Intrusion Detection and Tolerance in Cloud Computing
Abstract
Cloud computing has grown from being a promising business concept to one of the fastest growing segments of the IT industry. So, cloud environment always remains vulnerable to attacks. The framework serves as an excellent platform for making cloud services intrusion tolerant. The feasibility of the framework has been tested by making cloud’s Infrastructure as a Service (IaaS) and Data Storage Service intrusion tolerant. The proposed framework has been validated by integrating Intrusion Tolerance via Threshold Cryptography (ITTC) mechanism in the simulated cloud’s IaaS. For this, the data centre authentication key is distributed among the hosts using Shamir Secret Sharing algorithm. Performance of the new simulated service model is measured using various performance metrics such as total execution time, intrusion detection time, recovery time, number of cloudlets etc. It involves, using proposed Cloud Intrusion Tolerance framework for securing cloud Data Storage. The correctness of user’s data is ensured by using erasure-correcting code in the file distribution preparation to provide redundancy parity vectors. Performance analysis using erasure-correcting code for securing data storage is also done.
Keywords: Cloud Computing, Intrusion Tolerance, Threshold Cryptography, Framework, Data Storage, Security, Reed-Solomon Encoding, Shamir Secret Sharing.
Full Text:
PDFDOI: https://doi.org/10.26483/ijarcs.v3i3.1226
Refbacks
- There are currently no refbacks.
Copyright (c) 2016 International Journal of Advanced Research in Computer Science

