Universiti Teknologi Malaysia Institutional Repository

Distributed information dispersal approach in cloud storage systems for enhancing availability and reliability

Farahpoor, Mohammadali (2014) Distributed information dispersal approach in cloud storage systems for enhancing availability and reliability. Masters thesis, Universiti Teknologi Malaysia, Faculty of Computing.

Full text not available from this repository.

Abstract

Cloud computing is Internet based technology where the users can subscribe high quality of services from data and software that resides solely in the remote servers. This provides many benefits for the users to create and store data in the remote servers thereby utilizing fewer resources in client system. However cloud computing has many challenging design issues that possess security and performance concerns. One of the biggest concerns in security issues is data storage security. Securing information in this type of systems is important because of the openness of cloud infrastructure, thus working on new approaches which can provide confidentiality, integrity and availability (CIA) is necessary. One of the best approaches which can be used for providing CIA in cloud computing is threshold secret sharing schemes and one of the robust threshold secret sharing schemes is Krawczyk’s Hybrid approach that is a combination of Shamir’s Secret Sharing and Rabin’s Information Dispersal Algorithm. One of the most dangerous attacks which can compromise the availability of information in this approach is DDOS attack, because in this approach Server (dealer) is responsible for performing many processes such as key generation, encryption, distribution and decryption of data, therefore in a successful DDOS attack it will be overwhelmed because of high workload. In this project we try to reduce the impact of DDOS attack on the server by providing a distributed computing mechanism on cloud computing that can distribute the workload between nodes of networks. Then by leasing and configuring real cloud computing system and implementing both approaches on that and executing DDOS attack on both of approaches we could analyze and compare current hybrid approach and proposed hybrid approach and could show that enhanced hybrid approach can reduce the impact of DDOS attack on the server considerably

Item Type:Thesis (Masters)
Additional Information:Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014
Subjects:?? QA77 ??
Divisions:Computing
ID Code:48410
Deposited By: Haliza Zainal
Deposited On:15 Oct 2015 01:09
Last Modified:03 Aug 2017 01:23

Repository Staff Only: item control page