08.07.2015 Views

enabling self auditing for mobile clients in cloud computing

enabling self auditing for mobile clients in cloud computing

enabling self auditing for mobile clients in cloud computing

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

International Journal of Advanced Computer Technology (IJACT)ISSN:2319-7900multiple services <strong>in</strong> parallel to huge number of <strong>clients</strong> viathe virtualization technique [12, 13, 23]. The tools likeVMWare, Micorsoft Virtual PC, VirtualBox, Parallels, QE-MU etc. helps <strong>in</strong> virtualization of Operat<strong>in</strong>g Systems. The<strong>cloud</strong> enables the centralization of resources, which is unsafes<strong>in</strong>ce the chances <strong>for</strong> cyber attacks <strong>in</strong>creases. The possibility<strong>for</strong> the attack is more <strong>in</strong> <strong>cloud</strong> side because, the user of the<strong>cloud</strong> needs to send his identity over the Internet frequently<strong>for</strong> access<strong>in</strong>g the services.The data security is also a challeng<strong>in</strong>g issue <strong>in</strong> <strong>cloud</strong>comput<strong>in</strong>g s<strong>in</strong>ce all the data of an <strong>in</strong>dividual or organizationare centralized and kept <strong>in</strong> remote servers [14, 15, 19]. Toensure the data security, the strong encryption algorithmshas to be developed to overcome the security threads on storagesecurity. The <strong>cloud</strong> service provider has to limit theaccess over the file by allow<strong>in</strong>g few actions related to manag<strong>in</strong>gthe files without any strict process and should be strict<strong>in</strong> actions like updat<strong>in</strong>g, read<strong>in</strong>g and delet<strong>in</strong>g of file. Thiswill optimize the per<strong>for</strong>mance as well as security. To keepthe <strong>cloud</strong> runn<strong>in</strong>g smoothly, the multi level security is compulsoryat various levels i.e., network level [16], host level[25] and application level [14, 26, 27]. The basic securitymodels such as SQL Injection attack prevention, Cross SiteScript<strong>in</strong>g (XSS) attack prevention, Man <strong>in</strong> the Middle attackprevention [20, 21, 32, 32, 37, 44] are not sufficient <strong>for</strong> the<strong>cloud</strong> to run seamlessly.In the Internet, it is common to have denial of service attacks[2, 3, 4, 18, 22, 23, 28] and cookies poison<strong>in</strong>g attacks[43]. To dist<strong>in</strong>guish the human and mach<strong>in</strong>e virus <strong>in</strong> theInternet, the concept of captcha [5] was used by most of theservers. but recent virus and spams have the ability to breakthe captcha. So it is clear that, cont<strong>in</strong>uous research <strong>in</strong> thisfield is must to protect the future Internet oriented services.It is true that certa<strong>in</strong> loopholes <strong>in</strong> the architecture makethe <strong>cloud</strong> comput<strong>in</strong>g vulnerable to the security threads <strong>in</strong>high probability [45, 46]. There is no guaranty that the<strong>cloud</strong> service provider could ma<strong>in</strong>ta<strong>in</strong> our files on a s<strong>in</strong>gleserver or storage. The files may be split <strong>in</strong>to many parts anddistributed over multiple servers to improve the speed viaparallelism. This scenario makes the <strong>cloud</strong> more vulnerableto the security related threads.Apart from security, <strong>cloud</strong> has other disadvantages likeper<strong>for</strong>mance, latency [29] and reliability [24, 39]. The reason<strong>for</strong> the latency, poor per<strong>for</strong>mance and unreliability <strong>in</strong> theservices is as follows;a) The complicated or time consumable encryptionand decryption algorithms used <strong>in</strong> the <strong>cloud</strong> comput<strong>in</strong>genvironment.b) The unreliable and low bandwidth Internet connectivity.c) Unreliable network with high conjunction andpacket losses.d) Allow<strong>in</strong>g too many users to access the servicesbeyond the limit because of high demand from theclient’s side.e) Mobile <strong>clients</strong> runn<strong>in</strong>g with extremely high shortageof resources.However from the survey we can say that, even after severalresearch and development the security and file <strong>in</strong>tegrityproblems are keep on persist <strong>in</strong> the Internet based services,specifically on the <strong>cloud</strong>. So we need different solutions <strong>for</strong>different situations and requirements over time.File Integirity ModelCheck<strong>in</strong>g file <strong>in</strong>tegrity is a challeng<strong>in</strong>g task <strong>in</strong> <strong>cloud</strong> comput<strong>in</strong>g.In the classical method <strong>for</strong> check<strong>in</strong>g the correctnessof a file the client has to ma<strong>in</strong>ta<strong>in</strong> a copy to compare thereceived copy. This is mean<strong>in</strong>gless, because if the client hasenough storage to store the data <strong>in</strong> the local system, then it isnot necessary to use the <strong>cloud</strong> service to store the file <strong>in</strong> remotelocation. The <strong>clients</strong>, those are not hav<strong>in</strong>g enough resourcesalone may prefer the <strong>cloud</strong> services.From the literature we can have hundreds of file <strong>in</strong>tegritymodels which are suitable <strong>for</strong> <strong>cloud</strong> storage service. Somemodels are lack <strong>in</strong> provid<strong>in</strong>g security and few are poor <strong>in</strong>per<strong>for</strong>mance. Also, some of the exist<strong>in</strong>g models are good <strong>in</strong>security but poor <strong>in</strong> execution time. The methods should becompact enough to run smoothly on the light weight <strong>mobile</strong>devices, s<strong>in</strong>ce most of the <strong>cloud</strong> <strong>clients</strong> are <strong>mobile</strong> <strong>in</strong> therecent years.Our proposed model of file <strong>in</strong>tegrity is as follows. Theentire file has to be split <strong>in</strong>to number of macro blocks(M1,M2,M3,M4, …, Mn). All the macro blocks should be ofunique size. If the Last block conta<strong>in</strong>s no sufficient bits to<strong>for</strong>m the block with fixed size, then padd<strong>in</strong>g bits can bemerged with the orig<strong>in</strong>al data. Each Mi should be processedand the correspond<strong>in</strong>g hash code has to be generated us<strong>in</strong>gour proposed method.ENABLING SELF AUDITING FOR MOBILE CLIENTS IN CLOUD COMPUTING55

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!