Increased Performance In Resource Allocation System

Authors

  • Janakiraman M  UG Scholar, Department of Computer Science and Engineering, Akshaya College of Engineering and Technology, Coimbatore, Tamil Nadu, India
  • Bala Murali Krishnan J  Asststant Professor, Department of Computer Science and Engineering, Akshaya College of Engineering and Technology, Coimbatore, Tamil Nadu, India
  • Nickelson S  
  • Nihas Ahamed I  
  • Ms. K.Veena  

Keywords:

Cloud Computing. Cloud Storage, Integrity, Privacy-preserving, TPA.

Abstract

Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources, without the burden of local data storage and maintenance. However, the fact that users no longer have physical possession of the outsourced data makes the data integrity protection in Cloud Computing a formidable task, especially for users with constrained computing resources. Moreover, users should be able to just use the cloud storage as if is local, without worrying about the need to verify its integrity. Thus, enabling public auditability for cloud storage is of critical importance, so that users can resort to a third party auditor (TPA) to check the integrity of outsourced data and be worry-free. To securely introduce an effective TPA, the auditing process should bring in no new vulnerabilities towards user data privacy, and introduce no additional online burden to user. In this paper, propose a secure cloud storage system supporting privacy-preserving public auditing. Further extend our result to enable the TPA to perform audits for multiple users simultaneously and efficiently. Extensive security and performance analysis show the proposed schemes are provably secure and highly efficient.

References

  1. O. Ibidunmoye, F. Herna´ndez-Rodriguez, and E. Elmroth, “Performance anomaly detection and bottleneck identification,” ACM Comput. Surv., vol. 48, no. 1, pp. 4:1–4:35, Jul. 2015. [Online].Available: http://doi.acm.org/10.1145/2791120
  2. J. P. Magalhaes and L. M. Silva, “Detection of performance anomalies in web-based applications,” in Proceedings of the 2010 Ninth IEEE International Symposium on Network Computing and Applications, ser. NCA ’10. Washington, DC, USA: IEEE Computer Society, 2010, pp. 60–67. [Online]. Available: http://dx.doi.org/10.1109/NCA.2010.15
  3. J. a. P. Magalha˜es and L. M. Silva, “Root-cause analysis of performance anomalies in web-based applications,” in Proceedings of the 2011 ACM Symposium on Applied Computing, ser. SAC ’11. New York, NY, USA: ACM, 2011, pp. 209–216. [Online]. Available: http://doi.acm.org/10.1145/1982185.1982234
  4. K. Bhaduri, K. Das, and B. L. Matthews, “Detecting abnormal machine characteristics in cloud infrastructures,” in 2011 IEEE 11th International Conference on Data Mining Workshops. IEEE, 2011, pp.137–144.
  5. O. Kononenko, O. Baysal, R. Holmes, and M.W. Godfrey, “Mining modern repositories with elasticsearch,” in Proceedings of the 11thWorking Conference on Mining Software Repositories, ser. MSR 2014.New York, NY, USA: ACM, 2014, pp. 328–331. [Online]. Available:http://doi.acm.org/10.1145/2597073.2597091
  6. Lu, X., Liao, Y., Lio, P. and Hui, P., 2020. Privacy-preserving asynchronous federated learning mechanism for edge network computing. IEEE Access, 8, pp.48970-48981.
  7. Henze, M., 2020, June. The Quest for Secure and Privacy-preserving Cloud-based Industrial Cooperation. In 2020 IEEE Conference on Communications and Network Security (CNS) (pp. 1-5). IEEE.
  8. Manasrah, A.M., Shannaq, M.A. and Nasir, M.A., 2020. An investigation study of privacy preserving in cloud computing environment. Handbook of computer networks and cyber security, pp.43-61.
  9. Kocabas, O. and Soyata, T., 2020. Towards privacy-preserving medical cloud computing using homomorphic encryption. In Virtual and Mobile Healthcare: Breakthroughs in Research and Practice (pp. 93-125). IGI Global.
  10. Fan, Y., Bai, J., Lei, X., Zhang, Y., Zhang, B., Li, K.C. and Tan, G., 2020. Privacy preserving based logistic regression on big data. Journal of Network and Computer Applications, 171, p.102769.
  11. Li, Y., Li, H., Xu, G., Xiang, T., Huang, X. and Lu, R., 2020. Toward Secure and Privacy-Preserving Distributed Deep Learning in Fog-Cloud Computing. IEEE Internet of Things Journal, 7(12), pp.11460-11472.
  12. Tan, Y., Wu, W., Liu, J., Wang, H. and Xian, M., 2020. Lightweight edge‐based kNN privacy‐preserving classification scheme in cloud computing circumstance. Concurrency and Computation: Practice and Experience, 32(19), p.e5804.
  13. Feng, J., Yang, L.T., Zhang, R., Qiang, W. and Chen, J., 2020. Privacy preserving high-order bi-lanczos in cloud-fog computing for industrial applications. IEEE Transactions on Industrial Informatics.
  14. Huang, Q., Zhang, Z. and Yang, Y., 2020. Privacy-preserving media sharing with scalable access control and secure deduplication in mobile cloud computing. IEEE Transactions on Mobile Computing.
  15. Jiang, M. and Yang, H., 2020. Secure outsourcing algorithm of BTC feature extraction in cloud computing. IEEE Access, 8, pp.106958-106967.
  16. Wang, X., Gu, B., Qu, Y., Ren, Y., Xiang, Y. and Gao, L., 2020, June. Reliable customized privacy-preserving in fog computing. In ICC 2020-2020 IEEE International Conference on Communications (ICC) (pp. 1-6). IEEE.

Downloads

Published

2021-04-30

Issue

Section

Research Articles

How to Cite

[1]
Janakiraman M, Bala Murali Krishnan J, Nickelson S, Nihas Ahamed I, Ms. K.Veena, " Increased Performance In Resource Allocation System, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 7, Issue 2, pp.425-431, March-April-2021.