CFP last date
20 January 2025
Reseach Article

Providing Data Security in Cloud Computing using Novel and Mixed Agent based Approach

by Siva Tarigonda, Ganesh A, Srinivasulu Asadi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 112 - Number 6
Year of Publication: 2015
Authors: Siva Tarigonda, Ganesh A, Srinivasulu Asadi
10.5120/19670-1180

Siva Tarigonda, Ganesh A, Srinivasulu Asadi . Providing Data Security in Cloud Computing using Novel and Mixed Agent based Approach. International Journal of Computer Applications. 112, 6 ( February 2015), 15-19. DOI=10.5120/19670-1180

@article{ 10.5120/19670-1180,
author = { Siva Tarigonda, Ganesh A, Srinivasulu Asadi },
title = { Providing Data Security in Cloud Computing using Novel and Mixed Agent based Approach },
journal = { International Journal of Computer Applications },
issue_date = { February 2015 },
volume = { 112 },
number = { 6 },
month = { February },
year = { 2015 },
issn = { 0975-8887 },
pages = { 15-19 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume112/number6/19670-1180/ },
doi = { 10.5120/19670-1180 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:48:44.044505+05:30
%A Siva Tarigonda
%A Ganesh A
%A Srinivasulu Asadi
%T Providing Data Security in Cloud Computing using Novel and Mixed Agent based Approach
%J International Journal of Computer Applications
%@ 0975-8887
%V 112
%N 6
%P 15-19
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Determining the user's trust is a growing concern for ensuring privacy and security in a cloud computing environment. In a cloud, user's data is stored in one or more remote server(s) which poses more security challenges for the system. Most important concern is to protect user's sensitive information from other users and hackers who may cause data leakage in cloud storage. This paper is to aims towards proposing a new trusted and collaborative agent-based two-tier framework to protect cloud resources. Uniqueness of the proposed security solution is to ensure security and privacy both at the service provider level as well as at the user level in a cloud environment. Existing System is mainly designed under traditional cryptography techniques which will be frequently affected with attacks such as SQL injections, Cross Site Scripting, Domain name service (DNS) attack, Denial of service (DOS) attack and Distributed Denial of service (DDOS) attack. Disadvantages of Existing System is less secured, It is frequently affected with attacks such as SQL injection, Cross Site Scripting, Domain Name Service (DNS) attack, Denial of Service (DOS) attack, Distributed Denial of Service (DDOS) attack, there is frequent data leakage and it has poor performance. Proposed Cloud Security Framework is Two-tier Architecture includes Broker Domain and Cloud Service Provider Domain. Another one is Broker Domain includes Cloud Service User (CSU), Proxy Server and Cloud Service User Agent (CSU_A). Another one is Cloud Service Provider Domain includes Cloud Service Provider (CSP) and Cloud Service Provider Agent (CSP_A). Features of Proposed Model are domain-based and set a special trust agent in each domain to manage trust. It distinguishes two different roles in cloud: customer and provider and designs different trust strategies for them. Advantages are Domain remains unaffected (with only decreased amount of trust degree than that of non?trusted users) when a said non?trusted CSU does malicious activities in the system. The trust degree of the domain will decrease accordingly with the malicious activities and updating policies. The CSP_A and CSU_A maintain their own databases, user activities information and updated trust degrees for calculating updated trust degree. It provides more security when compared to earlier models. The performance of the system is high to that of the previous models.

References
  1. Shantanu Pal, SunirmalKhatua, Nabendu Chaki, SugataSanyal, "A New Trusted and Collaborative Agent Based Approach for Ensuring Cloud Security", Annals of faculty engineering hunedoara – International Journal Of Engineering,2012.
  2. Mell, Peter, and Tim Grance. "The NIST definition of cloud computing. " National Institute of Standards and Technology 53. 6 (2009): 50.
  3. G. Reese, Cloud Application Architectures: Building Applications and Infrastructure in the Cloud, in: Theory in Practice, O'Reilly Media, 2009.
  4. B. Rajkumar, C. Yeo, S. Venugopal, S. Malpani, Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5thutility, Future Generation Computer Systems (2009).
  5. Ramgovind, S. , Mariki M. Eloff, and E. Smith. "The management of security in cloud computing. " Information Security for South Africa (ISSA), 2010, IEEE, 2010.
  6. Armbrust, Michael, et al. "A view of cloud computing. " Communications of the ACM 53. 4 (2010): 50-58.
  7. Blaze M, loannidis J, Keromytis A D. : Experience with the KeyNote Trust Management System, Applications and Future Directions[C]. iTrust 2003, pp. 284-300(2003).
  8. XiangyiMeng, Guangwei Zhang, Jianchu Kang, Hesong Li, Deyi Li. : A New Subjective Trust Model Based on Cloud Model. ICNSC 2008, 5th IEEE International Conference on Networking, Sensing and Control Sanya China April 6-8, 2008.
  9. LI Xiao-Yong, GUI Xiao-Lin. : Research on Dynamic Trust Model for Large Scale Distributed Environment. Journal of Software, vol. 18 (6), pp. 1510-1521. Beijing (2007).
  10. Li, W. , Wang, X. , Fu, Y. , Fu, Z. : "Study on Several Trust Models in Grid Environment". Journal of Fuzhou University Natural Science Edition 34(2), pp. 189-193, 2006.
  11. Youseff, L. Butrico, M. Da Silva, D. " Toward a Unified Ontology of Cloud Computing". In: Grid Computing Environments Workshop, 2008. GCE '08, pp. 1-10, November 2008.
  12. RajkumarBuyya, Chee Shin Yeo1and SrikumarVenugopal "Market- Oriented Cloud Computing: Vision, Hype, and Reality for Delivering IT Services as Computing Utilities". In: HPCC 2008, 10th IEEE International Conference on High Performance Computing and Communications, pp. 5-13, 2008.
  13. RajkumarBuyya, Rajiv Ranjan and Rodrigo N. Calheiros "Modeling and Simulation of Scalable Cloud Computing Environments and the CloudSim Toolkit: Challenges and Opportunities". In: Proc. of the 7th High Performance Computing and Simulation Conference (HPCS09), IEEE Computer Society, June 2009.
  14. Cyril Onwubiko, "Security Issues to Cloud Computing", in Cloud Computing: Principles, Systems and Applications, Computer Communications and Networks, N. Antonopoulos and L. Gillam (Eds. ), Springer?Verlag London Limited 2010, DOI 10. 1007/978?1?84996?241?4_16, pp. 271?288, 2010.
  15. Wenjuan Li and Lingdi Ping, "Trust Model to Enhance Security and Interoperability of Cloud Environment", Proc. of CloudCom 2009, Springer?Verlag Berlin Heidelberg 2009, LNCS 5931, pp. 69–79, 2009.
  16. Jeff Sedayao, Steven Su, Xiaohao Ma, Minghao Jiang, and Kai Miao, "A Simple Technique for Securing Data at Rest Stored in a Computing Cloud", Proc. of CloudCom 2009, Springer?Verlag Berlin Heidelberg 2009, LNCS 5931, pp. 553–558,
  17. Jin?Song Xu, Ru?Cheng Huang, Wan?Ming Huang, and Geng Yang, "Secure Document Service for Cloud Computing", Proc. of CloudCom 2009, Springer?Verlag Berlin Heidelberg 2009, LNCS 5931, pp. 541–546, 2009.
  18. Marios D. Dikaiakos, DimitriosKatsaros, PankajMehra, George Pallis and Athena Vakali, "Cloud Computing: Distributed Internet Computing for IT andScientific Research" in IEEE Internet Computing, IEEE Computer Society, pp. 10?13, September/October 2009, Vol. 13 No. 5, DOI: doi:10. 1109/MIC. 2009. 103.
  19. Char Sample, Senior Scientist, BBN Technologies, Diana Kelley, Partner, Security Curve, "Cloud computing security: Routing and DNS security threats", http://searchsecurity. techtarget. com/.
  20. Siani Pearson, Yun Shen and Miranda Mowbray, "A Privacy Manager for Cloud Computing", in CloudCom 2009, LNCS 5931, M. G. Jaatun, G. Zhao, and C. Rong (Eds. ), Springer?Verlag Berlin Heidelberg 2009, pp. 90–106, 2009.
  21. FlorinaAlmenarez, Andres Mar?n, Celeste Campo and Carlos Garc?a R. , "PTM: A Pervasive Trust Management Model for Dynamic Open Environments", Proceedings of First Workshop on Pervasive Security, Privacy and Trust PSPT'04, Boston, MA, USA, 2004.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud security Denial of service (DOS) attack ensuring privacy and security Distributed Denial of service (DDOS) Domain Name Service (DNS) Cloud Service User (CSU) Proxy Server and Cloud Service User Agent (CSU_A) cloud computing environment VM (Virtual Machine) monitoring system.