Software Defined Network Function Virtualization Framework for Securing Cloud with Data Fusion and Machine Learning Techniques

R. ., M. Botto-Tobar, P. Arya
{"title":"Software Defined Network Function Virtualization Framework for Securing Cloud with Data Fusion and Machine Learning Techniques","authors":"R. ., M. Botto-Tobar, P. Arya","doi":"10.54216/fpa.030204","DOIUrl":null,"url":null,"abstract":"Computing in the cloud is one of the platforms that may be used to provide distributed computing resources. Supplying and managing cloud resources most effectively is referred to as resource management. A recent development in technology known as fog computing is an example of an expanded and dispersed infrastructure. This architecture maintains application processes between end devices and the network edge to provide more dependable and efficient services. These services include remote data storage, allowing customers to access their data from a distant location. Providing remote storage service is an advantageous function offered by cloud suppliers. On the other hand, the data stored in the cloud is geographically dispersed and kept in various data centers, significantly increasing the risk to users' privacy and security. One of the problems that might arise with privacy is when many data centers store the same information. Many cloud service providers check their customers' data using a Third-Party Auditor (TPA) to address concerns about client privacy and data integrity. Currently, most trusted TPAs only have one validator, making it impossible to expand the data integrity across several data centers. The various verifiers used by TPAs have been reduced in number in response to Man in the Cloud (MiTC) attacks. As a result, they cannot check and authenticate the integrity of data stored in several data centers. A unique Peer to Peer (P2P) authentication protocol with Certificate Authority (CA) and Data Storage Protocol is presented as a solution to the problem that has been outlined above to check for and go around any issues that may arise (DSP). The efficiency of the proposed protocol is demonstrated by the incorporation of TPAs and Certificate Authorities. The proposed protocol has been tested with a single user and a single storage server, as well as multiple storage servers in ownCloud with one backup server, two storage servers, three clients, and two TPAs. The NoSQL server in an organization's cloud is set up to save data to storage servers in the appropriate format. The Amanda backup server is used to back up the mirror copy of the stored data on the storage servers. Automated Validation of Internet Security Protocols with Data Fusion and Applications, or AVISPA for short, is a technology that may be used to verify data stored in the cloud. The findings make it abundantly evident that the suggested protocol is strong enough to guarantee the authenticity of data kept in several data centers.","PeriodicalId":269527,"journal":{"name":"Fusion: Practice and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Fusion: Practice and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.54216/fpa.030204","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Computing in the cloud is one of the platforms that may be used to provide distributed computing resources. Supplying and managing cloud resources most effectively is referred to as resource management. A recent development in technology known as fog computing is an example of an expanded and dispersed infrastructure. This architecture maintains application processes between end devices and the network edge to provide more dependable and efficient services. These services include remote data storage, allowing customers to access their data from a distant location. Providing remote storage service is an advantageous function offered by cloud suppliers. On the other hand, the data stored in the cloud is geographically dispersed and kept in various data centers, significantly increasing the risk to users' privacy and security. One of the problems that might arise with privacy is when many data centers store the same information. Many cloud service providers check their customers' data using a Third-Party Auditor (TPA) to address concerns about client privacy and data integrity. Currently, most trusted TPAs only have one validator, making it impossible to expand the data integrity across several data centers. The various verifiers used by TPAs have been reduced in number in response to Man in the Cloud (MiTC) attacks. As a result, they cannot check and authenticate the integrity of data stored in several data centers. A unique Peer to Peer (P2P) authentication protocol with Certificate Authority (CA) and Data Storage Protocol is presented as a solution to the problem that has been outlined above to check for and go around any issues that may arise (DSP). The efficiency of the proposed protocol is demonstrated by the incorporation of TPAs and Certificate Authorities. The proposed protocol has been tested with a single user and a single storage server, as well as multiple storage servers in ownCloud with one backup server, two storage servers, three clients, and two TPAs. The NoSQL server in an organization's cloud is set up to save data to storage servers in the appropriate format. The Amanda backup server is used to back up the mirror copy of the stored data on the storage servers. Automated Validation of Internet Security Protocols with Data Fusion and Applications, or AVISPA for short, is a technology that may be used to verify data stored in the cloud. The findings make it abundantly evident that the suggested protocol is strong enough to guarantee the authenticity of data kept in several data centers.
使用数据融合和机器学习技术保护云的软件定义网络功能虚拟化框架
云计算是可用于提供分布式计算资源的平台之一。最有效地提供和管理云资源称为资源管理。雾计算技术的最新发展是扩展和分散基础设施的一个例子。该架构维护终端设备和网络边缘之间的应用进程,提供更可靠、更高效的服务。这些服务包括远程数据存储,允许客户从远程位置访问他们的数据。提供远程存储服务是云供应商提供的一个优势功能。另一方面,存储在云中的数据在地理上是分散的,并且保存在各个数据中心,这大大增加了用户隐私和安全的风险。当许多数据中心存储相同的信息时,可能会出现隐私问题之一。许多云服务提供商使用第三方审计员(TPA)检查客户的数据,以解决客户隐私和数据完整性方面的问题。目前,大多数可信的tpa只有一个验证器,因此不可能跨多个数据中心扩展数据完整性。为了应对云中的人(MiTC)攻击,tpa使用的各种验证器的数量已经减少。因此,他们无法检查和验证存储在多个数据中心的数据的完整性。一个具有证书颁发机构(CA)和数据存储协议的独特的点对点(P2P)身份验证协议被提出,作为上面概述的问题的解决方案,用于检查和解决可能出现的任何问题(DSP)。通过将tpa和证书颁发机构结合在一起,证明了该协议的有效性。提议的协议已经在单个用户和单个存储服务器上进行了测试,以及在拥有一个备份服务器、两个存储服务器、三个客户端和两个tpa的ownCloud中的多个存储服务器上进行了测试。组织云中的NoSQL服务器设置为以适当的格式将数据保存到存储服务器。Amanda备份服务器用于备份存储服务器上存储数据的镜像副本。使用数据融合和应用程序自动验证互联网安全协议(简称AVISPA)是一种可用于验证存储在云中的数据的技术。研究结果充分表明,所建议的协议足够强大,可以保证保存在多个数据中心的数据的真实性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
CiteScore
2.00
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信