P2P Cloud: Peer-to-Peer Based Security Aware CloudStorage Architecture

lalitha.B*, A.V.L.N.Sujith**
* Assistant professor, Department of Computer Science and Engineering, Jawaharlal Nehru Technological University, Anantapur, India
** Lecturer, Department of Computer Science and Engineering, Jawaharlal Nehru Technological University, Anantapur, India.
Periodicity:February - April'2014
DOI : https://doi.org/10.26634/jcc.1.2.3053

Abstract

Cloud computing is most popular for its ubiquitous behavior, because the users can access the resources irrespective of their location and time. Even though it is cost effective, flexible and efficient platform for delivering services, deployment of cloud computing in real-time business environment brings out substantial security issues in handling essential data. It is very difficult to provide security, maintain privacy and update service availability in cloud, because they outsource their services frequently to a third party. Clouds can be safeguarded by securing virtualized data center resources, preserving data integrity and maintaining user privacy. Thereby, secured and efficient methods are required to address confidentiality and integrity of the outsourced data on untrusted cloud servers. In this paper, the authors propose a Peerto- Peer based cloud architecture to secure resources in virtualized data centers and implementation of a secured protocol based on cryptographic and random sampling techniques for data integrity in cloud

Keywords

Keywords: Cloud Security, Peer-to-peer, Cryptography, Data Integrity, Confidentiality

How to Cite this Article?

Lalitha, B., and Sujith, A. V. L. N. (2014). P2p Cloud: Peer-to-Peer Based Security Aware Cloud Storage Architecture . i-manager’s Journal on Cloud Computing, 1(2), 20-24. https://doi.org/10.26634/jcc.1.2.3053

References

[1]. Pouwelse, J. A, Garbacki, P, Epema, D. H. J, and Sips, H. J, (2005), "The BitTorrent P2P file-sharing system: Measurements and analysis", 4th International Workshop on Peer-to-Peer Systems, pp. 205-216.
[2]. Portmann, M.; Sookavatana, P. ; Ardon, S.; Seneviratne, A. (2001)," The cost of peer discovery and searching in the Gnutella peer-to-peer file sharing protocol", 9th IEEE International Conference on Networks. pp.263-268.
[3]. Bin Tang ; Zongheng Zhou ; Kashyap, A. ; Tzi-cker Chiueh , (2005), " An integrated approach for P2P file sharing on multi-hop wireless networks", IEEE International Conference on Wireless And Mobile Computing, Networking And Communications. Vol.3, pp. 268-274.
[4]. Demchenko, Y., D.R. Lopez, J.A. Garcia Espin, C. de Laat, (2010). "Security Services Lifecycle Management in On-Demand Infrastructure Services Provisioning",2nd IEEE International Conference on Cloud Computing Technology and Science (CloudCom2010).
[5]. Zhao, G., C. Rong, J. Li, F. Zhang, Y. Tang, (2010). "Trusted Data Sharing over Untrusted Cloud Storage Providers", IEEE International Conference on Cloud Computing Technology and Science. pp. 97-103.
[6]. W illiam Acosta and Surendar Chandra, (2005),"Unstructured Peer to Peer Networks Next Generation ofPerformance and Reliability", IEEE INFOCOM.
[7]. Ke Xu, Meina Song, Xiaoqi Zhang, Junde Song, (2009), " A Cloud Computing Platform Based on P2P ", IEEE International Symposium on IT in Medicine & Education,Vol.1,pp. 427-432.
[8]. Ruixuan Li, Li Nie, Xiaopu Ma, Meng Dong, Wei Wang,(2011), “SMEF: An Entropy Based Security Framework for Cloud-Oriented Service Mashup ", Int.Conf on Trust, Security and Privacy in Computing and Communications. pp.304-311.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Online 15 15

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.