Fusion: Practice and Applications

Journal DOI

https://doi.org/10.54216/FPA

Submit Your Paper

2692-4048ISSN (Online) 2770-0070ISSN (Print)

Volume 3 , Issue 2 , PP: 83-99, 2021 | Cite this article as | XML | Html | PDF | Full Length Article

Software Defined Network Function Virtualization Framework for Securing Cloud with Data Fusion and Machine Learning Techniques

Rajit Nair 1 * , Miguel Botto-Tobar 2 , Premnarayan Arya 3

  • 1 VIT Bhopal University, Bhopal, India - (rajit.nair@vitbhopal.ac.in)
  • 2 Research Group in Artificial Intelligence and Information Technology, University of Guayaquil, Ecuador - (miguel.bottot@ug.edu.ec)
  • 3 Department of Computer science and engineering,G.H. Raisoni Institute of Engineering and Business Management, Jalgaon, Maharashtra, India - (premnarayan.arya@raisoni.net)
  • Doi: https://doi.org/10.54216/FPA.030204

    Received: February 17, 2021 Accepted: May 25, 2021
    Abstract

    Computing in the cloud is one of the platforms that may be used to provide distributed computing resources. Supplying and managing cloud resources most effectively is referred to as resource management. A recent development in technology known as fog computing is an example of an expanded and dispersed infrastructure. This architecture maintains application processes between end devices and the network edge to provide more dependable and efficient services. These services include remote data storage, allowing customers to access their data from a distant location. Providing remote storage service is an advantageous function offered by cloud suppliers. On the other hand, the data stored in the cloud is geographically dispersed and kept in various data centers, significantly increasing the risk to users' privacy and security. One of the problems that might arise with privacy is when many data centers store the same information. Many cloud service providers check their customers' data using a Third-Party Auditor (TPA) to address concerns about client privacy and data integrity. Currently, most trusted TPAs only have one validator, making it impossible to expand the data integrity across several data centers. The various verifiers used by TPAs have been reduced in number in response to Man in the Cloud (MiTC) attacks. As a result, they cannot check and authenticate the integrity of data stored in several data centers. A unique Peer to Peer (P2P) authentication protocol with Certificate Authority (CA) and Data Storage Protocol is presented as a solution to the problem that has been outlined above to check for and go around any issues that may arise (DSP). The efficiency of the proposed protocol is demonstrated by the incorporation of TPAs and Certificate Authorities. The proposed protocol has been tested with a single user and a single storage server, as well as multiple storage servers in ownCloud with one backup server, two storage servers, three clients, and two TPAs. The NoSQL server in an organization's cloud is set up to save data to storage servers in the appropriate format. The Amanda backup server is used to back up the mirror copy of the stored data on the storage servers. Automated Validation of Internet Security Protocols with Data Fusion and Applications, or AVISPA for short, is a technology that may be used to verify data stored in the cloud. The findings make it abundantly evident that the suggested protocol is strong enough to guarantee the authenticity of data kept in several data centers.

    Keywords :

    Third Party Auditor (TPA) , multiple data centers. , attacks , Certificate Authority and TPA , Peer to Peer , data fusion.

    References

    [1] Abhishek et al. (2012),” Cloud Data Security while using Third Party”, International Journal of Scientific & Engineering Research, Vol. 3.

    [2] Wang, S., Celebi, M. E., Zhang, Y. D., Yu, X., Lu, S., Yao, X., ... & Tyukin, I. (2021). Advances in data preprocessing for biomedical data fusion: an overview of the methods, challenges, and prospects. Information Fusion, 76, 376-421.

    [3] Kashinath, S. A., Mostafa, S. A., Mustapha, A., Mahdin, H., Lim, D., Mahmoud, M. A.,... & Yang, T. J. (2021). Review of data fusion methods for real-time and multi-sensor traffic flow analysis. IEEE Access, 9, 51258-51276.

    [4] Ali et al. (2016),” Security and Privacy of Sensitive Data in Cloud Computing: A Survey of Recent Developments”, David C. Wyld et al. (Eds): NETCOM, NCS, WiMoNe, CSEIT, pp. 131–150.

    [5] Al-Saffar (2015),” Identity Based Approach for Cloud Data Integrity in Multi-Cloud Environment”, International Journal of Advanced Research in Computer and Communication Engineering Vol. 4, Issue 8, pp.505-509.

    [6] Li, Q., Huang, Y., Zhang, J., & Min, S. (2021). A fast determination of insecticide deltamethrin by spectral data fusion of UV–vis and NIR based on extreme learning machine. Spectrochimica Acta Part A: Molecular and Biomolecular Spectroscopy, 247, 119119.

    [7] Arasu, S. et al.((2013), “Privacy-Preserving Public Auditing In Cloud Using HMAC Algorithm.”, International Journal of Recent Technology and Engineering, Vol.2,pp.149-159.

    [8] Ardagna et al (2015),” From security to assurance in the 143 cloud: A survey” ACM Computational Survey, Vol 48-1, pp 1- 50.

    [9] Arjuna et al. (2016),” Cloud Data Security with Modified RSA Algorithm”, International Journal of Engineering Research & Technology, Vol.5 (5), pp.205-208.

    [10] Arora et al. (2012),” Cloud Computing Security Issues in Infrastructure as a Service”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 2, Issue 1, ISSN: 2277 128X.

    [11] Bachhav et al.(2015),” Secure Multi-Cloud data sharing using Key Aggregate Cryptosystem for scalable data sharing”, International Journal of Computer Science and Information Technologies, Vol. 6 (5), pp.4479-4482.

    [12] Bahrami M, Singhal M (2015),”The role of cloud computing architecture in big data”, Information Granularity, Big Data, and Computational Intelligence, Cham, Switzerland: Springer International Publishing, pp.275-295.

    [13] Bhagat, Sahu (2013),” Cloud Data Security while using Third Party Auditor”, International Journal of Computer Applications, Vol. 70– No.16, pp.9-14.

    [14] Behl A (2012),” An analysis of cloud computing security issues”, World Congress on Information and Communication Technologies (WICT).

    [15] Deng, Y., Xiao, J., & Zhou, S. Z. (2021). ToF and stereo data fusion using dynamic search range stereo matching. IEEE Transactions on Multimedia, 24, 2739-2751.

    [16] C. Cachin, I. Keidar, and A. Shraer, “Trusting the cloud,” SIGACT News, vol. 40, no. 2, pp. 81–86, 2009.

    [17] Charmee V. Desai (2014),” Survey on Data Integrity Checking Techniques in Cloud Data Storage”, International 144 Journal of Advanced Research in Computer Science and Software Engineering, Vol. 4,pp.292-295.

    [18] Chatterjee et al., (2012),” Symmetric key Cryptography using two-way updated - Generalized Vernam Cipher method: TTSJA algorithm”, International Journal of computer applications, Vol.42, pp.39- 42.

    [19] Chen (2012),”Data security and privacy protection issues in cloud computing”, International Conference on computer science and Electronics Engineering.

    [20] Chin-Ming Hsu (2003),” A group digital signature technique for authentication “, Proceedings of IEEE 37th Annual 2003 International Conference.

    [21] Chiroma et al (2017),” Bio-inspired computation: Recent development on the modifications of the cuckoo search algorithm”, Applied Soft Computing, Vol. 61, pp.149–173.

    [22] Civicioglu ,Besdok (2011),” A conceptual comparison of the Cuckoo-search, particle swarm optimization, differential evolution and artificial bee colony algorithms”, Journal of Artificial Intelligence Review,Vol 39,pp 315–346.

    [23] Cong Wang et al. (2013),” Privacy Preserving Public Auditing for Secure Cloud Storage”, Computers, IEEE Transactions, Vol. 62(2), pp.362–375.

    [24] Dinh HT, Lee C, Niyato D, Wang P (2013),” A survey of mobile cloud computing: architecture, applications, and approaches”, Wireless Communication Mobile Computing, Vol.13 (18) pp.1587-1611.

    [25] Geeta, Varma, (2016)” Cuckoo Search Optimization and its Applications: A Review”, International Journal of Advanced Research in Computer and Communication EngineeringVol.5 (11), pp.556-562. 145.

    [26] Gohil, G. B., Pathak, R.K. and Patel, A. A., (2013) "Security in Computing", International Journal of Computer Science and Mobile Computing, Vol- 2, Issue-3, pg.52 – 56.

    [27] Goyal and sidhu (2014),” Third Party Auditor: An Integrity Checking Technique for Client Data Security in Cloud Computing”, International Journal of Computer Science and Information Technologies, Vol. 5(3), pp.4526-4530.

    [28] Grundy J., Almorsy, M. and Ibrahim, A. S., (2011) "Collaboration-Based Cloud Computing Security Management Framework", 4th International Conference on Cloud Computing, IEEE, pp. 364- 371.

    [29] Hao (2011),” A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability”, IEEE Transactions On Knowledge and Data Engineering, Vol. 23 (9), pp. 1432 – 1437.

    [30] Haw et al.(2019),” Implementation of RSA Algorithm to Secure Data in Cloud Computing”, International Journal of Innovative Science, Engineering & Technology, Vol. 6 (4),pp.61-68.

    Cite This Article As :
    Nair, Rajit. , Botto-Tobar, Miguel. , Arya, Premnarayan. Software Defined Network Function Virtualization Framework for Securing Cloud with Data Fusion and Machine Learning Techniques. Fusion: Practice and Applications, vol. , no. , 2021, pp. 83-99. DOI: https://doi.org/10.54216/FPA.030204
    Nair, R. Botto-Tobar, M. Arya, P. (2021). Software Defined Network Function Virtualization Framework for Securing Cloud with Data Fusion and Machine Learning Techniques. Fusion: Practice and Applications, (), 83-99. DOI: https://doi.org/10.54216/FPA.030204
    Nair, Rajit. Botto-Tobar, Miguel. Arya, Premnarayan. Software Defined Network Function Virtualization Framework for Securing Cloud with Data Fusion and Machine Learning Techniques. Fusion: Practice and Applications , no. (2021): 83-99. DOI: https://doi.org/10.54216/FPA.030204
    Nair, R. , Botto-Tobar, M. , Arya, P. (2021) . Software Defined Network Function Virtualization Framework for Securing Cloud with Data Fusion and Machine Learning Techniques. Fusion: Practice and Applications , () , 83-99 . DOI: https://doi.org/10.54216/FPA.030204
    Nair R. , Botto-Tobar M. , Arya P. [2021]. Software Defined Network Function Virtualization Framework for Securing Cloud with Data Fusion and Machine Learning Techniques. Fusion: Practice and Applications. (): 83-99. DOI: https://doi.org/10.54216/FPA.030204
    Nair, R. Botto-Tobar, M. Arya, P. "Software Defined Network Function Virtualization Framework for Securing Cloud with Data Fusion and Machine Learning Techniques," Fusion: Practice and Applications, vol. , no. , pp. 83-99, 2021. DOI: https://doi.org/10.54216/FPA.030204