A Dynamic Cloud with Data Privacy Preservation

Total Page:16

File Type:pdf, Size:1020Kb

A Dynamic Cloud with Data Privacy Preservation UC Merced UC Merced Electronic Theses and Dissertations Title A Dynamic Cloud with Data Privacy Preservation Permalink https://escholarship.org/uc/item/03g6171c Author Bahrami, Mehdi Publication Date 2016 License https://creativecommons.org/licenses/by/4.0/ 4.0 Peer reviewed|Thesis/dissertation eScholarship.org Powered by the California Digital Library University of California A Dynamic Cloud with Data Privacy Preservation by Mehdi Bahrami A dissertation submitted in partial satisfaction of the requirements for the degree of Doctor of Philosophy in Electrical Engineering and Computer Science in the Graduate Division of the University of California, Merced Committee in charge: Professor Mukesh Singhal, Chair Professor Florin Rusu Professor Dong Li 1Professor Hamid R. Arabnia 1(External Committee Member, University of Georgia) Fall 2016 A Dynamic Cloud with Data Privacy Preservation Copyright 2017 by Mehdi Bahrami The Dissertation of Mehdi Bahrami is approved, and it is acceptable in quality and form for publication on microfilm and electronically: Professor Mukesh Singhal ______________________________________________________________________________ Professor Dong Li ____________________________________________________________________________ Professor Florin Rusu ______________________________________________________________________________ Professor Hamid R. Arabnia (University of Georgia) ______________________________________________________________________________ ______________________________________________________________________________ Co-Chair (if applicable) Professor Mukesh Singhal ______________________________________________________________________________ Chair University of California, Merced 2016 i Abstract A Dynamic Cloud with Data Privacy Preservation by Mehdi Bahrami Doctor of Philosophy in Electrical Engineering and Computer Science University of California, Merced Professor Mukesh Singhal The emerging field of Cloud Computing provides elastic on-demand services over the Internet or over a network. According to the International Data Corporation (IDC), cloud computing has two major issues: i) architecture issues, such as a lack of standardization, a lack of customization; and ii) users’ data privacy. In this study we focus on these issues. We are facing an increasing demand for migration of varieties of traditional databases and computation services to cloud computing environments, i.e., database-as-a-service. Although each service offers a new feature, it escalates standardization and customization issues due to the lack of standardization between cloud vendors and service customization because each cloud-based service has its own features, requirements and outputs. In the first part of this study, we propose a cloud architecture based on a Service-Oriented Architecture (DCCSOA) that enhances our ability to do standardization and customization in the cloud. The proposed architecture uses a single layer, which is called Dynamic Template Service Layer (DTSL), that provides the following operations and advantages: i) enables a single service layer to interact with all native cloud services (e.g., IaaS, PaaS, SaaS and any cloud-based services); ii) provides a standardization for existing services and future services in the cloud; iii) customizes native cloud services based on users’ group requests. The second part of this study focuses on users’ data privacy preservation on the proposed architecture. Users’ data privacy can be violated by the cloud vendor, the vendor’s authorized users, other cloud users, unauthorized users, or external malicious entities. Encryption of data on client side is one of the solutions to preserve data privacy in the cloud; however, encryption methods are complex and expensive for mobile devices to encrypt and decrypt each file, such as smart phones. We propose a novel light-weight data privacy method (DPM) by using a chaos system for mobile cloud users to store data on multiple clouds. The proposed method enables mobile users to store data in the clouds while it preserves users’ data privacy. ii We consider different technologies to deploy our proposed data privacy preservation method on DCCSOA, including the mobile devices, the Internet-of-things (IoT), and Graphic Processing Unit (GPU)-based computing. We also consider different use case scenarios for the proof of concept, including data privacy preservation for users’ photos in smart phones, sensitive electronic health records protection in the cloud, and data privacy preservation for cloud-based databases. We evaluate both the proposed dynamic architecture and the proposed data privacy preservation method. Our experimental results show that on the one hand DCCSOA enhances standardization by offering a flexible cloud architecture and minimizing the modification on the native cloud services; on the other hand, DPM achieves a superior performance over regular encryption methods in regard to computation time. iii To my Mother, Sisters, Brother, and Yuliya for their endless love, invaluable support, motivation and encouragement In Memory of My Father who was a great and kind teacher, and an invaluable supportive person and who always encouraged me to study, to teach and to complete this work This work would not have been possible without all your support. iv Contents A Dynamic Cloud with Data Privacy Preservation ....................................................................... i Abstract ................................................................................................................................................ i Contents ............................................................................................................................................. iv List of Figures .................................................................................................................................... x List of Tables .................................................................................................................................... xii List of Algorithms ......................................................................................................................... xiii List of Codes ....................................................................................................................................xiv Acknowledgements ........................................................................................................................ xv Organization of this thesis and contributions ............................................................................. 1 Chapter 1 ..................................................................................................................................... 3 Introduction ........................................................................................................................................ 3 Introduction ............................................................................................................................ 3 Big Data Definition ................................................................................................................ 5 Opportunities and Challenges ............................................................................................. 6 Storage Issues ........................................................................................................................ 7 Computing Issues .................................................................................................................. 8 Transfer Issues .................................................................................................................. 8 Cloud Computing .................................................................................................................. 8 On-demand Elastic Service ................................................................................................... 9 Resource pooling................................................................................................................... 9 Service Accessibility ......................................................................................................... 9 Measured Service ............................................................................................................ 10 1.4.2 Cloud Architecture .......................................................................................................... 10 The Role of Infrastructure-as-a-Service (IaaS) ................................................................... 11 The Role of Platform-as-a-Service (PaaS) .......................................................................... 12 The Role of Software-as-a-Service (SaaS) ..................................................................... 13 The Role of Business Intelligence (BI) ........................................................................... 14 v Other Service Layers ........................................................................................................... 15 Big Data Tools ....................................................................................................................... 15 Implementation Models of Cloud Computing Systems ................................................. 18 Cloud Computing Issues .................................................................................................... 19 Chapter Summary ...............................................................................................................
Recommended publications
  • Emerging Issues & Challenges in Cloud Computing—A Hybrid
    Journal of Software Engineering and Applications, 2012, 5, 923-937 923 http://dx.doi.org/10.4236/jsea.2012.531107 Published Online November 2012 (http://www.SciRP.org/journal/jsea) Emerging Issues & Challenges in Cloud Computing— A Hybrid Approach Yaser Ghanam, Jennifer Ferreira, Frank Maurer Department of Computer Science, University of Calgary, Calgary, Canada. Email: [email protected] Received October 16th, 2012; revised November 17th, 2012; accepted November 26th, 2012 ABSTRACT As cloud computing continues to gain more momentum in the IT industry, more issues and challenges are being re- ported by academics and practitioners. In this paper, we aim to attain an understanding of the types of issues and chal- lenges that have been emerging over the past five years and identify gaps between the focus of the literature and what practitioners deem important. A systematic literature review as well as interviews with experts have been conducted to answer our research questions. Our findings suggest that researchers have been mainly focusing on issues related to security and privacy, infrastructure, and data management. Interoperability across different service providers has also been an active area of research. Despite the significant overlap between the topics being discussed in the literature and the issues raised by the practitioners, our findings show that some issues and challenges that practitioners consider im- portant are understudied such as software related issues, and challenges pertaining to learning fast-evolving technologies. Keywords: Cloud Computing; Issues; Challenges; Systematic Literature Review 1. Introduction RQ2. How has the interest in different types of issues and challenges evolved over the past five years? With unprecedented adoption in industry over the past RQ3.
    [Show full text]
  • Orchestrating Big Data Analysis Workflows in the Cloud: Research Challenges, Survey, and Future Directions
    00 Orchestrating Big Data Analysis Workflows in the Cloud: Research Challenges, Survey, and Future Directions MUTAZ BARIKA, University of Tasmania SAURABH GARG, University of Tasmania ALBERT Y. ZOMAYA, University of Sydney LIZHE WANG, China University of Geoscience (Wuhan) AAD VAN MOORSEL, Newcastle University RAJIV RANJAN, Chinese University of Geoscienes and Newcastle University Interest in processing big data has increased rapidly to gain insights that can transform businesses, government policies and research outcomes. This has led to advancement in communication, programming and processing technologies, including Cloud computing services and technologies such as Hadoop, Spark and Storm. This trend also affects the needs of analytical applications, which are no longer monolithic but composed of several individual analytical steps running in the form of a workflow. These Big Data Workflows are vastly different in nature from traditional workflows. Researchers arecurrently facing the challenge of how to orchestrate and manage the execution of such workflows. In this paper, we discuss in detail orchestration requirements of these workflows as well as the challenges in achieving these requirements. We alsosurvey current trends and research that supports orchestration of big data workflows and identify open research challenges to guide future developments in this area. CCS Concepts: • General and reference → Surveys and overviews; • Information systems → Data analytics; • Computer systems organization → Cloud computing; Additional Key Words and Phrases: Big Data, Cloud Computing, Workflow Orchestration, Requirements, Approaches ACM Reference format: Mutaz Barika, Saurabh Garg, Albert Y. Zomaya, Lizhe Wang, Aad van Moorsel, and Rajiv Ranjan. 2018. Orchestrating Big Data Analysis Workflows in the Cloud: Research Challenges, Survey, and Future Directions.
    [Show full text]
  • Polycom Realpresence Cloudaxis Open Source Software OFFER
    Polycom® RealPresence® CloudAXIS™ Suite OFFER of Source for GPL and LGPL Software You may have received from Polycom®, certain products that contain—in part—some free software (software licensed in a way that allows you the freedom to run, copy, distribute, change, and improve the software). As a part of this product, Polycom may have distributed to you software, or made electronic downloads, that contain a version of several software packages, which are free software programs developed by the Free Software Foundation. With your purchase of the Polycom RealPresence® CloudAXIS™ Suite, Polycom has granted you a license to the above-mentioned software under the terms of the GNU General Public License (GPL), GNU Library General Public License (LGPLv2), GNU Lesser General Public License (LGPL), or BSD License. The text of these Licenses can be found at the internet address provided in Table A. For at least three years from the date of distribution of the applicable product or software, we will give to anyone who contacts us at the contact information provided below, for a charge of no more than our cost of physically distributing, the following items: • A copy of the complete corresponding machine-readable source code for programs listed below that are distributed under the GNU GPL • A copy of the corresponding machine-readable source code for the libraries listed below that are distributed under the GNU LGPL, as well as the executable object code of the Polycom work that the library links with The software included or distributed for the product, including any software that may be downloaded electronically via the internet or otherwise (the "Software") is licensed, not sold.
    [Show full text]
  • CLOUD COMPUTING up - Coming Era in IT Punam Assistant Professor, Department of Computer Science, University College Miranpur, Patiala
    TRJ VOL. 2 ISSUE 6 NOV-DEC 2016 ISSN: 2454-7301 (PRINT) | ISSN: 2454-4930 (ONLINE) CLOUD COMPUTING UP - Coming Era in IT Punam Assistant Professor, Department of Computer Science, University College Miranpur, Patiala Abstract- The Cloud computing is a term which is a set of Remotely hosted: Services or data are hosted on remote technologies that allows computing applications and data to systems which mean someone else’s infrastructure. be visible as a set of services from a group of essential Omnipresent: Services or data are available from resources. The establishment of cloud computing comprises anywhere. of data centres (servers, storage, networking), the business Commodified: The result is a utility computing model applications and middleware, virtualization software and for which is equivalent to traditional that of traditional sure operating systems. The cloud computing infrastructure utilities, like gas and electricity. You pay for what you consists of services that are offered up and delivered would like. through data centres that can be accessed from anywhere in II. CLOUD COMPUTING ISSUES: the world. Cloud computing is very much beneficial for businesses now a days because of its valuable features. It is a) Privacy well suited for small organizations where there is budget or Privacy is the key issue that should be kept in mind while infrastructure limitation. The key idea behind this new adopting cloud computing. In cloud computing the private information sharing technology is virtualization which data of a company that was stored in its data centres moves reduces the need to install hardware on each and every into a public cloud which is open for everyone.
    [Show full text]
  • Security of Cloud Computing in the Iot Era
    future internet Article Cyber-Storms Come from Clouds: Security of Cloud Computing in the IoT Era Michele De Donno 1 , Alberto Giaretta 2, Nicola Dragoni 1,2 and Antonio Bucchiarone 3,∗ and Manuel Mazzara 4,∗ 1 DTU Compute, Technical University of Denmark, 2800 Kongens Lyngby, Denmark; [email protected] (M.D.D.); [email protected] (N.D.) 2 Centre for Applied Autonomous Sensor Systems Orebro University, 701 82 Orebro, Sweden; [email protected] 3 Fondazione Bruno Kessler, Via Sommarive 18, 38123 Trento, Italy 4 Institute of Software Development and Engineering, Innopolis University, Universitetskaya St, 1, 420500 Innopolis, Russian Federation * Correspondence: [email protected] (A.B.); [email protected] (M.M.) Received: 28 January 2019; Accepted: 30 May 2019; Published: 4 June 2019 Abstract: The Internet of Things (IoT) is rapidly changing our society to a world where every “thing” is connected to the Internet, making computing pervasive like never before. This tsunami of connectivity and data collection relies more and more on the Cloud, where data analytics and intelligence actually reside. Cloud computing has indeed revolutionized the way computational resources and services can be used and accessed, implementing the concept of utility computing whose advantages are undeniable for every business. However, despite the benefits in terms of flexibility, economic savings, and support of new services, its widespread adoption is hindered by the security issues arising with its usage. From a security perspective, the technological revolution introduced by IoT and Cloud computing can represent a disaster, as each object might become inherently remotely hackable and, as a consequence, controllable by malicious actors.
    [Show full text]
  • In Cloud Computing 1 1 0
    PRIVATE CLOUD e-zine Strategies for building a private cloud In this issue: q TRENDS IN CLOUD COMPUTING 1 1 0 2 By SearchCloudComputing.com Staff R E B M E V q OPEN SOURCE IN THE CLOUD: BOON OR BUST? O N | By Bill Claybrook 4 . 0 N | NO DEMOCRACY FOR APPS IN THE CLOUD? 1 q . L O V By Mike Laverick 1E EDITOR’S LETTER OPEN SOURCE MEETS CLOUD COMPUTING HOME AS CLOUD COMPUTING continues to for evaluating your data center’s mature, IT managers want more. application portfolio and associated They are clamoring for better inte - concerns, including poor application EDITOR’S LETTER gration of cloud platforms with performance and latency, data leak - existing tools, greater control and age, and issues with compliance or TRENDS management, improved self-service, other regulations. and greater portability among cloud But first, in our Cloud One on One environments . interview, we catch up with Altaf OPEN SOURCE Enter open source software, Rupani, the VP of global strategic IN THE CLOUD: which has become the architectural planning and architecture at Dow BOON OR BUST? foundation for many cloud projects . Jones, to explore the company’s Open source software is often lower private cloud rollout and some of cost than proprietary alternatives, its challenges in working with public NO DEMOCRACY FOR APPS IN and its open code base can prevent cloud providers to get the project THE CLOUD? the vendor lock-in common with up and running. The company’s proprietary technologies. Open ongoing efforts may provide a source comes with its challenges, guide for your own initiative.
    [Show full text]
  • Second Year Cloud-Like Management of Grid Sites Research Report
    Second Year Cloud-like Management of Grid Sites Research Report Henar Muñoz Frutos, Ignacio Blasco Lopez, Juan Carlos Cuesta Cuesta, Eduardo Huedo, Rubén Montero, Rafael Moreno, Ignacio Llorente To cite this version: Henar Muñoz Frutos, Ignacio Blasco Lopez, Juan Carlos Cuesta Cuesta, Eduardo Huedo, Rubén Montero, et al.. Second Year Cloud-like Management of Grid Sites Research Report. 2012. hal- 00705635 HAL Id: hal-00705635 https://hal.archives-ouvertes.fr/hal-00705635 Submitted on 8 Jun 2012 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Enhancing Grid Infrastructures with Virtualization and Cloud Technologies Second Year Cloud-like Management of Grid Sites Research Report Deliverable D6.6 (V1.0) 4 June 2012 Abstract This report presents the results of the research and technological development ac- tivities undertaken during the second phase of the project by the three tasks in which WP6 is divided. Mainly, this work has been focused on management of complex multi-tier applications, scaling, monitoring and balancing them to face peaks in demand. In addition, advanced networking (network isolation and fire- walling) and storage capabilities (datastore abstraction and new transfer drivers) have been developed.
    [Show full text]
  • A Generic Development and Deployment Framework for Cloud Computing and Distributed Applications
    Computing and Informatics, Vol. 32, 2013, 461{485 A GENERIC DEVELOPMENT AND DEPLOYMENT FRAMEWORK FOR CLOUD COMPUTING AND DISTRIBUTED APPLICATIONS Binh Minh Nguyen, Viet Tran, Ladislav Hluchy´ Institute of Informatics Slovak Academy of Sciences D´ubravsk´acesta 9 845 07 Bratislava, Slovakia e-mail: fminh.ui, viet.ui, [email protected] Communicated by Jacek Kitowski Abstract. Cloud computing has paved the way for advance of IT-based on demand services. This technology helps decrease capital expenditure and operation costs, solve scalability issue and many more user and provider constraints. However, devel- opment and deployment of distributed applications on cloud environment becomes a more and more complex task. Cloud users must spend a lot of time to prepare, in- stall and configure their applications on clouds. In addition, after development and deployment, the applications almost cannot move from one cloud to another due to the lack of interoperability between them. To address these problems, in this paper we present a novel development and deployment framework for cloud distributed applications/services. Our approach is based on abstraction and object-oriented programming technique, allowing users to easily and rapidly develop and deploy their services into cloud environment. The approach also enables service migration and interoperability among the clouds. Keywords: Cloud computing, distributed application, abstraction, object-oriented programming, interoperability Mathematics Subject Classification 2010: 68-M14 462 B. M. Nguyen, V. Tran, L. Hluch´y 1 INTRODUCTION Cloud computing is described as a business model for on-demand delivery of com- putation power, in which consumers pay providers what they used (\pay-as-you- go").
    [Show full text]
  • A Dynamic Cloud with Data Privacy Preservation
    A Dynamic Cloud with Data Privacy Preservation by Mehdi Bahrami A dissertation submitted in partial satisfaction of the requirements for the degree of Doctor of Philosophy in Electrical Engineering and Computer Science in the Graduate Division of the University of California, Merced Committee in charge: Professor Mukesh Singhal, Chair Professor Florin Rusu Professor Dong Li 1Professor Hamid R. Arabnia 1(External Committee Member, University of Georgia) Fall 2016 A Dynamic Cloud with Data Privacy Preservation Copyright 2017 by Mehdi Bahrami The Dissertation of Mehdi Bahrami is approved, and it is acceptable in quality and form for publication on microfilm and electronically: Professor Mukesh Singhal ______________________________________________________________________________ Professor Dong Li ____________________________________________________________________________ Professor Florin Rusu ______________________________________________________________________________ Professor Hamid R. Arabnia (University of Georgia) ______________________________________________________________________________ ______________________________________________________________________________ Co-Chair (if applicable) Professor Mukesh Singhal ______________________________________________________________________________ Chair University of California, Merced 2016 i Abstract A Dynamic Cloud with Data Privacy Preservation by Mehdi Bahrami Doctor of Philosophy in Electrical Engineering and Computer Science University of California, Merced Professor Mukesh Singhal
    [Show full text]
  • Trustcloud: a Framework for Accountability and Trust in Cloud Computing
    TrustCloud: A Framework for Accountability and Trust in Cloud Computing Ryan K L Ko, Peter Jagadpramana, Miranda Mowbray, Siani Pearson, Markus Kirchberg, Qianhui Liang, Bu Sung Lee HP Laboratories HPL-2011-38 Keyword(s): trust in cloud computing, logging, auditability, accountability, data provenance, continuous auditing and monitoring, governance Abstract: The key barrier to widespread uptake of cloud computing is the lack of trust in clouds by potential customers. While preventive controls for security and privacy measures are actively being researched, there is still little focus on detective controls related to cloud accountability and auditability. The complexity resulting from the sheer amount of virtualization and data distribution carried out in current clouds has also revealed an urgent need for research in cloud accountability, as has the shift in focus of customer concerns from server health and utilization to the integrity and safety of end-users' data. This paper discusses key challenges in achieving a trusted cloud through the use of detective controls, and presents the TrustCloud framework, which addresses accountability in cloud computing via technical and policy-based approaches. External Posting Date: June 22, 2011 [Fulltext]. Approved for External Publication Internal Posting Date: March 21, 2011 [Fulltext] Additional Publication Information: To be published and presented at the 2nd IEEE Cloud Forum for Practitioners (IEEE ICFP 2011), Washington DC, USA, July 7-8, 2011. Copyright IEEE ICFP 2011. TrustCloud: A Framework
    [Show full text]
  • Entitlement Control Message Generator
    Open Source Used In ECMG 4.5.3 Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at www.cisco.com/go/offices. Text Part Number: 78EE117C99-156819513 Open Source Used In ECMG 4.5.3 1 This document contains licenses and notices for open source software used in this product. With respect to the free/open source software listed in this document, if you have any questions or wish to receive a copy of any source code to which you may be entitled under the applicable free/open source license(s) (such as the GNU Lesser/General Public License), please contact us at [email protected]. In your requests please include the following reference number 78EE117C99-156819513 Contents 1.1 ACE+TAO 5.5.10 + 1.5.10 1.1.1 Available under license 1.2 Apache Commons Codec 1.3. 1.2.1 Available under license 1.3 Apache Commons Lib Apache 2.0 1.3.1 Available under license 1.4 Apache Jakarta Commons Configuration 1.9 1.4.1 Available under license 1.5 Apache Jakarta Commons DBCP 1.4 1.5.1 Available under license 1.6 Apache Jakarta Commons Lang 3.1 1.6.1 Available under license 1.7 Apache Log4j 1.2.16 1.7.1 Available under license 1.8 apache-ant_within-cglib 1.6.5 1.8.1 Available under license 1.9 apache-log4j 1.2.15 1.9.1 Available under license 1.10 apache-log4j 1.2.15 :DUPLICATE 1.10.1 Available under license 1.11 args4j 2.0.12 1.11.1 Available under license 1.12 asm-all-3.3.1_within-cglib 3.3.1 1.12.1 Available under license 1.13 bcprov-jdk16
    [Show full text]
  • Capability Analysis of Cloud Resource Orchestration Frameworks
    Capability Analysis of Cloud Resource Orchestration Frameworks Alireza Khoshkbarforoushha, Australian National University, Australia Meisong Wang, Australian National University, Australia Rajiv Ranjan, CSIRO, Australia Lizhe Wang, Chinese Academy of Sciences, China Leila Alem, CSIRO Computational Informatics, Australia Samee U. Khan, North Dakota State University, USA Boualem Benatallah, University of New South Wales, Australia Abstract Since the inception of cloud computing in mid 2000, academic groups and industry vendors have developed a number of Cloud Re- source Orchestration Frameworks (CROFs) for simplifying the application management. The CROF aids software engineers, scien- tists, and infrastructure administrators to migrate and manage their in-house applications to cloud environments. Despite the higher level of technical maturity of such CROFs, there is clear lack of study that can help cloud application administrators in understand- ing and analyzing the features of CROFs against a common set of concepts and dimensions. Therefore, this study presents a set of generic technical dimensions for clearly analyzing the capabilities of the overriding CROFs. A concise survey and classification of most prominent research work is also presented. Keywords: Cloud Computing, Cloud service management, Cloud resource orchestration. 1. Introduction Cloud computing assembles a large network of virtualized services, namely: hardware resources (compute, storage, network, etc.) and software resources (databases, message queuing systems, monitoring systems, load-balancers, etc.). The new cloud computing ecosystem enables instant access to virtually unlimited software and hardware resources. It offers a number of considerable advantages including no-upfront investment, lower operating cost, and infinite scalabil- ity. However, orchestrating the right set of cloud resources for creating a Quality of Service (QoS) optimized applica- tion architecture remains a challenging technical problem.
    [Show full text]