Mitigating Disaster using Secure Threshold-Cloud Architecture

Journal Title: Current Trends in Computer Sciences & Applications - Year 2018, Vol 1, Issue 2

Abstract

There are many risks in moving data into public cloud environments, along with an increasing threat around large-scale data leakage during cloud outages. This work aims to apply secret sharing methods as used in cryptography to create shares of cryptographic key, disperse and recover the key when needed in a multi-cloud environment. It also aims to prove that the combination of secret sharing scheme and multi-clouds can be used to provide a new direction in disaster management by using it to mitigate cloud outages rather than current designs of recovery after the outages. Experiments were performed using ten different cloud services providers at share policies of 2 from 5, 3 from 5, 4 from 5, 4 from 10, 6 from 10 and 8 from 10 for which at different times of cloud outages key recovery were still possible and even faster compared to normal situations. All the same, key recovery was impossible when the number of cloud outages exceeded secret sharing defined threshold. To ameliorate this scenario, we opined a resilient system using the concept of self-organization as proposed by Nojoumian et al in 2012 in improving resource availability but with some modifications to the original concept. The proposed architecture is as presented in our Poster: Improving Resilience in Multi-Cloud Architecture.

Authors and Affiliations

Elochukwu Ukwandu, William J Buchanan, Gordon Russell

Keywords

Related Articles

Numerical Solution of Boundary Layer Flow of Viscous Fluid Via Successive Linearization Method

The aim of this work is to obtain the numerical solutions for the boundary layer flow of heat transfer of incompressible viscous fluid. The governing partial differential equations are converted into ordinary differentia...

Self-Payment Fraud Detection on Automated Teller Machine

Over the past decade the amount of transactions and reported frauds on Automated Teller Machines (ATM) has significantly increased. Various types of frauds have been reported around misusing ATM cards and many methods ha...

Mini View on Current Trends in Computer Sciences & Applications

Computer science has contributed a lot for making the life of human being smooth. The recent developments in the field of computer science are proven to be more smarter and more applicable structures result from marrying...

In Pursuit of Privacy: An Introduction to Anonymization Technologies

Privacy in the age of pervasive computing and networking is a very hard topic to fully grasp. Any serious attempt at discussing it must take many different angles into account. User interactions grow richer month after m...

Comparison Between Second Zagreb Eccentricity Index and Eccentric Connectivity Index of Graphs

Throughout this paper we only consider the finite, undirected, simple and connected graphs. The degree of v ∊ V(G), denoted by degG(v), is the number of vertices in G adjacent to v. For any two vertices u; v in a graph G...

Download PDF file
  • EP ID EP580418
  • DOI 10.32474/CTCSA.2018.01.000107
  • Views 63
  • Downloads 0

How To Cite

Elochukwu Ukwandu, William J Buchanan, Gordon Russell (2018). Mitigating Disaster using Secure Threshold-Cloud Architecture. Current Trends in Computer Sciences & Applications, 1(2), 23-27. https://europub.co.uk/articles/-A-580418