(Publisher of Peer Reviewed Open Access Journals)

International Journal of Advanced Technology and Engineering Exploration (IJATEE)

ISSN (Print):2394-5443    ISSN (Online):2394-7454
Volume-9 Issue-89 April-2022
Full-Text PDF
Paper Title : Improved sun flow optimization (I-SFO) algorithm based de-centralized information flow control for multi-tenant cloud virtual machines
Author Name : Yogesh B. Gurav and Bankat M. Patil
Abstract :

A novel multi-tenant decentralized information flow control (MT-DIFC) model is introduced in this research work. In cloud computing, the MT-DIFC allows a larger pool of resources to be shared among a larger number of people without compromising privacy and security. Initially, the sensitive data is isolated from the rest on the basis of the security level. Then, these sensitive data are subjected to encryption via an improved signcryption algorithm. At the receiver end, the decryption takes place based on the computed two-level trust model. Interestingly, here the direct, as well as indirect trust, is computed for the ones who request for access privileges to the data owners. Based on the computed trust level, the access privilege is provided to the user’s request; and here the level of document readability and downloading capability will be decided by the data owner. Based on the computed trust level, the decryption of the data (only the permitted data-level access provided by the owner) is accomplished. Furthermore, the improved sun flow optimization algorithm (I-SFO) has been introduced for optimal key generation. This I-SFO model is validated by varying its weight function W from 100, 150 and 200, respectively. In addition, a non-parametric analysis has been carried out to validate the efficiency of I-SFO. Accordingly, the outcomes reveal that the proposed work has attained the least cost function, while fixing W=100, 150 and 200, respectively.

Keywords : Cloud computing, Multi-tenant virtual machine, I-SFO, Non-parametric analysis.
Cite this article : Gurav YB, Patil BM. Improved sun flow optimization (I-SFO) algorithm based de-centralized information flow control for multi-tenant cloud virtual machines . International Journal of Advanced Technology and Engineering Exploration. 2022; 9(89):490-508. DOI:10.19101/IJATEE.2021.875064.
References :
[1]Elsayed M, Zulkernine M. IFCaaS: information flow control as a service for cloud security. In international conference on availability, reliability and security 2016 (pp. 211-6). IEEE.
[Crossref] [Google Scholar]
[2]Bacon J, Eyers D, Pasquier TF, Singh J, Papagiannis I, Pietzuch P. Information flow control for secure cloud computing. IEEE Transactions on Network and Service Management. 2014; 11(1):76-89.
[Crossref] [Google Scholar]
[3]Xi N, Sun C, Ma J, Shen Y. Secure service composition with information flow control in service clouds. Future Generation Computer Systems. 2015; 49:142-8.
[Crossref] [Google Scholar]
[4]Xi N, Ma J, Sun C, Lu D, Shen Y. Information flow control on encrypted data for service composition among multiple clouds. Distributed and Parallel Databases. 2018; 36(3):511-27.
[Crossref] [Google Scholar]
[5]Khurshid A, Khan AN, Khan FG, Ali M, Shuja J, Khan AU. Secure‐CamFlow: a device‐oriented security model to assist information flow control systems in cloud environments for IoTs. Concurrency and Computation: Practice and Experience. 2019; 31(8):e4729.
[Crossref] [Google Scholar]
[6]Phatak A, Kadikar R, Vijayan K, Amutha B. Performance analysis of firewall based on SDN and OpenFlow. In international conference on communication and signal processing 2018 (pp. 0611-5). IEEE.
[Crossref] [Google Scholar]
[7]Candotti D, Steel MD, West AC. Charting the course for Tasmanias energy cloud roadmap. In PES Asia-pacific power and energy engineering conference 2015 (pp. 1-5). IEEE.
[Crossref] [Google Scholar]
[8]Huang G, Chen J, Khojasteh Y. A cyber-physical system deployment based on pull strategies for one-of-a-kind production with limited resources. Journal of Intelligent Manufacturing. 2021; 32(2):579-96.
[Crossref] [Google Scholar]
[9]Bolodurina I, Parfenov D, Shukhman A. Approach to the effective controlling cloud computing resources in data centers for providing multimedia services. In international Siberian conference on control and communications 2015 (pp. 1-6). IEEE.
[Crossref] [Google Scholar]
[10]Li W, Wu J, Cao J, Chen N, Zhang Q, Buyya R. Blockchain-based trust management in cloud computing systems: a taxonomy, review and future directions. Journal of Cloud Computing. 2021; 10(1):1-34.
[Crossref] [Google Scholar]
[11]Xu Z, Zhang Y, Li H, Yang W, Qi Q. Dynamic resource provisioning for cyber-physical systems in cloud-fog-edge computing. Journal of Cloud Computing. 2020; 9(1):1-16.
[Crossref] [Google Scholar]
[12]Pierson JM, Baudic G, Caux S, Celik B, Da CG, Grange L, et al. DATAZERO: datacenter with zero emission and robust management using renewable energy. IEEE Access. 2019; 7:103209-30.
[Crossref] [Google Scholar]
[13]Singh J, Pasquier TF, Bacon J, Eyers D. Integrating messaging middleware and information flow control. In international conference on cloud engineering 2015 (pp. 54-9). IEEE.
[Crossref] [Google Scholar]
[14]Zhou L, Zhang H, Zhang K, Wang B, Shen D, Wang Y. Advances in applying cloud computing techniques for air traffic systems. In 2nd international conference on civil aviation safety and information technology 2020 (pp. 134-9). IEEE.
[Crossref] [Google Scholar]
[15]Nakamura S, Enokido T, Takizawa M. Implementation and evaluation of the information flow control for the internet of things. Concurrency and Computation: Practice and Experience. 2021; 33(19).
[Crossref] [Google Scholar]
[16]Kim N, Yang D. Performance analysis of a centralized burst-mode traffic shaping for distributed parallel queues. IEEE Communications Letters. 2015; 19(3):351-4.
[Crossref] [Google Scholar]
[17]Solanki N, Zhu W, Yen IL, Bastani F, Rezvani E. Multi-tenant access and information flow control for SaaS. In international conference on web services 2016 (pp. 99-106). IEEE.
[Crossref] [Google Scholar]
[18]Enokido T, Takizawa M. A purpose-based synchronization protocol for secure information flow control. International Journal of Computer Systems Science and Engineering. 2010; 25(2):25-32.
[Google Scholar]
[19]Wang C, Chow SS, Wang Q, Ren K, Lou W. Privacy-preserving public auditing for secure cloud storage. IEEE Transactions on Computers. 2011; 62(2):362-75.
[Crossref] [Google Scholar]
[20]Bauereiß T, Gritti AP, Popescu A, Raimondi F. CoSMeDis: a distributed social media platform with formally verified confidentiality guarantees. In symposium on security and privacy 2017 (pp. 729-48). IEEE.
[Crossref] [Google Scholar]
[21]Pasquier TF, Eyers D. Information flow audit for transparency and compliance in the handling of personal data. In international conference on cloud engineering workshop 2016 (pp. 112-7). IEEE.
[Crossref] [Google Scholar]
[22]Pasquier TF, Powles JE. Expressing and enforcing location requirements in the cloud using information flow control. In international conference on cloud engineering 2015 (pp. 410-5). IEEE.
[Crossref] [Google Scholar]
[23]Pasquier TF, Singh J, Eyers D, Bacon J. CamFlow: managed data-sharing for cloud services. IEEE Transactions on Cloud Computing. 2015; 5(3):472-84.
[Crossref] [Google Scholar]
[24]Pasquier TF, Singh J, Bacon J, Eyers D. Information flow audit for PAAS clouds. In international conference on cloud engineering 2016 (pp. 42-51). IEEE.
[Crossref] [Google Scholar]
[25]Sree TR, Bhanu S. Detection of http flooding attacks in cloud using dynamic entropy method. Arabian Journal for Science and Engineering. 2018; 43(12):6995-7014.
[Crossref] [Google Scholar]
[26]Wang Y, Li J, Wang HH. Cluster and cloud computing framework for scientific metrology in flow control. Cluster Computing. 2019; 22(1):1189-98.
[Crossref] [Google Scholar]
[27]Lu X, Cao L, Du X. Dynamic control method for tenants sensitive information flow based on virtual boundary recognition. IEEE Access. 2020; 8:162548-68.
[Crossref] [Google Scholar]
[28]Bs R, Nv NK, Shyamasundar RK. Towards unifying RBAC with information flow control. In proceedings of the 26th ACM symposium on access control models and technologies 2021 (pp. 45-54).
[Crossref] [Google Scholar]
[29]Seifermann S, Heinrich R, Werle D, Reussner R. Detecting violations of access control and information flow policies in data flow diagrams. Journal of Systems and Software. 2022.
[Crossref] [Google Scholar]
[30]Moussaid NE, Azhari ME. Enhance the security properties and information flow control. International Journal of Electronic Business. 2020; 15(3):249-74.
[Google Scholar]
[31]Zhang Z, Yang Z, Du X, Li W, Chen X, Sun L. Tenant-led ciphertext information flow control for cloud virtual machines. IEEE Access. 2021; 9:15156-69.
[Crossref] [Google Scholar]
[32]Li L. The control method of big data information flow based on semantic characteristics in cloud computing environment. Journal of Interconnection Networks. 2022.
[Crossref] [Google Scholar]
[33]Lu J, Sun J, Xiao R, Jin S. DIFCS: a secure cloud data sharing approach based on decentralized information flow control. Computers & Security. 2022.
[Crossref] [Google Scholar]
[34]Gurav YB, Patil BM. Two-fold improved poor rich optimization algorithm based de-centralized information flow control for cloud virtual machines: an algorithmic analysis. In international conference on smart systems and inventive technology 2022 (pp. 417-25). IEEE.
[Crossref] [Google Scholar]