DOI QR코드

DOI QR Code

De-Centralized Information Flow Control for Cloud Virtual Machines with Blowfish Encryption Algorithm

  • Gurav, Yogesh B. (Department of Computer Science and IT Dr.Babasaheb Ambedkar Marathwada University) ;
  • Patil, Bankat M. (Department of Computer Science and IT Dr.Babasaheb Ambedkar Marathwada University)
  • Received : 2021.12.05
  • Published : 2021.12.30

Abstract

Today, the cloud computing has become a major demand of many organizations. The major reason behind this expansion is due to its cloud's sharing infrastructure with higher computing efficiency, lower cost and higher fle3xibility. But, still the security is being a hurdle that blocks the success of the cloud computing platform. Therefore, a novel Multi-tenant Decentralized Information Flow Control (MT-DIFC) model is introduced in this research work. The proposed system will encapsulate four types of entities: (1) The central authority (CA), (2) The encryption proxy (EP), (3) Cloud server CS and (4) Multi-tenant Cloud virtual machines. Our contribution resides within the encryption proxy (EP). Initially, the trust level of all the users within each of the cloud is computed using the proposed two-stage trust computational model, wherein the user is categorized bas primary and secondary users. The primary and secondary users vary based on the application and data owner's preference. Based on the computed trust level, the access privilege is provided to the cloud users. In EP, the cipher text information flow security strategy is implemented using the blowfish encryption model. For the data encryption as well as decryption, the key generation is the crucial as well as the challenging part. In this research work, a new optimal key generation is carried out within the blowfish encryption Algorithm. In the blowfish encryption Algorithm, both the data encryption as well as decryption is accomplishment using the newly proposed optimal key. The proposed optimal key has been selected using a new Self Improved Cat and Mouse Based Optimizer (SI-CMBO), which has been an advanced version of the standard Cat and Mouse Based Optimizer. The proposed model is validated in terms of encryption time, decryption time, KPA attacks as well.

Keywords

References

  1. Z. Zhang, Z. Yang, X. Du, W. Li, X. Chen and L. Sun, "Tenant-Led Ciphertext Information Flow Control for Cloud Virtual Machines," IEEE Access, vol. 9, pp. 15156-15169, 2021. doi: 10.1109/ACCESS.2021.3051061
  2. Anum Khurshid1 Abdul Nasir Khan1 Fiaz Gul Khan1 Mazhar Ali1 Junaid Shuja1 Atta ur Rehman Khan, "Secure-CamFlow: A device-oriented security model to assist information flow control systems in cloud environments for IoTs, Wiley, 2019
  3. Ning Xi, Jianfeng Ma, Cong Sun, Di Lu, Yulong Shen, "Information flow control on encrypted data for service composition among multiple clouds", Distrib Parallel Databases, 2019
  4. Kriti Bhushan & Brij B. Gupta, "Network flow analysis for detection and mitigation of Fraudulent Resource Consumption (FRC) attacks in multimedia cloud computing", Multimed Tools Appl, 2018
  5. Nadya El Moussaid* and Maryam El Azhari , "Enhance the security properties and information flow control", Int. J. Electronic Business, Vol. 15, No. 3, 2020
  6. K.Sravya Reddy, N.Vijay Kumar, "INFORMATION FLOW CONTROL FOR SECURE CLOUD COMPUTING", International Journal For Technological Research In Engineering, VOl.4, No.3, 2017
  7. Charilaos Skandylas, Narges Khakpour, Jesper Andersson, "Adaptive Trust-Aware Decentralized Information Flow Control", IEEE, 2020
  8. Maxwell Krohn, Alexander Yip, Micah Brodsky ,Natan Cliffer ,M. Frans Kaashoek ,Eddie Kohler ,Robert Morris,"Information Flow Control for Standard OS Abstractions", SOSP, 2017
  9. Kalev Alpernas,Cormac Flanagan, Sadjad Fouladi, Leonid Ryzhyk, Mooly Sagiv, Thomas Schmitz, Keith Winstein, "Secure serverless computing using dynamic information flow control", Proceedings of the ACM on Programming Languages, Vol.2, 2018
  10. Z. Su, Y. Peng, F. Ge, C. Song, F. Ma and F. Biennier, "Collaboration-oriented information flow analysis and control for Mobile Cloud," 2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT), Ghaziabad, India, 2017, pp. 1-6. doi: 10.1109/CIACT.2017.7977319
  11. Z Z. Zhang, Z. Yang, X. Du, W. Li, X. Chen and L. Sun, "Tenant-Led Ciphertext Information Flow Control for Cloud Virtual Machines," IEEE Access, vol. 9, pp. 15156-15169, 2021. doi: 10.1109/ACCESS.2021.3051061
  12. Z. Su, Y. Peng, F. Ge, C. Song, F. Ma and F. Biennier, "Collaboration-oriented information flow analysis and control for Mobile Cloud," 2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT), Ghaziabad, India, 2017, pp. 1-6. doi: 10.1109/CIACT.2017.7977319
  13. T. F. J. -. Pasquier, J. Singh, J. Bacon and D. Eyers, "Information Flow Audit for PaaS Clouds," 2016 IEEE International Conference on Cloud Engineering (IC2E), Berlin, Germany, 2016, pp. 42-51. doi: 10.1109/IC2E.2016.19
  14. Z. Ruifeng, L. Shiming, L. Yang, W. Bin, G. Wenxin and L. Jiangang, "Application Analysis and Prospect of Cloud Platform in Operation Control of New Energy Power System," 2019 IEEE 9th Annual International Conference on CYBER Technology in Automation, Control, and Intelligent Systems (CYBER), Suzhou, China, 2019, pp. 980-985. doi: 10.1109/CYBER46603.2019.9066672
  15. G. Kozhevnikov, O. Pihnastyi and M. Glavchev, "Input Flow Control Algorithms of the Trasnsport System," 2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T), Kharkiv, Ukraine, 2020, pp. 301-305. doi: 10.1109/PICST51311.2020.9468108
  16. X. Lu, L. Cao and X. Du, "Dynamic Control Method for Tenants' Sensitive Information Flow Based on Virtual Boundary Recognition," IEEE Access, vol. 8, pp. 162548-162568, 2020. doi: 10.1109/ACCESS.2020.3021415
  17. I. Yen, F. Bastani, N. Solanki, Y. Huang and S. Hwang, "Trustworthy Computing in the Dynamic IoT Cloud," 2018 IEEE International Conference on Information Reuse and Integration (IRI), Salt Lake City, UT, USA, 2018, pp. 411-418. doi: 10.1109/IRI.2018.00067
  18. M. Elsayed and M. Zulkernine, "IFCaaS: Information Flow Control as a Service for Cloud Security," 2016 11th International Conference on Availability, Reliability and Security (ARES), Salzburg, Austria, 2016, pp. 211-216. doi: 10.1109/ARES.2016.27
  19. T. Jia, L. Yang, P. Chen, Y. Li, F. Meng and J. Xu, "LogSed: Anomaly Diagnosis through Mining Time-Weighted Control Flow Graph in Logs," 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), Honololu, HI, USA, 2017, pp. 447-455. doi: 10.1109/CLOUD.2017.64
  20. C. Lai, A. N. Tantawi and C. Pu, "Coarse-Grained Information Flow Control on Hybrid Clouds," 2016 IEEE 9th International Conference on Cloud Computing (CLOUD), San Francisco, CA, USA, 2016, pp. 319-326. doi: 10.1109/CLOUD.2016.0050
  21. R. K. Shyamasundar, N. V. N. Kumar and M. Rajarajan, "Information-Flow Control for Building Security and Privacy Preserving Hybrid Clouds," 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS), Sydney, NSW, Australia, 2016, pp. 1410-1417. doi: 10.1109/HPCC-SmartCity-DSS.2016.0201
  22. Priyanka S. Mane, Yogesh B. Gurav,"Secure Cloud Computing Using Decentralized Information Flow Control", International Advanced Research Journal in Science, Engineering and Technology, Vol.3, No.6, 2016
  23. Neeta R. Somavanshi,Y. B. Gurav,"Security in Cloud Computing Environment by Decentralized Information Flow Control", International Journal of Innovative Research in Computer and Communication Engineering, Vol.4, No.6, 2016
  24. Neeta R. Somavanshi, Y. B. Gurav, "SURVEY OF DECENTRALIZED INFORMATION FLOWCONTROLFOR RELATIONAL DATABASE-IFDB", International J. of Engg. Research & Indu. Appls. (IJERIA), Vol.8, No.8, 2015
  25. Salve Bhagyashri, Prof. Y.B.Gurav, "Privacy-Preserving Public Auditing For Secure Cloud Storage",IOSR Journal of Computer Engineering (IOSR-JCE), Vil.16, No.4, 2014