Friday, 29 November 2019
Lupine Publishers: Lupine Publishers | The Role of Technology Transfe...
Lupine Publishers: Lupine Publishers | The Role of Technology Transfe...: Abstract No doubt that climatic development and related changes are not new, bur a worldwide phenomenon that never respected nat...
Lupine Publishers: Lupine Publishers | Selected Methods of Spatial An...
Lupine Publishers: Lupine Publishers | Selected Methods of Spatial An...: Lupine Publishers- Environmental and Soil Science Journal Spatial analysis in GIS Wednesday is based on complex techniques, the r...
Lupine Publishers: Lupine Publishers | Fibonacci Circle in Fashion De...
Lupine Publishers: Lupine Publishers | Fibonacci Circle in Fashion De...: Lupine Publishers | Journal of Textile and Fashion Designing Editorial Fibonacci circle is a pattern which is created on the...
Wednesday, 27 November 2019
Lupine Publishers: Lupine Publishers | The Role of Technology Transfe...
Lupine Publishers: Lupine Publishers | The Role of Technology Transfe...: Abstract No doubt that climatic development and related changes are not new, bur a worldwide phenomenon that never respected nat...
Lupine Publishers: Lupine Publishers | Selected Methods of Spatial An...
Lupine Publishers: Lupine Publishers | Selected Methods of Spatial An...: Lupine Publishers- Environmental and Soil Science Journal Spatial analysis in GIS Wednesday is based on complex techniques, the r...
Tuesday, 26 November 2019
Lupine publishers | Mitigating Disaster using Secure Threshold-Cloud Architecture
Lupine Publishers | Current Trends in Computer Sciences & Applications
Abstract
There
are many risks in moving data into public cloud environments, along
with an increasing threat around large-scale data leakage during cloud
outages. This work aims to apply secret sharing methods as used in
cryptography to create shares of cryptographic key, disperse and recover
the key when needed in a multi-cloud environment. It also aims to prove
that the combination of secret sharing scheme and multi-clouds can be
used to provide a new direction in disaster management by using it to
mitigate cloud outages rather than current designs of recovery after the
outages. Experiments were performed using ten different cloud services
providers at share policies of 2 from 5, 3 from 5, 4 from 5, 4 from 10, 6
from 10 and 8 from 10 for which at different times of cloud outages key
recovery were still possible and even faster compared to normal
situations. All the same, key recovery was impossible when the number of
cloud outages exceeded secret sharing defined threshold. To ameliorate
this scenario, we opined a resilient system using the concept of
self-organization as proposed by Nojoumian et al in 2012 in improving
resource availability but with some modifications to the original
concept. The proposed architecture is as presented in our Poster:
Improving Resilience in Multi-Cloud Architecture.
Keywords: Secret Shares; Disaster Mitigation; Thresholds Scheme; Cloud Service Providers
Introduction
With
the introduction of cloud services for disaster management on a
scalable rate, there appears to be the needed succour by small business
owners to get a cheaper and more secure disaster recovery mechanism to
provide business continuity and remain competitive with other large
businesses. But that is not to be so, as cloud outages became a
nightmare. Recent statistics by Ponemon Institute [1] on Cost of Data
Centre Outages, shows an increasing rate of 38% from $505,502 in 2010 to
$740,357 as at January 2016. Using activity-based costing they were
able to capture direct and indirect cost to: Damage to mission-critical
data; Impact of downtime on organizational productivity; Damages to
equipment and other assets and so on. The statistics were derived from
63 data centres based in the United States of America. These events may
have encouraged the adoption of multi-cloud services so as to divert
customers traffic in the event of cloud outage. Some finegrained
proposed solutions on these are focused on Redundancy and Backup such
as: Local Backup by [2]; Geographical Redundancy and Backup [3]; The use
of Inter-Private Cloud Storage [4]; Resource Management for data
recovery in storage clouds [5], and so on. But in all these, cloud
service providers see disaster recovery as a way of getting the system
back online and making data available after a service disruption, and
not on contending disaster by providing robustness that is capable of
mitigating shocks and losses resulting from these disasters.
This
work aims to apply secret sharing methods as used in cryptography [6,7]
to create shares of cryptographic key, disperse and recover the key
when needed in a multi-cloud environment. It also aims to prove that the
combination of secret sharing scheme and multi-clouds can be used to
provide a new direction in disaster management by using it to mitigate
cloud outages rather than current deigns of recovery after the outages.
Experiments were performed using ten different cloud services providers
for storage services, which at different times of cloud outages, key
recovery were still possible and even faster compared to normal
situations. All the same, key recovery was impossible when the number of
cloud outages exceeded secret sharing defined threshold. To ameliorate
this scenario, we look forward to employ the concept of
self-organisation as proposed by Nojoumian et al. [8] in improving
resource availability but with some modifications as proposed. The rest
of the work is organised into section II, Literature Review takes a
closer look at current practices, use of secret sharing and cloudbased
disaster recovery with much interest in the method used in design. III.
Presents our approach, in section IV, present Results and Evaluations
and Conclude in section V with future works and lessons learnt.
Literature Review
There
are research solutions based on different variants of secret sharing
schemes and multi-cloud architecture that give credence to its
resilience in the face of failures, data security in keyless manner,
such as: Ukwandu et al. [9] — RESCUE: Resilient Secret Sharing
Cloud-based Architecture; Alsolami & Boult, [10], — CloudStash:
Using Secret-Sharing Scheme to Secure Data, Not Keys, in Multi-Clouds.
Others are: Fabian et al. [11] on Collaborative and secure sharing of
healthcare data in multi-clouds and [12] on Secret Sharing for Health
Data in Multi-Provider Clouds. While RESCUE provided an architecture for
a resilient cloud-based storage with keyless data security capabilities
using secret sharing scheme for data splitting, storage and recovery,
Cloud Stash also relied on the above strengths to prove security of data
using secret sharing schemes in a multi-cloud environment and Fabian et
al proved resilience and robust sharing in the use of secret sharing
scheme in a multi-cloud environment for data sharing. Because our
approach is combining secret sharing and multi-clouds in developing a
clouddisaster management the need therefore arise to review current
method used in cloud-based disaster in a multi-cloud system and their
shortcomings.
a) Remus:
Cully et al. [13] described a system that provides software resilience
in the face of hardware failure (VMs) in such a manner that an active
system at such a time can continue execution on an alternative physical
host while preserving the host configurations by using speculative
execution. The strength lies on the preservation of system’s software
independently during hardware failure.
b) Second Site:
As proposed by Rajagopalan et al. [14] is built to extend the Remus
high-availability system based on virtualization infrastructure by
allowing very large VMs to be replicated across many data centres over
the networks using internet. One main aim of this solution is to
increase the availability of VMs across networks. Like every other DR
systems discussed above, Second Site is not focused on contending
downtime and security of data during cloud outages.
c) DR-Cloud:
Yu et al. [15] relied on data backup and restore technology to build a
system proposed to provide high data reliability, low backup cost and
short recovery time using multiple optimisation scheduling as
strategies. The system is built of multicloud architecture using Cumulus
[16] as cloud storage interface. Thus providing the need for further
studies on the elimination of system downtime during disaster, provide
consistent data availability as there is no provision for such in this
work.
Our Approach
Our
approach is in combining secret sharing scheme with multi-clouds to
achieve resilience with the aim of applying same in redefining
cloud-based disaster management from recovery from cloud outages to
mitigating cloud outages.
The Architecture
The
architecture of as shown in Figure 1 shows key share creation,
dispersal and storage, while that of Figures 2 & 3 is of shares
retrieval and key recovery
Figure 1: Key Share Creation, Dispersal and Storage.
Figure 2: Share Retrievals and Key Recovery.
Figure 3: Cloud Service Providers at Different Scenarios.
Share creation and Secret recovery:
The diagram above explains our design of key share creation, dispersal
and storage using different cloud service providers (Figure 1). Share
Creation: The dealer determines the number of hosts shares combination
from which data recovery is possible known as threshold (t) and the
degree of the polynomial, drived from subtracting 1 from the threshold.
In this case, the threshold is 3 and the degree of polynomial is 2. He
initiates a secret sharing scheme by generating the polynomial, the
coefficients a and b are random values and c is the secret, the constant
term of the polynomial as well as the intercept of the graph. He
generates 5 shares for all the hosts H1… H5 and sends the shares to them
for in an equal ratio and weights we, and thereafter leaves the scene
[1].
Secret Recovery:
Just as in Shamir [6] authorised participants following earlier stated
rules are able to recover the secret using Lagrangian interpolation once
the condition as stated earlier is met. The participants contribute
their shares to recover the secret.
Results and Evaluations
Test: Cloud Outages against Normal situations. This test assumes that cloud outage prevents secret recovery.
Discussions
The
results above show that cloud outage has no negative effect on key
recovery, rather reduces the overhead in comparison with normal
situations. It shows the relationship between cloud outage and normal
operational conditions. From available results at twenty percent (20%)
failure rate using 3 from 5 share policy, the system becomes faster by
sixteen percent (16.41%), but at forty percent (40%) failure rate using
same share policy, the download speed is faster by a little above fifty
one percent (51.80%). Looking at a higher share policy of 6 from 10, at
thirty percent (30%) failure rate, the system download speed is higher
by a little above thirtyseven percent (37.90%), while at forty percent
(40%) failure rate, the system performed better by about forty-three
percent (42.99%). The implications therefore are that in as much as
failure rate is not equivalent or above the threshold, system
performance improves as there was no result obtained when the cloud
outage exceeds or equal to threshold. These therefore do not support the
assumption as above that cloud outage has negative effect in key
recovery. There is no significant evidence to show that the size of the
share has effect on the key recovery during cloud outages because at
forty percent (40%) failure rate using share of 10KB in 3 from 5 shows
performance rate of above fifty-one percent while in 6 from 10 share
policy approximately forty-three (42.99%) percent performance rate.
Conclusions, Lessons Learnt and Future Work
Current
cloud-based disaster recovery systems have focused on faster recovery
after an outage and the underlying issue has been the method applied,
which centered in data backup and replicating the backed-up data to
several hosts. This method has proved some major delays in providing a
strong failover protection as there has to be a switch from one end to
another during disaster in order to bring systems back online, the need
thus arises for research to focus on method capable of mitigating this
interruption by providing strong failover protection as well as
stability during adverse failures to keep systems running. This method
we have provided here using this paper. Because, secret sharing schemes
are keyless method of encryption, data at rest and in transit are safe
as it exists in meaningless format.
The
recovery of key is done using system memory and share verification is
usually carried out using an inbuilt share checksum mechanism using
SHA-512, which validates shares before recovery. Else, share recovery
returns error and halts. We have learnt that cloud outage rather than
prevent key recovery, using our method proved that it hastens key
recovery from results available. Also, understand that when cloud outage
exceeds threshold of the share policy, key recovery becomes impossible
and to ameliorate this situation, we propose as future work to use the
concept of Self- Organization as proposed by Nojoumian et al. [8] to
manage cloud resources though with some modifications so as to maintain
share availability from cloud service providers.
For more Lupine Publishers Open Access Journals Please visit our website:
http://lupinepublishers.us/
For more Current Trends in Computer Sciences & Applications Please Click Here:
https://lupinepublishers.com/computer-science-journal/
To Know More About Open Access Publishers Please Click on Lupine Publishers
Follow on Linkedin : https://www.linkedin.com/company/lupinepublishers
Follow on Twitter : https://twitter.com/lupine_online
Follow on Twitter : https://twitter.com/lupine_online
Monday, 25 November 2019
Lupine Publishers: Lupine Publishers | The Benefits of Sports Medicin...
Lupine Publishers: Lupine Publishers | The Benefits of Sports Medicin...: Lupine Publishers | Journal of Orthopaedics Opinion Physiotherapy and Sports Medicine in a new concept focused not only on...
Friday, 22 November 2019
Lupine Publishers: Lupine Publishers | Is the salvation of life on th...
Lupine Publishers: Lupine Publishers | Is the salvation of life on th...: Lupine Publishers- Environmental and Soil Science Journal Before the advent of modern industry, nature had tangible additions in...
Lupine Publishers: Lupine Publishers | Evaluation of Host Associated ...
Lupine Publishers: Lupine Publishers | Evaluation of Host Associated ...: Lupine Publishers- Environmental and Soil Science Journal Abstract The water quality of many waterways in the state of ...
Lupine Publishers: Lupine Publishers | Crack and Leakage Detection on...
Lupine Publishers: Lupine Publishers | Crack and Leakage Detection on...: Lupine Publishers- Environmental and Soil Science Journal Abstract In this study, a method of water leakage detection s...
Lupine Publishers: Lupine Publishers| Waste to Worth - Sludge Contain...
Lupine Publishers: Lupine Publishers| Waste to Worth - Sludge Contain...: Lupine Publishers- Trends in Civil Engineering and its Architecture Opinion Human activities on earth produce in considerabl...
Lupine Publishers: Lupine Publishers| Expected Seismic Risk in a Dist...
Lupine Publishers: Lupine Publishers| Expected Seismic Risk in a Dist...: Lupine Publishers- Trends in Civil Engineering and its Architecture Abstract The current study focuses on a sub-urban se...
Friday, 15 November 2019
Lupine Publishers: Lupine Publishers | Fibre Reinforced Composites: M...
Lupine Publishers: Lupine Publishers | Fibre Reinforced Composites: M...: Lupine Publishers | Journal of Textile and Fashion Designing Introduction Today, at the age of developing newer materials, i...
Lupine Publishers: Lupine Publishers | Domestic Violence Perpetration...
Lupine Publishers: Lupine Publishers | Domestic Violence Perpetration...: Lupine Publishers | Journal of Orthopedics Abstract A face is an index of mind correlation, co-efficient of mind. Domesti...
Lupine Publishers: Lupine Publishers | Review of the Effect of Climat...
Lupine Publishers: Lupine Publishers | Review of the Effect of Climat...: Lupine Publishers- Environmental and Soil Science Journal Abstract The Researchers proved that the process of soil erosion is a...
Lupine Publishers: Lupine Publishers| Expected Seismic Risk in a Dist...
Lupine Publishers: Lupine Publishers| Expected Seismic Risk in a Dist...: Abstract The current study focuses on a sub-urban sector of the historical centre of Sant’Antimo, placed in the province of...
Tuesday, 12 November 2019
Lupine Publishers: Lupine Publishers | 90 90 90 Formulas and Symptoms...
Lupine Publishers: Lupine Publishers | 90 90 90 Formulas and Symptoms...: Lupine Publishers | Journal of Orthopaedics Abstract Early decompressive adrenal fatigues have one of the leading causes of ...
Monday, 11 November 2019
Lupine Publishers: Lupine Publishers | Review of the Effect of Climat...
Lupine Publishers: Lupine Publishers | Review of the Effect of Climat...: Lupine Publishers- Environmental and Soil Science Journal Abstract The Researchers proved that the process of soil eros...
Lupine Publishers: Lupine Publishers | The Study of Parameters and Re...
Lupine Publishers: Lupine Publishers | The Study of Parameters and Re...: Lupine Publishers- Environmental and Soil Science Journal Introduction In recent years, both in the Republic and in the...
Lupine Publishers: Lupine Publishers | Extraction of Pectic Acid from...
Lupine Publishers: Lupine Publishers | Extraction of Pectic Acid from...: Lupine Publishers | Journal of Textile and Fashion Designing Abstract Extraction of pectic acid by acid hydrolysis from citr...
Lupine Publishers: Lupine Publishers | Midshaft Clavicle Malunion wit...
Lupine Publishers: Lupine Publishers | Midshaft Clavicle Malunion wit...: Lupine Publishers | Journal of Orthopaedics Abstract Purpose: We are presenting this pattern of a rare variant of a clavic...
Wednesday, 6 November 2019
Lupine Publishers: Lupine Publishers | Midshaft Clavicle Malunion wit...
Lupine Publishers: Lupine Publishers | Midshaft Clavicle Malunion wit...: Lupine Publishers | Journal of Orthopaedics Abstract Purpose: We are presenting this pattern of a rare variant of a clavic...
Lupine Publishers: Lupine Publishers | Dyes and Dyeing
Lupine Publishers: Lupine Publishers | Dyes and Dyeing: Lupine Publishers | Journal of Textile and Fashion Designing Abstract Dyeing in ancient times was conducted from natural animal and...
Lupine Publishers: Lupine Publishers | Response of Sandy Soil Stabili...
Lupine Publishers: Lupine Publishers | Response of Sandy Soil Stabili...: Lupine Publishers- Environmental and Soil Science Journal Abstract Traditional sandy soil stabilizers such as lime ceme...
Lupine Publishers: Lupine Publishers-Environmental Issues and Disaste...
Lupine Publishers: Lupine Publishers-Environmental Issues and Disaste...: Lupine Publishers- Environmental and Soil Science Journal What is Environment and Why it is Important? This is a vas...
Subscribe to:
Posts (Atom)
Wishing you a Magical and Blissful Holiday
Take a leap of faith and begin this wondrous new year by believing. Happy New Year!
-
Mini View on Current Trends in Computer Sciences & Applications by Ajay Rana in Current Trends in Computer Sciences& Applic...
-
Lupine Publishers | Current Trends in Computer Sciences & Applications Abstract There are many risks in moving data into p...
-
Internet of Things and Privacy by Christos Beretas in Current Trends in Computer Sciences & Applications in Lupinepublishers T...