination within a Cloud environment. Soft Comput 20, 5039–5050 (2016). https://doi.org/10.1007/s00500-015-1792-4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-015-1792-4

Keywords

Navigation