SAAS Application – Running Large Scale Application in Lightweight Cloud with Strong Privacy Protection

Sivakumar R.*, Udhayaprakash P. **, Vishweshwaran R. ***, Yaswanth V.****
*-**** Department of Information Technology, SRM Valliammai Engineering College, Tamil Nadu, India.
Periodicity:September - November'2020
DOI : https://doi.org/10.26634/jit.9.4.18243

Abstract

Web has become an open platform, where everybody can build and run and deploy the applications. If a small company or a user wants to supply web services, it is better for them to rent the computing infrastructure. Infrastructure-as-a-Service (IaaS) is the delivery of computer components such as servers, network, hardware, storage, computing power, etc. The customer is charged just for the resources consumed like utility-based computing. Virtualization may be a technique to implement cloud computing resources like platform, application, storage, and network. The beauty of virtualization solutions is that you simply can run multiple virtual machines (VM) simultaneously on one computer. Cloud Native, the emerging computing infrastructure has become a replacement trend for cloud computing, especially after the event of containerization technology like docker, and therefore the orchestration system for them like Kubernetes and Swarm. With the growing popularity of Cloud Native, the subsequent problems are raised: (i) most Cloud Native applications were designed for creating full use of the cloud platform, but their file storage system has not been optimized for adapting it. (ii) the normal filing system is meant as a utility for storing and retrieving files, usually built into the kernel of the operating systems. But when placing it to a largescale condition, sort of a network storage server shared by thousands of computing instances, and storing many files, it gets slow and even unstable. (iii) most storage solutions use metadata for faster tracking of files, but the metadata itself will take up tons of space, and therefore the capacity of it is usually limited. If the filing system store metadata directly into hard disc without caching, the tracking of massive small files are going to be slower.

Keywords

Virtualization, Containerization, Kubernetes, Metadata, Computing, Virtual Machines.

How to Cite this Article?

Sivakumar, R., Udhayaprakash, P., Vishweshwaran, R., and Yaswanth, V. (2020). SAAS Application – Running Large Scale Application in Lightweight Cloud with Strong Privacy Protection. i-manager's Journal on Information Technology, 9(4), 16-22. https://doi.org/10.26634/jit.9.4.18243

References

[1]. Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., & Song, D. (2007, October). Provable data possession at untrusted stores. In Proceedings of the 14th ACM conference on Computer and communications security (pp. 598-609). https://doi. org/10.1145/1315245.1315318
[2]. Cui, H., Deng, R. H., Li, Y., & Wu, G. (2017). Attributebased storage supporting secure deduplication of encrypted data in cloud. IEEE Transactions on Big Data, 5(3), 330-342.
[3]. Ding, R., Zhong, H., Ma, J., Liu, X., & Ning, J. (2019). Lightweight privacy-preserving identity-based verifiable IoT-based health storage system. IEEE Internet of Things Journal, 6(5), 8393-8405.
[4]. Douceur, J. R., Adya, A., Bolosky, W. J., Simon, P., & Theimer, M. (2002, July). Reclaiming space from duplicate files in a serverless distributed file system. In Proceedings 22nd International Conference on Distributed Computing Systems (pp. 617-624). IEEE.
[5]. Fan, Y., Lin, X., Tan, G., Zhang, Y., Dong, W., & Lei, J. (2019). One secure data integrity verification scheme for cloud storage. Future Generation Computer Systems, 96, 376-385. https://doi.org/10.1016/j.future.2019.01.054
[6]. Gantz, J., & Reinsel, D. (2012). The digital universe decade–are you ready. Retrieved from http://www. emc. com/collateral/analyst-reports/idcdigital-universe-areyou- ready. pdf.
[7]. Ge, X., Yu, J., Zhang, H., Hu, C., Li, Z., Qin, Z., & Hao, R. (2019). Towards achieving keyword search over dynamic encrypted cloud data with symmetric-key based verification. IEEE Transactions on Dependable and Secure Computing.
[8]. Guo, W., Zhang, H., Qin, S., Gao, F., Jin, Z., Li, W., & Wen, Q. (2019). Outsourced dynamic provable data possession with batch update for secure cloud storage. Future Generation Computer Systems, 95, 309-322. https://doi.org/10.1016/j.future.2019.01.009
[9]. Halevi, S., Harnik, D., Pinkas, B., & Shulman-Peleg, A. (2011, October). Proofs of ownership in remote storage systems. In Proceedings of the 18th ACM Conference on Computer and Communications Security (pp. 491-500). https://doi.org/10.1145/2046707.2046765
[10]. Harnik, D., Pinkas, B., & Shulman-Peleg, A. (2010). Side channels in cloud services: Deduplication in cloud storage. IEEE Security & Privacy, 8(6), 40-47.
[11]. He, K., Chen, J., Yuan, Q., Ji, S., He, D., & Du, R. (2019). Dynamic group-oriented provable data possession in the cloud. IEEE Transactions on Dependable and Secure Computing.
[12]. Hou, H., Yu, J., & Hao, R. (2019). Cloud storage auditing with deduplication supporting different security levels according to data popularity. Journal of Network and Computer Applications, 134, 26-39. https://doi.org/ 10.1016/j.jnca.2019.02.015
[13]. Keelveedhi, S., Bellare, M., & Ristenpart, T. (2013). DupLESS: Server-aided encryption for deduplicated storage. In 22nd {USENIX}Security Symposium ({USENIX} Security 13) (pp. 179-194).
[14]. Li, J., Chen, X., Huang, X., Tang, S., Xiang, Y., Hassan, M. M., & Alelaiwi, A. (2015a). Secure distributed deduplication systems with improved reliability. IEEE Transactions on Computers, 64(12), 3569-3579.
[15]. Li, J., Li, J., Xie, D., & Cai, Z. (2015b). Secure auditing and deduplicating data in cloud. IEEE Transactions on Computers, 65(8), 2386-2396.
[16]. Li, Y., Yu, Y., Min, G., Susilo, W., Ni, J., & Choo, K. K. R. (2017). Fuzzy identity-based data integrity auditing for reliable cloud storage systems. IEEE Transactions on Dependable and Secure Computing, 16(1), 72-83.
[17]. Lynn, B. (2015). The pairing-based cryptographic library. Retrieved from https://crypto.stanford.edu/pbc/
18]. Peng, S., Zhou, F., Li, J., Wang, Q., & Xu, Z. (2019). Efficient, dynamic and identity-based remote data integrity checking for multiple replicas. Journal of Network and Computer Applications, 134, 72-88. https://doi.org/10.1016/j.jnca.2019.02.014
[19]. Shen, W., Qin, J., Yu, J., Hao, R., & Hu, J. (2018). Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage. IEEE Transactions on Information Forensics and Security, 14(2), 331-346.
[20]. Shen, W., Qin, J., Yu, J., Hao, R., Hu, J., & Ma, J. (2019). Data integrity auditing without private key storage for secure cloud storage. IEEE Transactions on Cloud Computing.
[21]. Singh, P., Agarwal, N., & Raman, B. (2018). Secure data deduplication using secret sharing schemes over cloud. Future Generation Computer Systems, 88, 156- 167.
[22]. The Gnu Multiple Precision Arithmetic Library (n.d.). What is GMP? Retrieved from http://gmplib.org/
[23]. Juels, A., & Kaliski Jr, B. S. (2007, October). PORs: Proofs of retrievability for large files. In Proceedings of the 14th ACM Conference on Computer and Communications Security (pp. 584-597). https://doi.org/10.1145/1315245. 1315317
[24]. Shacham, H., & Waters, B. (2008, December). Compact proofs of retrievability. In International Conference on the Theory and Application of Cryptology and Information Security (pp. 90-107). Springer, Berlin, Heidelberg.
[25]. Bellare, M., Keelveedhi, S., & Ristenpart, T. (2013, May). Message-locked encr yption and secure deduplication. In Annual International Conference on the Theory and Applications of Cryptographic Techniques (pp. 296-312). Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38348-9_18
[26]. Liu, X., Sun, W., Lou, W., Pei, Q., & Zhang, Y. (2017, May). One-tag checker: Message-locked integrity auditing on encrypted cloud deduplication storage. In IEEE INFOCOM 2017-IEEE Conference on Computer Communications (pp. 1-9). IEEE.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Online 15 15

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.