i-manager's Journal on Cloud Computing (JCC)


Volume 5 Issue 2 July - December 2018

Research Paper

Development of Blowfish Encryption Scheme for Secure Data Storage in Public and Commercial Cloud Computing Environment

Shafi’i Muhammad Abdulhamid* , Nafisat Abubakar Sadiq**, Abdullahi Mohammed ***, Nadim Rana****, Haruna Chiroma*****, Emmanuel Gbenga Dada ******
* Senior Lecturer and Head, Department of Cyber Security Science, Federal University of Technology Minna, Nigeria.
** Graduate, Department of Computer Science, Federal University of Technology (FUT), Minna, Nigeria.
*** Lecturer, Department of Computer Science, Ahmadu Bello University Zaria-Nigeria.
**** Senior Lecturer, College of Computer Science and Information Systems, Jazan University, Jazan, Kingdom of Saudi Arabia.
***** Senior Lecturer, Department of Computer Science, Federal College of Education (Technical), Gombe, Nigeria.
****** Faculty, Department of Computer Engineering, University of Maiduguri, Maiduguri, Nigeria.
Abdulhamid, S. M., Sadiq, N. A., Abdullahi, M., Rana, N., Chiroma, H., Dada, E.G (2018). Development of Blowfish Encryption Scheme for Secure Data Storage in Public and Commercial Cloud Computing Environment, i-manager's Journal on Cloud Computing 5(2), 1-10. https://doi.org/10.26634/jcc.5.2.15690

Abstract

Cloud computing is defined as the delivery of on-demand computing resources ranging from infrastructure application to datacenter over the internet on a pay-per-use basis. Most cloud computing applications does not guarantee high level security, such as privacy, confidentiality, and integrity of data because of third-party transition. This brings the development of Blowfish cloud encryption system that enables them to encrypt their data before storage in the cloud. Blowfish encryption scheme is a symmetric block cipher used to encrypt and decrypt data. Microsoft Azure cloud server was used to test the proposed encryption system. Users are able to encrypt their data and obtain a unique identification to help them retrieve encrypted data from the cloud storage facility as and when needed.

Research Paper

Inter-Agent Coordinated Security Model for Cloud Based Virtual Machines

E. C. Onuoha* , O. P. Akomolafe **
* Lecturer, Federal Polytechnic, Bida, Nigeria.
** Lecturer, Department of Computer Science, University of Ibadan, Ibadan, Nigeria.
Onuoha,E.C., Akomolafe,O.P.(2018).Inter-Agent Coordinated Security Model for Cloud Based Virtual Machines, i-manager's Journal on Cloud Computing 5(2), 11-19. https://doi.org/10.26634/jcc.5.2.15688

Abstract

For a user who desires to utilize the services of the cloud, security is not negotiable. Cloud Service Providers (CSPs) have security features that help protect user's data and information. These features are however not comprehensive. The Service Level Agreement (SLA) of most CSPs have certain exclusions that warrant users to undertake some measures of security upon themselves, especially for tenants having Virtual Machines (VM) in a multi-tenant architecture. This means that users who are ignorant of the security implications might be exposed to great risks. This paper presents a security model that used the OPNET (Optimized Network Engineering Tools) modeler, based on distributed agents, to prevent attacks from rogue virtual machine and enhance security of VM-to-VM communication. A set of mobile devices were given varying levels of access and pitched against some servers. Observing the packet network delays, phase response time for security apps and the coordination between these mobile devices and the installed agents on the servers showed that data belonging to tenants are safer and attacks from virtual machines are almost negligible.

Research Paper

An Extended Min-Min Scheduling Algorithm in Cloud Computing

J. Y. Maipan-uku* , A. Mishra**, A. Abdulganiyu***, A. Abdulkadir****
*,*** Lecturer, Department of Computer Science, Faculty of Natural Sciences, Ibrahim Badamasi Babangida University, Lapai (IBBUL), Niger State, Nigeria.
** Senior Lecturer, Department of Computer Science, Baze University, Abuja, Nigeria.
**** Lecturer, Department of Mathematics, Faculty of Natural Sciences, Ibrahim Badamasi Babangida University, Lapai (IBBUL), Niger State, Nigeria.
Maipan-uku,J.Y., Mishra.A.,Abdulganiyu.A.,Abdulkadir.A.(2018).An Extended Min-Min Scheduling Algorithm in Cloud Computing, i-manager's Journal on Cloud Computing 5(2), 20-26. https://doi.org/10.26634/jcc.5.2.15693

Abstract

Cloudlet scheduling seems to be the most fundamental problem of cloud computing as per Infrastructure as a Service (IaaS). Proper scheduling in cloud lead to load balancing, minimization of makespan, and adequate resources utilization. To meet consumers' expectations, the execution of cloudlet simultaneously is required. Many algorithms have been implemented to solve the cloud scheduling problem. This include Min-Min which gave priority to cloudlet with minimum completion time. Min-Min scheduling algorithm has two clear weaknesses; a high value of makespan being generated and low resource utilization. To address these problems, this research proposes an Extended Min-Min Algorithm which assigns cloudlet base on the differences between maximum and minimum execution time of cloudlets. CloudSim was used to implement and compare the performances of the proposed algorithm with the benchmarks. The results of the extensive experiments show that the proposed algorithm is able to perform better in terms of makespan minimization compared to the existing heuristics.

Review Paper

Data Quality Evaluation Framework for Big Data

Grace Amina Onyeabor * , Azman Ta’a**
*Lecturer Department of Information Science, University of Ibadan, Nigeria.
** Senior Lecturer, Department of Information Science, University of Ibadan, Nigeria.
Onyeabor,G.A., Ta’a,A.(2018). Data Quality Evaluation Framework for Big Data, i-manager's Journal on Cloud Computing 5(2), 27-35. https://doi.org/10.26634/jcc.5.2.15692

Abstract

Data is an important asset in all business organizations of today. Thus the results of its poor quality can be very grievous leading to erroneous insights. Therefore, Data Quality (DQ) needs to be evaluated before the analysis of any Big Data (BD). The evaluation of DQ in BD is challenging. Given the enormous datasets that are of varied format fashioned at a rapid speed, it is impossible to use the traditional methods of evaluating DQ in BD. Rather, there is a requirement of strategies and devices for the assessment and evaluation of DQ in BD in a rapid and more efficient manner. However, assessing the quality of data on the whole BD can be very expensive. In addition, there is also a need for improvement in data transformation activities of BD. This paper proposes a framework for DQ evaluation with the application of data sampling technique on BD sets from different data sources reducing the size of the data to samples representing the population of the BD sets. The Bag of Little Bootstrap (BLB) sampling technique will be used. The target Data Quality Dimensions (DQDs) to be used in this paper are completeness, consistency, and accuracy. In addition, the DQDs will be measured using different metric functions relevant to the DQDs. This will be done before and after an improved data transformation techniques to check the improvement of DQ in BD.

Survey Paper

An Architectural Framework for Ant Lion Optimization-based Feature Selection Technique for Cloud Intrusion Detection System using Bayesian Classifier

Haruna Atabo Christopher* , Jimoh Yakubu**, Shafi’i Muhammad Abdulhamid***, Abdulmalik D. Mohammed****
*-** PG Scholar, Department of Cyber Security Science, Federal University of Technology Minna, Nigeria.
*** Senior Lecturer and Head, Department of Cyber Security Science, Federal University of Technology Minna, Nigeria.
**** Research Scholar, University of Manchester, United Kingdom.
Christopher,H.A., Yakubu.J., Abdulhamid,S.M., Mohammed,A.D.(2018). An Architectural Framework for Ant Lion Optimization-based Feature Selection Technique for Cloud Intrusion Detection System using Bayesian Classifier, i-manager's Journal on Cloud Computing 5(2), 36-44. https://doi.org/10.26634/jcc.5.2.15691

Abstract

Cloud computing has become popular due to its numerous advantages, which include high scalability, flexibility, and low operational cost. It is a technology that gives access to shared pool of resources and services on pay per use and at minimum management effort over the internet. Because of its distributed nature, security has become a great concern to both cloud service provider and cloud users. That is why Cloud Intrusion Detection System (CIDS) has been widely used to the cloud computing setting, which detects and in some cases prevents intrusion. In this paper, the authors have proposed a conceptual framework that detects intrusion attacks within the cloud environment using Ant Lion Optimization (ALO) algorithm for feature selection and Bayesian Classifier. This framework is expected to detect cloud intrusion accurately at low computational cost and reduce false alert rate.