DOI QR코드

DOI QR Code

Energy-Efficient Algorithm for Assigning Verification Tasks in Cloud Storage

  • Xu, Guangwei (School of Computer Science and Technology, Donghua University) ;
  • Sun, Zhifeng (School of Computer Science and Technology, Donghua University) ;
  • Yan, Cairong (School of Computer Science and Technology, Donghua University) ;
  • Shi, Xiujin (School of Computer Science and Technology, Donghua University) ;
  • Li, Yue (School of Computer Science and Technology, Donghua University)
  • 투고 : 2016.05.26
  • 심사 : 2016.11.15
  • 발행 : 2017.01.31

초록

Mobile Cloud Computing has become a promising computing platform. It moves users' data to the centralized large data centers for users' mobile devices to conveniently access. Since the data storage service may not be fully trusted, many public verification algorithms are proposed to check the data integrity. However, these algorithms hardly consider the huge computational burden for the verifiers with resource-constrained mobile devices to execute the verification tasks. We propose an energy-efficient algorithm for assigning verification tasks (EEAVT) to optimize the energy consumption and assign the verification tasks by elastic and customizable ways. The algorithm prioritizes verification tasks according to the expected finish time of the verification, and assigns the number of checked blocks referring to devices' residual energy and available operation time. Theoretical analysis and experiment evaluation show that our algorithm not only shortens the verification finish time, but also decreases energy consumption, thus improving the efficiency and reliability of the verification.

키워드

참고문헌

  1. Mehdi Sookhak, Hamid Talebian, Ejaz Ahmed, Abdullah Gani, Muhammad Khurram Khan, "A review on remote data auditing in single cloud server: Taxonomy and open issues," Journal of Network and Computer Applications, Vol. 43, pp. 121-141, 2014. https://doi.org/10.1016/j.jnca.2014.04.011
  2. Chang Liu, Chi Yang, Xuyun Zhang, Jinjun Chen, "External integrity verification for outsourced big data in cloud and IoT: A big picture," Future Generation Computer Systems, Vol.49, pp. 58-67, 2015. https://doi.org/10.1016/j.future.2014.08.007
  3. Abdalla, Al-kindy Athman, Al-Sakib Khan Pathan, "On protecting data storage in mobile cloud computing paradigm," IETE Technical Review, Vol. 31, No.1, pp. 82-91, May 2014. https://doi.org/10.1080/02564602.2014.891382
  4. Jiawei Yuan, Shucheng Yu, "Public Integrity Auditing for Dynamic Data Sharing With Multiuser Modification," IEEE Transactions on Information Forensics and Security, Vol. 10, No. 8, pp. 1717-1726, 2015. https://doi.org/10.1109/TIFS.2015.2423264
  5. Giuseppe Ateniese, Randal Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary Peterson, Dawn Song, "Provable data possession at untrusted stores," in Proc. of the 14th ACM conference on Computer and Communications Security. ACM, pp.589-609, 2007.
  6. Qian Wang, Cong Wang, Kui Ren, Wenjing Lou, Jin Li, "Enabling public auditability and data dynamics for storage security in cloud computing," IEEE Transactions on Parallel and Distributed Systems, Vol.22, No.5, pp.847-859, 2011. https://doi.org/10.1109/TPDS.2010.183
  7. Yan Zhu, Gail-Joon Ahn, Hongxin Hu, S. S. Yau, H. G. An, Chang-Jun Hu, "Dynamic audit services for outsourced storages in clouds," IEEE Transactions on Services Computing, Vol.6, No.2, pp.227-238, 2013. https://doi.org/10.1109/TSC.2011.51
  8. Chang Liu, Jinjun Chen, Laurence T. Yang, Xuyun Zhang, Chi Yang, Rajiv Ranjan, Kotagiri Rao, "Authorized public auditing of dynamic big data storage on cloud with efficient verifiable fine-grained updates," IEEE Transactions on Parallel and Distributed Systems, Vol.25, No.9, pp. 2234-2244, 2014. https://doi.org/10.1109/TPDS.2013.191
  9. Shacham Hovav, Waters Brent, "Compact proofs of retrievability," in Proc. of the 14th International Conference on the Theory and Application of Cryptology and Information Security, pp.90-107, 2008.
  10. Jia Yu, Kui Ren, Cong Wang, Vijay Varadharajan, "Enabling Cloud Storage Auditing With Key-Exposure Resistance," IEEE Transactions on Information Forensics and Security, Vol. 10, No. 6, pp. 1167-1179, 2015. https://doi.org/10.1109/TIFS.2015.2400425
  11. Huaqun Wang, "Identity-Based Distributed Provable Data Possession in Multicloud Storage," IEEE Transactions on Sercices Computing, Vol. 8, No. 2, pp. 328-340, 2015. https://doi.org/10.1109/TSC.2014.1
  12. Ziad Ismail, Christophe Kiennert, Jean Leneutre, and Lin Chen, "Auditing a cloud provider's compliance with data backup requirements: a game theoretical analysis," IEEE Transactions on Information Forensics and Security, Vol.11, No.8, pp.1685-1699, 2016. https://doi.org/10.1109/TIFS.2016.2549002
  13. Jin Li, Xiao Tan, Xiaofeng Chen, Duncan S. Wong, Fatos Xhafa, "OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices," IEEE Transactions on Cloud Computing, Vol. 3, No. 2, pp. 195-205, 2015. https://doi.org/10.1109/TCC.2014.2366148
  14. Karthik Kumar, Yung-Hsiang Lu, "Cloud computing for mobile users: Can offloading computation save energy?," IEEE Computer Society, Vol.43, pp.51-56, 2010.
  15. Shumao Ou, Kun Yang, Antonio Liotta, "An adaptive multi-constraint partitioning algorithm for offloading in pervasive systems," in Proc. of IEEE International Conference on Pervasive Computing and Communications, pp.116-125, 2006.
  16. Huijun Wu, Dijiang Huang, Samia Bouzefrane, "Making offloading decisions resistant to network unavailability for mobile cloud collaboration," in Proc. of 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, pp.168-177, 2013.
  17. Yiyu Chen, Amitayu Das, Wubi Qin, Anand Sivasubramaniam, Qian Wang, Natarajan Gautam, "Managing server energy and operational costs in hosting centers," in Proc. of the ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, pp.303-314, 2005.
  18. Shang Li, Peh Li-Shiuan, Jha Niraj K., "Dynamic voltage scaling with links for power optimization of interconnection networks," in Proc. of the Ninth IEEE International Symposium on the High-Performance Computer Architecture, pp. 91-102, 2003.
  19. Zhigang Deng, Zeng Guosun, and Wang Wei, "Energy Consumption Analysis Satisfying Time-Energy-Probability Constraints for Modern DVFS Microprocessor, " IETE Technical Review, Vol. 32, No 4, pp. 260-272, Feb. 2015. https://doi.org/10.1080/02564602.2015.1010613
  20. Dzmitry Kliazovich, Pasca Bouvry, Samee Khan Ullah, "DENS: data center energy-efficient network-aware scheduling," Cluster Computing, Vol.16, No.1, pp. 65-75, 2011. https://doi.org/10.1007/s10586-011-0177-4
  21. Dzmitry Kliazovich, Sisay T. Arzo, Fabrizio Granelli, Pascal Bouvry, Samee Ullah Khan, "e-STAB: energy-efficient scheduling for cloud computing applications with traffic load balancing," in Proc. of the 2013 IEEE International Conference on Green Computing and Communications, pp.7-13, 2013.
  22. Yanzhi Wang, Xue Lin, Massoud Pedram, "A nested two stage game-based optimization framework in mobile cloud computing system," in Proc. of The 7th IEEE International Symposium on Service Oriented System Engineering (SOSE), pp.494-502, 2013.
  23. Weiwen Zhang, Yonggang Wen, Jianfei Cai, Dapeng Oliver Wu, "Toward transcoding as a service in a multimedia cloud: energy-efficient job-dispatching algorithm," IEEE Transactions on Vehicular Technology, Vol.63, No.5, pp. 2002-2012, 2014. https://doi.org/10.1109/TVT.2014.2310394
  24. Weiwen Zhang, Yonggang Wen, Hsiao-Hwa Chen, "Toward transcoding as a service: energy-efficient offloading policy for green mobile cloud," IEEE Network, pp.67-73, Nov.2014.
  25. Weiwen Zhang, Yonggang Wen, Kyle Guan, Dan Kilper, Haiyun Luo, Dapeng Oliver Wu, "Energy-optimal mobile cloud computing under stochastic wireless channel," IEEE Transactions on Wireless Communications, Vol.12, No.9, pp.4569-4581, 2013. https://doi.org/10.1109/TWC.2013.072513.121842