A Security-aware Data Placement Mechanism for Big Data Cloud Storage Systems

被引:8
|
作者
Kang, Seungmin [1 ]
Veeravalli, Bharadwaj [1 ]
Aung, Khin Mi Mi [2 ]
机构
[1] Natl Univ Singapore, Dept Elect & Comp Engn, Singapore, Singapore
[2] ASTAR, Data Storage Inst, Singapore, Singapore
关键词
Security; data placement; cloud storage system; T-coloring; minimum retrieval time;
D O I
10.1109/BigDataSecurity-HPSC-IDS.2016.8
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Public clouds have become an attractive candidate to meet the ever-growing storage demands. However, storing data in public clouds increases data retrieval time and threat level for data security. These challenges drive the need for intelligent methods that solve the data placement problem to achieve high performance while satisfying the security requirement. In this paper, we propose a novel approach for data placement in cloud storage systems addressing the above challenges. With the security constraint, we first formulate the data placement problem as a linear programming model that minimizes the total retrieval time of a data, which is divided and distributed over storage nodes. We then develop a heuristic algorithm namely Security-awarE Data placement mechanism for cLOUd storage Systems (SEDuLOUS) to solve the problem. We demonstrate the effectiveness of the proposed algorithm through comprehensive simulations. The simulation results show that the proposed algorithm significantly reduces the retrieval time by up to 20% for the random-network-topology systems and 19% for the Internet2-topology system compared to baseline methods, which consider only the security requirement.
引用
收藏
页码:327 / 332
页数:6
相关论文
共 50 条
  • [1] Security-Aware Efficient Mass Distributed Storage Approach for Cloud Systems in Big Data
    Gai, Keke
    Qiu, Meikang
    Zhao, Hui
    2016 IEEE 2ND INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY), IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC), AND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2016, : 140 - 145
  • [2] Security-aware intermediate data placement strategy in scientific cloud workflows
    Wei Liu
    Su Peng
    Wei Du
    Wei Wang
    Guo Sun Zeng
    Knowledge and Information Systems, 2014, 41 : 423 - 447
  • [3] Security-aware intermediate data placement strategy in scientific cloud workflows
    Liu, Wei
    Peng, Su
    Du, Wei
    Wang, Wei
    Zeng, Guo Sun
    KNOWLEDGE AND INFORMATION SYSTEMS, 2014, 41 (02) : 423 - 447
  • [4] Security-Aware and Efficient Data Deduplication for Edge-Assisted Cloud Storage Systems
    Xie, Qingyuan
    Zhang, Chen
    Jia, Xiaohua
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (03) : 2191 - 2202
  • [5] A security-aware data replica placement strategy based on fuzzy evaluation in the cloud
    Wu Xiuguo
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2018, 35 (01) : 243 - 255
  • [6] Big Data Aware Virtual Machine Placement in Cloud Data Centers
    Hall, Logan
    Harris, Bryan
    Tomes, Erica
    Altiparmak, Nihat
    BDCAT'17: PROCEEDINGS OF THE FOURTH IEEE/ACM INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING, APPLICATIONS AND TECHNOLOGIES, 2017, : 209 - 218
  • [7] Security-Aware Data-Driven Intelligent Transportation Systems
    Malik, Jahanzaib
    Akhunzada, Adnan
    Bibi, Iram
    Talha, Muhammad
    Jan, Mian Ahmad
    Usman, Muhammad
    IEEE SENSORS JOURNAL, 2021, 21 (14) : 15859 - 15866
  • [8] Intelligent Data Placement Mechanism for Replicas Distribution in Cloud Storage Systems
    Ibrahim, Ibrahim Adel
    Dai, Wei
    Bassiouni, Mostafa
    2016 IEEE INTERNATIONAL CONFERENCE ON SMART CLOUD (SMARTCLOUD), 2016, : 134 - 139
  • [9] Enhanced security-aware technique and ontology data access control in cloud computing
    Kiran, Gangasandra Mahadevaiah
    Nalini, Narasimhaiah
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (15)
  • [10] Research on the Cloud Storage Security in Big Data Era
    Chen Kai
    Lang Weimin
    Zheng Ke
    Ouyang Wenjing
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON APPLIED SCIENCE AND ENGINEERING INNOVATION, 2015, 12 : 659 - 664