New Approach to Partitioning Confidential Resources in Hybrid Clouds

Kaouther Samet, Samir Moalla, Mahdi Khemakhem

2015

Abstract

Today, companies use more cloud environments such as hybrid clouds. Indeed, hybrid clouds give the opportunity to better manage resources mostly when companies have no space to store more resources in their private clouds. The best solution here is to allocate the required space in public cloud at a low cost. But how can resources be partitioned in hybrid clouds while assuring confidentiality of resources moved to public cloud. Many works have been done in this context. They suppose that confidentiality is assured by using encryption methods. But with this solution the cloud provider can access the resources stored on the cloud, which weakens the confidentiality of these. This work proposes an approach to the Confidential Resources Partitioning Problem in Hybrid Clouds (CRPHC) which aims at ensuring the confidentiality of resources by grouping as much as possible the most confidential resources in private cloud and resources with low degrees of confidentiality in public cloud while minimizing the size of resources to host in public cloud and consequently reducing the storage cost. This solution allows the possibility of using non-performing encryption methods which have a reduced treatement cost compared to efficient methods. Experimentally, our solution will be evaluated and compared to optimal solution given by CPLEX.

References

  1. Aitha, P. (2014). Cplex tutorial handout. http://fr.scribd.com/doc/63956075/CPLEX-TutorialHandout.
  2. Chokhani, R. C. M. I. S. (2013). Cryptographic key management issues and challenges in cloud services. National Institute of standards and Technology.
  3. Kantarcioglu, V. K. M. and Thuraisingham, B. (2011). Secure data processing in a hybrid cloud. Pacific Asia conference on Intelligence and Security Informatics.
  4. Lamba, S. and Kumar, A. (2014). An approach for ensuring security in cloud environment. International Journal of Computer Applications.
  5. Marwaha, M. and Bedi, R. (2013). Applying encryption algorithm for data security and privacy in cloud computing. IJCSI International Journal of Computer Science Issues.
  6. Mehrotra, V. K. K. O. B. H. M. K. S. and Thuraisingham, B. (2012). Risk- aware data processing in hybrid clouds. IEEE 5th International Conference on cloud Computing.
  7. Nepal, D. T. S. C. S. and Calvo, R. (2014). Secure data sharing in the cloud. Security; Privacy and Trust in cloud Systems.
  8. Pilli, P. R. P. M. R. S. E. and Joshi, R. (2013). Improved technique for data confidentiality in cloud environment. Networks and Communications.
  9. Ramakrishnan, T. Z. R. and Livny, M. (1996). Birch : An efficient data clustering method for very large database. SIGMOD.
  10. Stoica, M. A. A. F. R. G. A. J. R. A. K. G. L. A. P. A. R. I. and Zaharia, M. (2009). Above the clouds : A berkeley view of cloud computing. In a.
  11. Tata, F. B. N. T. S. and Moalla, S. (2012). Approximate placement of service based applications in hybrid clouds. 21st International conference IEEE WETICE.
  12. Wang, L. G. Z. H. S. Z. N. Z. J. and C.Jiang (2012). Multiobjective optimization for data placement strategy in cloud computing. Springer.
  13. Wang, X. and Guo, W. (2013). A data placement strategy based on genetic algorithm in cloud computing platform. 10th Web Information System and Application Conference (WISA).
  14. Zhang;, C. C. E. J. Y. and Madden, S. (2010). Schism : a workload-driven approach to database replication and partitioning. VLDB; 36th International Conference on Very Large Data Bases.
Download


Paper Citation


in Harvard Style

Samet K., Moalla S. and Khemakhem M. (2015). New Approach to Partitioning Confidential Resources in Hybrid Clouds . In Proceedings of the 5th International Conference on Cloud Computing and Services Science - Volume 1: CLOSER, ISBN 978-989-758-104-5, pages 506-513. DOI: 10.5220/0005444505060513


in Bibtex Style

@conference{closer15,
author={Kaouther Samet and Samir Moalla and Mahdi Khemakhem},
title={New Approach to Partitioning Confidential Resources in Hybrid Clouds},
booktitle={Proceedings of the 5th International Conference on Cloud Computing and Services Science - Volume 1: CLOSER,},
year={2015},
pages={506-513},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005444505060513},
isbn={978-989-758-104-5},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 5th International Conference on Cloud Computing and Services Science - Volume 1: CLOSER,
TI - New Approach to Partitioning Confidential Resources in Hybrid Clouds
SN - 978-989-758-104-5
AU - Samet K.
AU - Moalla S.
AU - Khemakhem M.
PY - 2015
SP - 506
EP - 513
DO - 10.5220/0005444505060513