A security-aware data replica placement strategy based on fuzzy evaluation in the cloud

被引:3
|
作者
Wu Xiuguo [1 ]
机构
[1] Shandong Univ Finance & Econ, Sch Management Sci & Engn, Jinan 250014, Shandong, Peoples R China
基金
中国国家自然科学基金;
关键词
Cloud storage; replicas placements; security; fuzzy; Qos;
D O I
10.3233/JIFS-169584
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Replication technology is one of the most effective measure to improve the cloud data availability and reduce the response time, by put multiple copies on different data centers in the cloud. However, traditional replica placement strategies mainly focused on the performance improvement, such as transfer time reduction, load balancing and so on, with little attention to their safety storage, which inevitably result in new security risks towards replicas' correct access. Aimed to develop an intelligent solution to enhance the cloud storage system performance, we apply fuzzy comprehensive evaluation to candidate data centers, evaluating its security risk level as replica placements, therefore improve the quality of cloud storage system. First, a novel five-dimensional security model for replica placement is proposed. Then, a security-aware replica placement evaluation algorithm is designed and implemented based on fuzzy set and entropy weight theory to establish a fusion of multiple factors of assessment model. Through comparing the experiment results with the outcome of the different strategies, we can see that data replica availability probability of the proposed strategy is up to 85% and less wait latency can be achieved, indicating the better effectiveness and practicality.
引用
收藏
页码:243 / 255
页数:13
相关论文
共 50 条
  • [41] Modelling and simulation of security-aware task scheduling in cloud computing based on Blockchain technology
    Wilczynski, Andrzej
    Kolodziej, Joanna
    SIMULATION MODELLING PRACTICE AND THEORY, 2020, 99
  • [42] Data Replica Placement Algorithm Based on Immune Optimization Strategy
    Luo S.-W.
    Hou M.-S.
    Niu X.-Z.
    Lü M.-J.
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2017, 46 (05): : 741 - 746
  • [43] Data Replica Placement in Cloud Storage System
    Zhang Tao
    PROCEEDINGS OF THE 1ST INTERNATIONAL WORKSHOP ON CLOUD COMPUTING AND INFORMATION SECURITY (CCIS 2013), 2013, 52 : 551 - 554
  • [44] Application of VCG in Replica Placement Strategy of Cloud Storage
    Wang Hongxia
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2016, 9 (04): : 27 - 39
  • [45] Security-Aware Beacon Based Network Monitoring
    Sasaki, Masahiro
    Zhao, Liang
    Nagamochi, Hiroshi
    2008 11TH IEEE SINGAPORE INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS (ICCS), VOLS 1-3, 2008, : 527 - 531
  • [46] Energy aware fuzzy approach for placement and consolidation in cloud data centers
    Khemili, Wided
    Hajlaoui, Jalel Eddine
    Omri, Mohamed Nazih
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2022, 161 : 130 - 142
  • [47] Security-Aware and Time-Guaranteed Service Placement in Edge Clouds
    Sun, Huaiying
    Yu, Huiqun
    Fan, Guisheng
    Chen, Liqiong
    Liu, Zheng
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2023, 20 (01): : 711 - 725
  • [48] Security-Aware Provenance for Transparency in IoT Data Propagation
    Jaigirdar, Fariha Tasmin
    Tan, Boyu
    Rudolph, Carsten
    Bain, Chris
    IEEE ACCESS, 2023, 11 : 55677 - 55691
  • [49] SABA: A security-aware and budget-aware workflow scheduling strategy in clouds
    Zeng, Lingfang
    Veeravallia, Bharadwaj
    Li, Xiaorong
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2015, 75 : 141 - 151
  • [50] Optimized Security-Aware (O-Sec) VM Placement Algorithms
    Thulo, Motlatsi Isaac
    SOUTH AFRICAN INSTITUTE OF COMPUTER SCIENTISTS AND INFORMATION TECHNOLOGISTS (SACSIT 2017), 2017, : 383 - 383