Intrusion Detection and Tolerance in Cloud Computing

Main Article Content

Neha P Kajale
Dhananjay M Dakhane, Nitesh M Tarbani


Cloud computing has grown from being a promising business concept to one of the fastest growing segments of the IT industry. So, cloud environment always remains vulnerable to attacks. The framework serves as an excellent platform for making cloud services intrusion tolerant. The feasibility of the framework has been tested by making cloud’s Infrastructure as a Service (IaaS) and Data Storage Service intrusion tolerant. The proposed framework has been validated by integrating Intrusion Tolerance via Threshold Cryptography (ITTC) mechanism in the simulated cloud’s IaaS. For this, the data centre authentication key is distributed among the hosts using Shamir Secret Sharing algorithm. Performance of the new simulated service model is measured using various performance metrics such as total execution time, intrusion detection time, recovery time, number of cloudlets etc. It involves, using proposed Cloud Intrusion Tolerance framework for securing cloud Data Storage. The correctness of user’s data is ensured by using erasure-correcting code in the file distribution preparation to provide redundancy parity vectors. Performance analysis using erasure-correcting code for securing data storage is also done.


Keywords: Cloud Computing, Intrusion Tolerance, Threshold Cryptography, Framework, Data Storage, Security, Reed-Solomon Encoding, Shamir Secret Sharing.


Download data is not yet available.

Article Details