New mechanism for Cloud Computing Storage Security
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 7
Abstract
Cloud computing, often referred to as simply the cloud, appears as an emerging computing paradigm which promises to radically change the way computer applications and services are constructed, delivered, managed and finally guaranteed as dynamic computing environments for end users. The cloud is the delivery of on-demand computing resources - everything from applications to data centers - over the Internet on a pay-for-use basis. The revolution of cloud computing has provided opportunities for research in all aspects of cloud computing. Despite the big progress in cloud computing technologies, funding concerns in cloud, security may limit a broader adoption. This paper presents a technique to tolerate both accidental and intentional faults, which is fragmentation-redundancy-scattering (FRS). The possibility to use the FRS technique as an intrusion tolerance one is investigated for providing secure and dependable storage in the cloud environment. Also a cloud computing security (CCS) based on the FRS technique is proposed to explore how this proposal can then be used via several scenarios. To demonstrate the robustness of the proposal, we formalize our design and we carry out a security as well as performance evaluations of the approach and we compare it with the classical model. The paper concludes by strongly suggesting future research proposals for the CCS framework.
Authors and Affiliations
Almokhtar Mrabti, Najim Ammari, Anas Kalam, Abdellah Ouahman, Mina Montfort
Software Product Line Test List Generation based on Harmony Search Algorithm with Constraints Support
In software product line (SPL), selecting product's features to be tested is an essential issue to enable the manufactories to release new products earlier than others. Practically, it is impossible to test all the produ...
Public Transportation Management System based on GPSWiFi and Open Street Maps
Information technology (IT) has transformed many industries, from education to health care to government, and is now in the early stages of transforming transportation systems. Transportation faces many issues like high...
Using Merkle Tree to Mitigate Cooperative Black-hole Attack in Wireless Mesh Networks
Security is always a major concern and a topic of hot discussion to users of Wireless Mesh Networks (WMNs). The open architecture of WMNs makes it very easy for malicious attackers to exploit the loopholes in the routing...
Medical Image Fusion Algorithm based on Local Average Energy-Motivated PCNN in NSCT Domain
Medical Image Fusion (MIF) can improve the performance of medical diagnosis, treatment planning and image-guided surgery significantly through providing high-quality and rich-information medical images. Traditional MIF t...
M/M/1/n+Flush/n Model to Enhance the QoS for Cluster Heads in MANETs
Clustering in MANET is important to achieve scalability in presence of large networks and high mobility in order to maintain the Quality of Services (QoS) of the network. Improving the QoS is the most important and cruci...