A security-aware data replica placement strategy based on fuzzy evaluation in the cloud

被引:3
|
作者
Wu Xiuguo [1 ]
机构
[1] Shandong Univ Finance & Econ, Sch Management Sci & Engn, Jinan 250014, Shandong, Peoples R China
基金
中国国家自然科学基金;
关键词
Cloud storage; replicas placements; security; fuzzy; Qos;
D O I
10.3233/JIFS-169584
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Replication technology is one of the most effective measure to improve the cloud data availability and reduce the response time, by put multiple copies on different data centers in the cloud. However, traditional replica placement strategies mainly focused on the performance improvement, such as transfer time reduction, load balancing and so on, with little attention to their safety storage, which inevitably result in new security risks towards replicas' correct access. Aimed to develop an intelligent solution to enhance the cloud storage system performance, we apply fuzzy comprehensive evaluation to candidate data centers, evaluating its security risk level as replica placements, therefore improve the quality of cloud storage system. First, a novel five-dimensional security model for replica placement is proposed. Then, a security-aware replica placement evaluation algorithm is designed and implemented based on fuzzy set and entropy weight theory to establish a fusion of multiple factors of assessment model. Through comparing the experiment results with the outcome of the different strategies, we can see that data replica availability probability of the proposed strategy is up to 85% and less wait latency can be achieved, indicating the better effectiveness and practicality.
引用
收藏
页码:243 / 255
页数:13
相关论文
共 50 条
  • [31] An energy-efficient data replica dynamic placement strategy for cloud storage
    Lin, Qingying
    Zhao, Yuelong
    ICIC Express Letters, 2016, 10 (02): : 425 - 431
  • [32] A data replica placement strategy for IoT workflows in collaborative edge and cloud environments
    Shao, Yanling
    Li, Chunlin
    Tang, Hengliang
    COMPUTER NETWORKS, 2019, 148 : 46 - 59
  • [33] Inherent Security-aware Resource Utilizing Methodology for Cloud Environments
    Krishnan, C. Gopala
    Julie, E. Golden
    Robinson, Y. Harold
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 120 (01) : 9 - 26
  • [34] Inherent Security-aware Resource Utilizing Methodology for Cloud Environments
    C. Gopala Krishnan
    E. Golden Julie
    Y. Harold Robinson
    Wireless Personal Communications, 2021, 120 : 9 - 26
  • [35] Security-Aware Resource Allocation for Mobile Cloud Computing Systems
    Liu, Yanchen
    Lee, Myung J.
    24TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS ICCCN 2015, 2015,
  • [36] Security-Aware Resource Allocation in the Edge-Cloud Continuum
    Soumplis, Polyzois
    Kontos, Georgios
    Kretsis, Aristotelis
    Kokkinos, Panagiotis
    Nanos, Anastassios
    Varvarigos, Emmanouel
    2023 IEEE 12TH INTERNATIONAL CONFERENCE ON CLOUD NETWORKING, CLOUDNET, 2023, : 161 - 169
  • [37] Towards Security-Aware Virtual Server Migration Optimization to the Cloud
    Zhang, Bowu
    Hwang, Jinho
    Ma, Liran
    Wood, Timothy
    2015 IEEE INTERNATIONAL CONFERENCE ON AUTONOMIC COMPUTING, 2015, : 71 - 80
  • [38] Credit-based scheme for security-aware and fairness-aware resource allocation in cloud computing
    Di LU
    Jianfeng MA
    Cong SUN
    Xindi MA
    Ning XI
    Science China(Information Sciences), 2017, 60 (05) : 96 - 112
  • [39] Credit-based scheme for security-aware and fairness-aware resource allocation in cloud computing
    Lu, Di
    Ma, Jianfeng
    Sun, Cong
    Ma, Xindi
    Xi, Ning
    SCIENCE CHINA-INFORMATION SCIENCES, 2017, 60 (05)
  • [40] SAEA: A security-aware and energy-aware task scheduling strategy by Parallel Squirrel Search Algorithm in cloud environment
    Zade, Behnam Mohammad Hasani
    Mansouri, Najme
    Javidi, Mohammad Masoud
    EXPERT SYSTEMS WITH APPLICATIONS, 2021, 176