首页> 外文期刊>Journal of Cloud Computing: Advances, Systems and Applications >Privacy preserving model: a new scheme for auditing cloud stakeholders
【24h】

Privacy preserving model: a new scheme for auditing cloud stakeholders

机译:隐私保护模型:一种用于审计云利益相关者的新方案

获取原文
获取外文期刊封面目录资料

摘要

The Cloud computing paradigm provides numerous attractive services to customers such as the provision of the on-demand self-service, usage-based pricing, ubiquitous network access, transference of risk, and location independent resource sharing. However, the security of cloud computing, especially its data privacy, is a highly challengeable task. To address the data privacy issues, several mechanisms have been proposed that use the third party auditor (TPA) to ensure the integrity of outsourced data for the satisfaction of cloud users (CUs). However, the role of the TPA could be the potential security threat itself and can create new security vulnerabilities for the customer’s data. Moreover, the cloud service providers (CSPs) and the CUs could also be the adversaries while deteriorating the stored private data. As a result, the objective of this research is twofold. Our first research goal is to analyze the data privacy-preserving issues by identifying unique privacy requirements and presenting a supportable solution that eliminates the possible threats towards data privacy. Our second research goal is to develop the privacy-preserving model (PPM) to audit all the stakeholders in order to provide a relatively secure cloud computing environment. Specifically, the proposed model ensures the quality of service (QoS) of cloud services and detects potential malicious insiders in CSPs and TPAs. Furthermore, our proposed model provides a methodology to audit a TPA for minimizing any potential insider threats. In addition, CUs can use the proposed model to periodically audit the CSPs using the TPA to ensure the integrity of the outsourced data. For demonstrating and validating the performance, the proposed PPM is programmed in C++ and tested on GreenCloud with NS2 by applying merging processes. The experimental results help to identify the effectiveness, operational efficiency, and reliability of the CSPs. In addition, the results demonstrate the successful rate of handling the negative role of the TPA and determining the TPA’s malicious insider detection capabilities.
机译:云计算范例为客户提供了众多有吸引力的服务,例如按需自助服务的提供,基于使用量的定价,无处不在的网络访问,风险转移以及与位置无关的资源共享。但是,云计算的安全性,尤其是其数据隐私性,是一项极富挑战性的任务。为了解决数据隐私问题,已经提出了几种机制,这些机制使用第三方审核员(TPA)来确保外包数据的完整性,以使云用户(CU)满意。但是,TPA的作用可能是潜在的安全威胁本身,并且可能为客户的数据创建新的安全漏洞。此外,云服务提供商(CSP)和CU也可能成为对手,同时恶化了存储的私有数据。结果,该研究的目的是双重的。我们的首要研究目标是通过识别独特的隐私要求并提出可支持的解决方案来消除数据隐私的潜在威胁,从而分析数据隐私保护问题。我们的第二个研究目标是开发隐私保护模型(PPM)以审核所有涉众,以便提供相对安全的云计算环境。具体而言,提出的模型可确保云服务的服务质量(QoS)并检测CSP和TPA中潜在的恶意内部人员。此外,我们提出的模型提供了一种审核TPA的方法,以最大程度地减少任何潜在的内部威胁。此外,CU可以使用建议的模型使用TPA定期审核CSP,以确保外包数据的完整性。为了演示和验证性能,建议的PPM用C ++编程,并通过应用合并过程在带有NS2的GreenCloud上进行测试。实验结果有助于确定CSP的有效性,运营效率和可靠性。此外,结果表明,成功处理了TPA的负面作用并确定了TPA的恶意内部人检测功能。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号