Enhancing Multi-Cloud Storage: A Hybrid Framework Using Interleaving and LT Codes
DOI:
https://doi.org/10.59796/jcst.V14N2.2024.69Keywords:
Data integrity, Data availability, Multi-cloud storage, Interleaving data, Luby transform code, LT codeAbstract
This article presents a novel framework for enhancing the integrity and availability of data stored on multi-cloud storage systems. The proposed technique leverages a combination of interleaving and Luby transform (LT) codes, specifically employing either ideal or robust soliton distribution during the LT encoding stage. The proposed technique is rigorously designed, incorporating data preparation facilitated by a cloud broker and culminating in the measurement of key performance indicators (KPIs). A central component of the framework is data processing, which involves interleaving followed by the LT encoding with soliton distribution selection. The performance of the proposed technique is evaluated through data integrity, data availability, and others. The results demonstrate that using the robust soliton distribution offers a pragmatic balance between computational efficiency and robust data integrity, particularly crucial in dynamic multi-cloud environments. Additionally, the proposed technique achieves a high level of data integrity of more than 0.97 and strong resilience with average data availability of 98%. However, further optimization is necessary to address storage overhead, retrieval time, and computational overhead. Despite these considerations, the framework remains significant, especially within the context of confidentiality, integrity, and availability for multi-cloud storage protection. The proposed technique underscores the potential of integrating interleaving and LT codes to revolutionize data storage and access within cloud environments, paving the way for future innovations in the field.
References
Abdalla, P. A., & Varol, A. (2019, June 10-12). Advantages to Disadvantages of Cloud Computing for Small-Sized Business [Conference presentation]. 2019 7th International Symposium on Digital Forensics and Security (ISDFS), Barcelos, Portugal. https://doi.org/10.1109/ISDFS.2019.8757549
Ahmed, M. K., Mandebi, J., Saha, S. K., & Bobda, C. (2022). Multi-Tenant Cloud FPGA: A Survey on Security. arXiv preprint arXiv:2209.11158. https://doi.org/10.48550/ARXIV.2209.11158
Antu, A. D., Kumar, A., Kelley, R., & Xie, B. (2022). Comparative Analysis of Cloud Storage Options for Diverse Application Requirements. In K. Ye & L.-J. Zhang (Eds.), Cloud Computing – CLOUD 2021 (Vol. 12989, pp. 75–96). Springer International Publishing. https://doi.org/10.1007/978-3-030-96326-2_6
Böhm, M., Pelz, K., & Schneider, M. (2019). The Vendor Lock-In Effect of Software: A Case Study about LiMux and Microsoft. ResearchGate. Retrieved from https://www.researchgate.net/publication/340948942
Chen, H. C. H., Hu, Y., Lee, P. P. C., & Tang, Y. (2014). NCCloud: A Network-Coding-Based Storage System in a Cloud-of-Clouds. IEEE Transactions on Computers, 63(1), 31–44. https://doi.org/10.1109/TC.2013.167
Cremer, F., Sheehan, B., Fortmann, M., Kia, A. N., Mullins, M., Murphy, F., & Materne, S. (2022). Cyber risk and cybersecurity: A systematic review of data availability. The Geneva Papers on Risk and Insurance - Issues and Practice, 47(3), 698–736. https://doi.org/10.1057/s41288-022-00266-6
Crumpler, W. D., & Lewis, J. A. (2020). Cybersecurity and the Problem of Interoperability. Center for Strategic and International Studies (CSIS). Washington, DC.
Forney, G. D. (1965). Concatenated Codes. Massachusetts Institute of Technology Cambridge. Massachusetts.
George, S. S., & Pramila, R. S. (2021). A review of different techniques in cloud computing. Materials Today: Proceedings, 46, 8002-8008. https://doi.org/10.1016/j.matpr.2021.02.748
Gu, Y., Wang, D., & Liu, C. (2014). DR-Cloud: Multi-cloud based disaster recovery service. Tsinghua Science and Technology, 19(1), 13-23. https://doi.org/10.1109/TST.2014.6733204
Gupta, R., Saxena, D., & Singh, A. K. (2021). Data Security and Privacy in Cloud Computing: Concepts and Emerging Trends. arXiv preprint arXiv: 2108.09508. https://doi.org/10.48550/arXiv.2108.09508
Imran, H. A., Latif, U., Ikram, A. A., Ehsan, M., Ikram, A. J., Khan, W. A., & Wazir, S. (2020, November 5-7). Multi-cloud: a comprehensive review [Conference presentation]. 2020 IEEE 23rd International Multitopic Conference (INMIC). IEEE. Bahawalpur, Pakistan. https://doi.org/10.36227/techrxiv.13642850
Izham Jaya, M., Sidi, F., Ishak, I., Suriani Affendey, L. I. L. L. Y., & JABAR, M. A. (2017). A Review of Data Quality Research in Achieving High Data Quality within Organization. Journal of Theoretical & Applied Information Technology, 95(12), 2647-2657.
Jagruthi, A., Vikas, K., Nookaraju, G., Teja, K. R., Sanjana, G., & Jabbar, M. A. (2022, October 3-5). Enhancing Data spillage in Multi-Cloud Storage Services [Conference presentation]. 2022 13th International Conference on Computing Communication and Networking Technologies (ICCCNT), Kharagpur, India. https://doi.org/10.1109/ICCCNT54827.2022.9984442
Lee, C. A., Bohn, R. B., & Michel, M. (2020). The NIST cloud federation reference architecture. NIST Special Publication 500-332. https://doi.org/10.6028/NIST.SP.500-332
Li, J., & Li, B. (2013). Erasure coding for cloud storage systems: A survey. Tsinghua Science and Technology, 18(3), 259-272. https://doi.org/10.1109/TST.2013.6522585
Luby, M. (2002, November 19). LT codes [Conference presentation]. The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings, Vancouver, Canada. https://doi.org/10.1109/SFCS.2002.1181950
Park, G. S., & Song, H. (2013, October 14-16 ). A fountain codes-based hybrid P2P and cloud storage system [Conference presentation]. 2013 International Conference on ICT Convergence (ICTC), Jeju, Korea (South). https://doi.org/10.1109/ICTC.2013.6675310
Por, L. Y., Yang, J., Ku, C. S., & Khan, A. A. (2023). Special Issue on Cryptography and Information Security. Applied Sciences, 13(10), Article 6042. https://doi.org/10.3390/app13106042
Prajapati, P., & Shah, P. (2022). A Review on Secure Data Deduplication: Cloud Storage Security Issue. Journal of King Saud University - Computer and Information Sciences, 34(7), 3996–4007. https://doi.org/10.1016/j.jksuci.2020.10.021
Sabaghian, K., Khamforoosh, K., & Ghaderzadeh, A. (2023). Data Replication and Placement Strategies in Distributed Systems: A State of the Art Survey. Wireless Personal Communications, 129(4), 2419–2453. https://doi.org/10.1007/s11277-023-10240-7
Shakarami, A., Ghobaei-Arani, M., Shahidinejad, A., Masdari, M., & Shakarami, H. (2021). Data replication schemes in cloud computing: A survey. Cluster Computing, 24(3), 2545–2579. https://doi.org/10.1007/s10586-021-03283-7
Song, J., Ma, Y., Zhang, Z., & Liu, P. (2023). An In-Memory Data-Cube Aware Distributed Data Discovery Across Clouds for Remote Sensing Big Data. IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing, 16, 4529–4548. https://doi.org/10.1109/JSTARS.2023.3267118
Svantesson, D. (2016). Enforcing Privacy Across Different Jurisdictions. In D. Wright & P. De Hert (Eds.), Enforcing Privacy: Regulatory, Legal and Technological Approaches (pp. 195–222). Springer International Publishing. https://doi.org/10.1007/978-3-319-25047-2_9
Witanto, E., Stanley, B., & Lee, S.-G. (2023). Distributed Data Integrity Verification Scheme in Multi-Cloud Environment. Sensors, 23(3), 1623. https://doi.org/10.3390/s23031623
Wylde, V., Rawindaran, N., Lawrence, J., Balasubramanian, R., Prakash, E., Jayal, A., ... & Platts, J. (2022). Cybersecurity, data privacy and blockchain: a review. SN Computer Science, 3(2), Article 127. https://doi.org/10.1007/s42979-022-01020-4
Xiao, Y., Zhou, S., & Zhong, L. (2020). Erasure Coding-Oriented Data Update for Cloud Storage: A Survey. IEEE Access, 8, 227982–227998. https://doi.org/10.1109/ACCESS.2020.3033024
Downloads
Published
How to Cite
Issue
Section
Categories
License
Copyright (c) 2024 Journal of Current Science and Technology
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.