Abstract
Cloud storages have recently increased rapidly in many organizations as they provide many benefits and advantages for the users. These advantages include easiness in use, unlimited capacity in storage, scalability and cost effectiveness. This has motivated the concerns regarding the cloud issues including cost, performance and security. Many different schemes have been proposed to address the issues of cloud storage. Each scheme considers these issues from different perspectives without employing an optimal solution that fully satisfies the user requirements. In real world applications, the client's objectives to move to cloud storage vary from single objective to several conflicting objectives. As a result, there is a need to find a tradeoff setup for a multiple cloud storage scheme. This paper proposed Smart Cloud Optimal Resource Selection (SCORS) scheme by applying non-dominated sorting genetic algorithm (NSGA-2) to resolve the user's conflicting requirements. Our optimal solution facilitates setting up multiple cloud storages in an optimized way based on the objectives specified. Since each user has different objectives, all combinations of cloud storage client needs are collected and transformed into different multi-objective optimization problems with constraints and bounds. Experiment results show that SCORS scheme determine the optimal solution from the set of feasible solutions in an efficient way.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Alsolami, F. J. (2015). Toward secure sensitive data in the cloud. Ph.D. dissertation, University of Colorado, Colorado Springs.
Deb, K., Pratap, A., Agarwal, S., & Meyarivan, T. (2002). A fast and elitist multiobjective genetic algorithm: NSGA-II. IEEE Transactions on Evolutionary Computation, 6, 182–197.
Latha, B., Senthilkumar, V. S. (2009). Simulation optimization of process parameters in composite drilling process using multi-objective evolutionary algorithm. In ARTCom’09. International conference on advances in recent technologies in communication and computing, 2009 (pp. 79–82). IEEE. Kottayam, Kerala.
Xiong, H., Zhang, X., Yao, D., Wu, X., Wen, Y. (2012). Towards end-to-end secure content storage and delivery with public cloud. In Proceedings of the second ACM conference on data and application security and privacy (pp. 257–266). ACM. San Antonio, TX.
Kumbhare, A., & Simmhan, Y., Prasanna, V. (2012). Cryptonite: A secure and performant data repository on public clouds. In 2012 I.E. 5th international conference on cloud computing (CLOUD) (pp. 510–517). IEEE. Honolulu, Hawaii.
Alsolami, F., & Chow, C. E. ( 2013). N-cloud: Improving performance and security in cloud storage. In 2013 I.E. 14th international conference on high performance switching and routing (HPSR) (pp. 221–222) IEEE. Taipei, Taiwan.
Alsolami, F., & Boult, T. E. (2014). Cloudstash: Using secret-sharing scheme to secure data, not keys, in multi-clouds. In 2014 11th international conference on information technology: New generations (ITNG) (pp. 315–320). IEEE. Las Vegas, NV, USA.
Bessani, A., Correia, M., Quaresma, B., André, F., & Sousa, P. (2013). Depsky: Dependable and secure storage in a cloud-of-clouds. ACM Transactions on Storage (TOS), 9, 12.
Shamir, A. (1979). How to share a secret. Communications of the ACM, 22, 612–613.
AlZain, M. A., Pardede, E., Soh, B., Thom, J. A. (2012). Cloud computing security: From single to multi-clouds. In 2012 45th Hawaii international conference on system science (HICSS) (pp. 5490–5499). IEEE. Maui, HI.
Feldman, A. J., Zeller, W. P., Freedman, M. J., Felten, E. W. (2010). SPORC: Group collaboration using untrusted cloud resources. In OSDI’10 proceedings of the 9th USENIX conference on operating systems design and implementation (pp. 337–350). Berkeley, CA: USENIX Association.
Santos, N., Gummadi, K. P., Rodrigues, R. (2009). Towards trusted cloud computing. In HotCloud’09 proceedings of the 2009 conference on hot topics in cloud computing. Berkeley, CA: USENIX Association
Wang, H., Zhao, Z., Li, X., He, C., Qi, Q., Sun, J. (2013). A scheme to ensure data security of cloud storage. In 2013 I.E. international conference on service operations and logistics, and informatics (SOLI) (pp. 79–82). IEEE. Dongguan.
Lei, D., Zhou, K., Jin, H., Liu, J., Wei, R. (2014). SFDS: A security and flexible data sharing scheme in cloud environment. In 2014 international conference on cloud computing and big data (CCBD). Wuhan, Hubei. (pp. 101–108).
Sarvabhatla, M., Vorugunti, C. S. (2015). A robust mutual authentication scheme for data security in cloud architecture. In 2015 7th international conference on communication systems and networks (COMSNETS) (pp. 1–6). IEEE. Bangalore.
Deshmukh, A., Mihovska, A., Prasad, R. (2012). A cloud computing security schemes: TGOS [threshold group- oriented signature] and TMS [threshold multisignature schemes]. In 2012 world congress on information and communication technologies (WICT). (pp. 203–208). IEEE. Trivandrum.
Mazur, S., Blasch, E., Chen, Y., Skormin, V. (2011). Mitigating cloud computing security risks using a self-monitoring defensive scheme. In Proceedings of the 2011 I.E. national aerospace and electronics conference (NAECON) (pp. 39–45). IEEE. Dayton, OH.
Cachin, C., Haas, R., Vukolic, M. (2010) Dependable storage in the intercloud (Research Report RZ, 3783).
Balasaraswathi, V. R., Manikandan, S. (2014). Enhanced security for multi-cloud storage using cryptographic data splitting with dynamic approach. In 2014 international conference on advanced communication control and computing technologies (ICACCCT) (pp. 1190–1194). IEEE. Tamilnadu.
Popa, R. A., Lorch, J. R., Molnar, D., Wang, H. J., & Zhuang, L. (2011). Enabling security in cloud storage slas with cloudproof. USENIX Annual Technical Conference, 242, 31.
Mahajan, P., Setty, S., Lee, S., Clement, A., Alvisi, L., Dahlin, M., & Walfish, M. (2011). Depot: Cloud storage with minimal trust. ACM Transactions on Computer Storage (TOCS), 29, 12.
MOEA Framework (A Free and Open Source Java Framework for Multiobjective Optimization). [Online]. Available: http://moeaframework.org/
Amazon Simple Storage Service (Amazon S3). [Online]. Available: http://aws.amazon.com/s3
Anthes, G. (2010). Security in the cloud. Communications of the ACM, 53(11), 16–18.
Choo, K.-K.R. (2010). Cloud computing: Challenges and future directions. Trends and Issues in Crime and Criminal Justice, 400, 1.
Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., et al. (2010). A view of cloud computing. Communications of the ACM, 53(4), 50–58.
Cachin, C., Keidar, I., & Shraer, A. (2009). Trusting the cloud. ACM SIGACT News, 40(2), 81–86.
Rocha, F., & Correia, M. (2011). Lucy in the sky without diamonds: Stealing confidential data in the cloud. In 2011 IEEE/IFIP 41st international conference on dependable systems and networks workshops (DSN-W) (pp. 129–134). IEEE. Hong Kong.
Patterson, D. A., Gibson, G., & Katz, R. H. (1988). A case for redundant arrays of inexpensive disks (RAID). ACM SIGMOD Record, 17(3), 109–116.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Alsolami, F., Sayid, Y., Zaied, N., Sayid, I., Ismail, I. (2018). SCORS: Smart Cloud Optimal Resource Selection. In: Latifi, S. (eds) Information Technology - New Generations. Advances in Intelligent Systems and Computing, vol 558. Springer, Cham. https://doi.org/10.1007/978-3-319-54978-1_24
Download citation
DOI: https://doi.org/10.1007/978-3-319-54978-1_24
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-54977-4
Online ISBN: 978-3-319-54978-1
eBook Packages: EngineeringEngineering (R0)