International Journal of Advanced Technology and Engineering Exploration (IJATEE) ISSN (P): 2394-5443 ISSN (O): 2394-7454 Vol - 9, Issue - 89, April 2022
  1. 1
    Google Scholar
Improved sun flow optimization (I-SFO) algorithm based de-centralized information flow control for multi-tenant cloud virtual machines

Yogesh B. Gurav and Bankat M. Patil

Abstract

A novel multi-tenant decentralized information flow control (MT-DIFC) model is introduced in this research work. In cloud computing, the MT-DIFC allows a larger pool of resources to be shared among a larger number of people without compromising privacy and security. Initially, the sensitive data is isolated from the rest on the basis of the security level. Then, these sensitive data are subjected to encryption via an improved signcryption algorithm. At the receiver end, the decryption takes place based on the computed two-level trust model. Interestingly, here the direct, as well as indirect trust, is computed for the ones who request for access privileges to the data owners. Based on the computed trust level, the access privilege is provided to the user’s request; and here the level of document readability and downloading capability will be decided by the data owner. Based on the computed trust level, the decryption of the data (only the permitted data-level access provided by the owner) is accomplished. Furthermore, the improved sun flow optimization algorithm (I-SFO) has been introduced for optimal key generation. This I-SFO model is validated by varying its weight function W from 100, 150 and 200, respectively. In addition, a non-parametric analysis has been carried out to validate the efficiency of I-SFO. Accordingly, the outcomes reveal that the proposed work has attained the least cost function, while fixing W=100, 150 and 200, respectively.

Keyword

Cloud computing, Multi-tenant virtual machine, I-SFO, Non-parametric analysis.

Cite this article

Gurav YB, Patil BM

Refference

[1][1]Elsayed M, Zulkernine M. IFCaaS: information flow control as a service for cloud security. In international conference on availability, reliability and security 2016 (pp. 211-6). IEEE.

[2][2]Bacon J, Eyers D, Pasquier TF, Singh J, Papagiannis I, Pietzuch P. Information flow control for secure cloud computing. IEEE Transactions on Network and Service Management. 2014; 11(1):76-89.

[3][3]Xi N, Sun C, Ma J, Shen Y. Secure service composition with information flow control in service clouds. Future Generation Computer Systems. 2015; 49:142-8.

[4][4]Xi N, Ma J, Sun C, Lu D, Shen Y. Information flow control on encrypted data for service composition among multiple clouds. Distributed and Parallel Databases. 2018; 36(3):511-27.

[5][5]Khurshid A, Khan AN, Khan FG, Ali M, Shuja J, Khan AU. Secure‐CamFlow: a device‐oriented security model to assist information flow control systems in cloud environments for IoTs. Concurrency and Computation: Practice and Experience. 2019; 31(8):e4729.

[6][6]Phatak A, Kadikar R, Vijayan K, Amutha B. Performance analysis of firewall based on SDN and OpenFlow. In international conference on communication and signal processing 2018 (pp. 0611-5). IEEE.

[7][7]Candotti D, Steel MD, West AC. Charting the course for Tasmanias energy cloud roadmap. In PES Asia-pacific power and energy engineering conference 2015 (pp. 1-5). IEEE.

[8][8]Huang G, Chen J, Khojasteh Y. A cyber-physical system deployment based on pull strategies for one-of-a-kind production with limited resources. Journal of Intelligent Manufacturing. 2021; 32(2):579-96.

[9][9]Bolodurina I, Parfenov D, Shukhman A. Approach to the effective controlling cloud computing resources in data centers for providing multimedia services. In international Siberian conference on control and communications 2015 (pp. 1-6). IEEE.

[10][10]Li W, Wu J, Cao J, Chen N, Zhang Q, Buyya R. Blockchain-based trust management in cloud computing systems: a taxonomy, review and future directions. Journal of Cloud Computing. 2021; 10(1):1-34.

[11][11]Xu Z, Zhang Y, Li H, Yang W, Qi Q. Dynamic resource provisioning for cyber-physical systems in cloud-fog-edge computing. Journal of Cloud Computing. 2020; 9(1):1-16.

[12][12]Pierson JM, Baudic G, Caux S, Celik B, Da CG, Grange L, et al. DATAZERO: datacenter with zero emission and robust management using renewable energy. IEEE Access. 2019; 7:103209-30.

[13][13]Singh J, Pasquier TF, Bacon J, Eyers D. Integrating messaging middleware and information flow control. In international conference on cloud engineering 2015 (pp. 54-9). IEEE.

[14][14]Zhou L, Zhang H, Zhang K, Wang B, Shen D, Wang Y. Advances in applying cloud computing techniques for air traffic systems. In 2nd international conference on civil aviation safety and information technology 2020 (pp. 134-9). IEEE.

[15][15]Nakamura S, Enokido T, Takizawa M. Implementation and evaluation of the information flow control for the internet of things. Concurrency and Computation: Practice and Experience. 2021; 33(19).

[16][16]Kim N, Yang D. Performance analysis of a centralized burst-mode traffic shaping for distributed parallel queues. IEEE Communications Letters. 2015; 19(3):351-4.

[17][17]Solanki N, Zhu W, Yen IL, Bastani F, Rezvani E. Multi-tenant access and information flow control for SaaS. In international conference on web services 2016 (pp. 99-106). IEEE.

[18][18]Enokido T, Takizawa M. A purpose-based synchronization protocol for secure information flow control. International Journal of Computer Systems Science and Engineering. 2010; 25(2):25-32.

[19][19]Wang C, Chow SS, Wang Q, Ren K, Lou W. Privacy-preserving public auditing for secure cloud storage. IEEE Transactions on Computers. 2011; 62(2):362-75.

[20][20]Bauereiß T, Gritti AP, Popescu A, Raimondi F. CoSMeDis: a distributed social media platform with formally verified confidentiality guarantees. In symposium on security and privacy 2017 (pp. 729-48). IEEE.

[21][21]Pasquier TF, Eyers D. Information flow audit for transparency and compliance in the handling of personal data. In international conference on cloud engineering workshop 2016 (pp. 112-7). IEEE.

[22][22]Pasquier TF, Powles JE. Expressing and enforcing location requirements in the cloud using information flow control. In international conference on cloud engineering 2015 (pp. 410-5). IEEE.

[23][23]Pasquier TF, Singh J, Eyers D, Bacon J. CamFlow: managed data-sharing for cloud services. IEEE Transactions on Cloud Computing. 2015; 5(3):472-84.

[24][24]Pasquier TF, Singh J, Bacon J, Eyers D. Information flow audit for PAAS clouds. In international conference on cloud engineering 2016 (pp. 42-51). IEEE.

[25][25]Sree TR, Bhanu S. Detection of http flooding attacks in cloud using dynamic entropy method. Arabian Journal for Science and Engineering. 2018; 43(12):6995-7014.

[26][26]Wang Y, Li J, Wang HH. Cluster and cloud computing framework for scientific metrology in flow control. Cluster Computing. 2019; 22(1):1189-98.

[27][27]Lu X, Cao L, Du X. Dynamic control method for tenants sensitive information flow based on virtual boundary recognition. IEEE Access. 2020; 8:162548-68.

[28][28]Bs R, Nv NK, Shyamasundar RK. Towards unifying RBAC with information flow control. In proceedings of the 26th ACM symposium on access control models and technologies 2021 (pp. 45-54).

[29][29]Seifermann S, Heinrich R, Werle D, Reussner R. Detecting violations of access control and information flow policies in data flow diagrams. Journal of Systems and Software. 2022.

[30][30]Moussaid NE, Azhari ME. Enhance the security properties and information flow control. International Journal of Electronic Business. 2020; 15(3):249-74.

[31][31]Zhang Z, Yang Z, Du X, Li W, Chen X, Sun L. Tenant-led ciphertext information flow control for cloud virtual machines. IEEE Access. 2021; 9:15156-69.

[32][32]Li L. The control method of big data information flow based on semantic characteristics in cloud computing environment. Journal of Interconnection Networks. 2022.

[33][33]Lu J, Sun J, Xiao R, Jin S. DIFCS: a secure cloud data sharing approach based on decentralized information flow control. Computers & Security. 2022.

[34][34]Gurav YB, Patil BM. Two-fold improved poor rich optimization algorithm based de-centralized information flow control for cloud virtual machines: an algorithmic analysis. In international conference on smart systems and inventive technology 2022 (pp. 417-25). IEEE.