A security-aware data replica placement strategy based on fuzzy evaluation in the cloud

被引:3
|
作者
Wu Xiuguo [1 ]
机构
[1] Shandong Univ Finance & Econ, Sch Management Sci & Engn, Jinan 250014, Shandong, Peoples R China
基金
中国国家自然科学基金;
关键词
Cloud storage; replicas placements; security; fuzzy; Qos;
D O I
10.3233/JIFS-169584
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Replication technology is one of the most effective measure to improve the cloud data availability and reduce the response time, by put multiple copies on different data centers in the cloud. However, traditional replica placement strategies mainly focused on the performance improvement, such as transfer time reduction, load balancing and so on, with little attention to their safety storage, which inevitably result in new security risks towards replicas' correct access. Aimed to develop an intelligent solution to enhance the cloud storage system performance, we apply fuzzy comprehensive evaluation to candidate data centers, evaluating its security risk level as replica placements, therefore improve the quality of cloud storage system. First, a novel five-dimensional security model for replica placement is proposed. Then, a security-aware replica placement evaluation algorithm is designed and implemented based on fuzzy set and entropy weight theory to establish a fusion of multiple factors of assessment model. Through comparing the experiment results with the outcome of the different strategies, we can see that data replica availability probability of the proposed strategy is up to 85% and less wait latency can be achieved, indicating the better effectiveness and practicality.
引用
收藏
页码:243 / 255
页数:13
相关论文
共 50 条
  • [1] Data set replica placement strategy based on fuzzy evaluation in the cloud
    Wu, Xiuguo
    Guan, Hongjun
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2016, 31 (06) : 2859 - 2868
  • [2] Security-aware intermediate data placement strategy in scientific cloud workflows
    Wei Liu
    Su Peng
    Wei Du
    Wei Wang
    Guo Sun Zeng
    Knowledge and Information Systems, 2014, 41 : 423 - 447
  • [3] Security-aware intermediate data placement strategy in scientific cloud workflows
    Liu, Wei
    Peng, Su
    Du, Wei
    Wang, Wei
    Zeng, Guo Sun
    KNOWLEDGE AND INFORMATION SYSTEMS, 2014, 41 (02) : 423 - 447
  • [4] Security-aware data replica selection strategy for Bag-of-Tasks application in cloud computing
    Yang, Yuli
    Peng, Xinguang
    Wan, Xiaohong
    JOURNAL OF HIGH SPEED NETWORKS, 2015, 21 (04) : 299 - 311
  • [5] A Security-aware Data Placement Mechanism for Big Data Cloud Storage Systems
    Kang, Seungmin
    Veeravalli, Bharadwaj
    Aung, Khin Mi Mi
    2016 IEEE 2ND INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY), IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC), AND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2016, : 327 - 332
  • [6] A security-aware virtual machine placement in the cloud using hesitant fuzzy decision-making processes
    Feizollahibarough, Sattar
    Ashtiani, Mehrdad
    JOURNAL OF SUPERCOMPUTING, 2021, 77 (06): : 5606 - 5636
  • [7] A security-aware virtual machine placement in the cloud using hesitant fuzzy decision-making processes
    Sattar Feizollahibarough
    Mehrdad Ashtiani
    The Journal of Supercomputing, 2021, 77 : 5606 - 5636
  • [8] Definition of security metrics for the Cloud Computing and security-aware virtual machine placement algorithms
    Caron, Eddy
    Le, Anh Dung
    Lefray, Arnaud
    Toinard, Christian
    2013 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2013, : 125 - 131
  • [9] An Advanced Security-Aware Cloud Architecture
    Bobelin, Laurent
    Bousquet, Aline
    Briffaut, Jeremy
    Couturier, Jean-Francois
    Toinard, Christian
    Caron, Eddy
    Lefray, Arnaud
    Rouzaud-Cornabas, Jonathan
    2014 INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING & SIMULATION (HPCS), 2014, : 572 - 579
  • [10] Performance Evaluation of Security-Aware List Scheduling Algorithms in IaaS Cloud
    Djigal, Hamza
    Feng, Jun
    Lu, Jiamin
    2020 20TH IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND INTERNET COMPUTING (CCGRID 2020), 2020, : 330 - 339