[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Security Risk Optimization for Multi-cloud Applications

  • Conference paper
  • First Online:
Applications of Evolutionary Computation (EvoApplications 2020)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 12104))

Abstract

Security proved to be a major concern when organizations outsource their data storage and processing. Encryption schemes do not provide solutions as they disable data processing in the cloud. Researchers have used constraint-based data fragmentation to increase security while maintaining availability. We build on this approach by applying fragmentation to the application logic in addition to the data in the database and propose a model for security risk assessment in a multi-cloud environment. By applying a multi-objective optimization algorithm to the proposed model, we determine pareto-optimal distributions of application and data fragments to the available cloud providers.

This research is co-sponsored by the European Union from the European Regional Development Fund through a research grant KK.01.2.1.01.0109 Cloud Computing Security During the Use of Mobile Applications. We acknowledge the support of the Ministry of Regional Development and European Union Funds of the Republic of Croatia as well as our research partners OROUNDO Mobile GmbH Austria and OROUNDO Mobile GmbH Subsidiary Croatia.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 35.99
Price includes VAT (United Kingdom)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 44.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. AlZain, M.A., Pardede, E., Soh, B., Thom, J.: Cloud computing security: from single to multi-clouds (2012)

    Google Scholar 

  2. Buyya, R., et al.: A manifesto for future generation cloud computing: research directions for the next decade. ACM Comput. Surv. (CSUR) 51, 1–38 (2019)

    Article  Google Scholar 

  3. Ciriani, V., di Vimercati, S.D.C., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Combining fragmentation and encryption to protect privacy in data storage. ACM Trans. Inf. Syst. Secur. (TISSEC) 13, 1–33 (2010)

    Article  Google Scholar 

  4. di Vimercati, S.D.C., Foresti, S., Jajodia, S., Livraga, G., Paraboschi, S., Samarati, P.: Fragmentation in presence of data dependencies. IEEE Trans. Dependable Secure Comput. 11, 510–523 (2014)

    Article  Google Scholar 

  5. Deb, K., Jain, H.: An evolutionary many-objective optimization algorithm using reference-point-based nondominated sorting approach, part I: solving problems with box constraints. IEEE Trans. Evol. Comput. 18, 577–601 (2013)

    Article  Google Scholar 

  6. Deb, K., Pratap, A., Agarwal, S., Meyarivan, T.: A fast and elitist multiobjective genetic algorithm: NSGA-II. IEEE Trans. Evol. Comput. 6, 182–197 (2002)

    Article  Google Scholar 

  7. Hajjat, M., et al.: Cloudward bound: planning for beneficial migration of enterprise applications to the cloud. ACM SIGCOMM Comput. Commun. Rev. 40, 243–254 (2010)

    Article  Google Scholar 

  8. Hashizume, K., Rosado, D.G., Fernández-Medina, E., Fernández, E.B.: An analysis of security issues for cloud computing. J. Internet Serv. Appl. 4, 5 (2013)

    Article  Google Scholar 

  9. Hong, T., Mei, S., Wang, Z., Ren, J.: A novel vertical fragmentation method for privacy protection based on entropy minimization in a relational database. Symmetry 10, 637 (2018)

    Article  Google Scholar 

  10. Hudic, A., Islam, S., Kieseberg, P., Rennert, S., Weippl, E.: Data confidentiality using fragmentation in cloud computing. Int. J. Commun. Netw. Distrib. Syst. 1, 1 (2012)

    Google Scholar 

  11. Kelbert, F., et al.: Securecloud: secure big data processing in untrusted clouds (2017)

    Google Scholar 

  12. Modi, C., Patel, D., Borisaniya, B., Patel, A., Rajarajan, M.: A survey on security issues and solutions at different layers of cloud computing. J. Supercomput. 63, 561–592 (2013)

    Article  Google Scholar 

  13. Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34, 1–11 (2011)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rudolf Lovrenčić .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Lovrenčić, R., Jakobović, D., Škvorc, D., Groš, S. (2020). Security Risk Optimization for Multi-cloud Applications. In: Castillo, P.A., Jiménez Laredo, J.L., Fernández de Vega, F. (eds) Applications of Evolutionary Computation. EvoApplications 2020. Lecture Notes in Computer Science(), vol 12104. Springer, Cham. https://doi.org/10.1007/978-3-030-43722-0_42

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-43722-0_42

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-43721-3

  • Online ISBN: 978-3-030-43722-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics