Multi-Cloud Data Management using Shamir's Secret Sharing and Quantum Byzantine Agreement Schemes

作者: Mohammed A. AlZain , Alice S. Li , Ben Soh , Eric Pardede

DOI: 10.4018/IJCAC.2015070103

关键词:

摘要: Cloud computing is a phenomenal distributed paradigm that provides flexible, low-cost on-demand data management to businesses. However, this so-called outsourcing of resources causes business security and privacy concerns. Although various methods have been proposed deal with these concerns, none relates multi-clouds. This paper presents practical model in public private multi-cloud environment. The BFT-MCDB incorporates Shamir's Secret Sharing approach Quantum Byzantine Agreement protocol improve trustworthiness storage, without compromising performance. performance evaluation carried out using cloud simulator called CloudSim. experimental results show significantly better terms storage retrieval compared other common cryptographic based models. on CloudSim experiments demonstrates the feasibility model.

参考文章(19)
Andrey Bogdanov, Dmitry Khovratovich, Christian Rechberger, Biclique cryptanalysis of the full AES international conference on the theory and application of cryptology and information security. ,vol. 7073, pp. 344- 371 ,(2011) , 10.1007/978-3-642-25385-0_19
Barry W. Johnson, Design & analysis of fault tolerant digital systems Addison-Wesley Longman Publishing Co., Inc.. ,(1988)
Bruce Schneier, Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish) fast software encryption. pp. 191- 204 ,(1993) , 10.1007/3-540-58108-1_24
Elisa Bertino, Ning Shang, Rodolfo Ferrini, Federica Paci, Privacy-preserving Digital Identity Management for Cloud Computing. IEEE Data(base) Engineering Bulletin. ,vol. 32, pp. 21- 27 ,(2009)
Saurabh Kumar Garg, Rajkumar Buyya, None, NetworkCloudSim: Modelling Parallel Applications in Cloud Simulations utility and cloud computing. pp. 105- 113 ,(2011) , 10.1109/UCC.2011.24
Boyang Wang, Baochun Li, Hui Li, Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud IEEE Transactions on Services Computing. ,vol. 8, pp. 92- 106 ,(2015) , 10.1109/TSC.2013.2295611
Bhathiya Wickremasinghe, Rodrigo N Calheiros, Rajkumar Buyya, None, CloudAnalyst: A CloudSim-Based Visual Modeller for Analysing Cloud Computing Environments and Applications advanced information networking and applications. pp. 446- 452 ,(2010) , 10.1109/AINA.2010.32
Rodrigo N Calheiros, Rajiv Ranjan, Anton Beloglazov, César AF De Rose, Rajkumar Buyya, None, CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms Software - Practice and Experience. ,vol. 41, pp. 23- 50 ,(2011) , 10.1002/SPE.995
Lifei Wei, Haojin Zhu, Zhenfu Cao, Xiaolei Dong, Weiwei Jia, Yunlu Chen, Athanasios V. Vasilakos, Security and privacy for storage and computation in cloud computing Information Sciences. ,vol. 258, pp. 371- 386 ,(2014) , 10.1016/J.INS.2013.04.028
Qin Liu, Guojun Wang, Jie Wu, Time-based proxy re-encryption scheme for secure data sharing in a cloud environment Information Sciences. ,vol. 258, pp. 355- 370 ,(2014) , 10.1016/J.INS.2012.09.034