Browse > Article
http://dx.doi.org/10.22937/IJCSNS.2021.21.12.35

De-Centralized Information Flow Control for Cloud Virtual Machines with Blowfish Encryption Algorithm  

Gurav, Yogesh B. (Department of Computer Science and IT Dr.Babasaheb Ambedkar Marathwada University)
Patil, Bankat M. (Department of Computer Science and IT Dr.Babasaheb Ambedkar Marathwada University)
Publication Information
International Journal of Computer Science & Network Security / v.21, no.12, 2021 , pp. 235-247 More about this Journal
Abstract
Today, the cloud computing has become a major demand of many organizations. The major reason behind this expansion is due to its cloud's sharing infrastructure with higher computing efficiency, lower cost and higher fle3xibility. But, still the security is being a hurdle that blocks the success of the cloud computing platform. Therefore, a novel Multi-tenant Decentralized Information Flow Control (MT-DIFC) model is introduced in this research work. The proposed system will encapsulate four types of entities: (1) The central authority (CA), (2) The encryption proxy (EP), (3) Cloud server CS and (4) Multi-tenant Cloud virtual machines. Our contribution resides within the encryption proxy (EP). Initially, the trust level of all the users within each of the cloud is computed using the proposed two-stage trust computational model, wherein the user is categorized bas primary and secondary users. The primary and secondary users vary based on the application and data owner's preference. Based on the computed trust level, the access privilege is provided to the cloud users. In EP, the cipher text information flow security strategy is implemented using the blowfish encryption model. For the data encryption as well as decryption, the key generation is the crucial as well as the challenging part. In this research work, a new optimal key generation is carried out within the blowfish encryption Algorithm. In the blowfish encryption Algorithm, both the data encryption as well as decryption is accomplishment using the newly proposed optimal key. The proposed optimal key has been selected using a new Self Improved Cat and Mouse Based Optimizer (SI-CMBO), which has been an advanced version of the standard Cat and Mouse Based Optimizer. The proposed model is validated in terms of encryption time, decryption time, KPA attacks as well.
Keywords
Cloud Computing; Decentralized Information Flow Control; Multi-Tenant Architecture; Blowfish Algorithm; SI-CMBO;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Z Z. Zhang, Z. Yang, X. Du, W. Li, X. Chen and L. Sun, "Tenant-Led Ciphertext Information Flow Control for Cloud Virtual Machines," IEEE Access, vol. 9, pp. 15156-15169, 2021. doi: 10.1109/ACCESS.2021.3051061   DOI
2 Z. Zhang, Z. Yang, X. Du, W. Li, X. Chen and L. Sun, "Tenant-Led Ciphertext Information Flow Control for Cloud Virtual Machines," IEEE Access, vol. 9, pp. 15156-15169, 2021. doi: 10.1109/ACCESS.2021.3051061   DOI
3 Ning Xi, Jianfeng Ma, Cong Sun, Di Lu, Yulong Shen, "Information flow control on encrypted data for service composition among multiple clouds", Distrib Parallel Databases, 2019
4 Nadya El Moussaid* and Maryam El Azhari , "Enhance the security properties and information flow control", Int. J. Electronic Business, Vol. 15, No. 3, 2020
5 K.Sravya Reddy, N.Vijay Kumar, "INFORMATION FLOW CONTROL FOR SECURE CLOUD COMPUTING", International Journal For Technological Research In Engineering, VOl.4, No.3, 2017
6 Charilaos Skandylas, Narges Khakpour, Jesper Andersson, "Adaptive Trust-Aware Decentralized Information Flow Control", IEEE, 2020
7 Maxwell Krohn, Alexander Yip, Micah Brodsky ,Natan Cliffer ,M. Frans Kaashoek ,Eddie Kohler ,Robert Morris,"Information Flow Control for Standard OS Abstractions", SOSP, 2017
8 Z. Ruifeng, L. Shiming, L. Yang, W. Bin, G. Wenxin and L. Jiangang, "Application Analysis and Prospect of Cloud Platform in Operation Control of New Energy Power System," 2019 IEEE 9th Annual International Conference on CYBER Technology in Automation, Control, and Intelligent Systems (CYBER), Suzhou, China, 2019, pp. 980-985. doi: 10.1109/CYBER46603.2019.9066672   DOI
9 I. Yen, F. Bastani, N. Solanki, Y. Huang and S. Hwang, "Trustworthy Computing in the Dynamic IoT Cloud," 2018 IEEE International Conference on Information Reuse and Integration (IRI), Salt Lake City, UT, USA, 2018, pp. 411-418. doi: 10.1109/IRI.2018.00067   DOI
10 Neeta R. Somavanshi,Y. B. Gurav,"Security in Cloud Computing Environment by Decentralized Information Flow Control", International Journal of Innovative Research in Computer and Communication Engineering, Vol.4, No.6, 2016
11 R. K. Shyamasundar, N. V. N. Kumar and M. Rajarajan, "Information-Flow Control for Building Security and Privacy Preserving Hybrid Clouds," 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS), Sydney, NSW, Australia, 2016, pp. 1410-1417. doi: 10.1109/HPCC-SmartCity-DSS.2016.0201   DOI
12 Salve Bhagyashri, Prof. Y.B.Gurav, "Privacy-Preserving Public Auditing For Secure Cloud Storage",IOSR Journal of Computer Engineering (IOSR-JCE), Vil.16, No.4, 2014
13 C. Lai, A. N. Tantawi and C. Pu, "Coarse-Grained Information Flow Control on Hybrid Clouds," 2016 IEEE 9th International Conference on Cloud Computing (CLOUD), San Francisco, CA, USA, 2016, pp. 319-326. doi: 10.1109/CLOUD.2016.0050   DOI
14 Priyanka S. Mane, Yogesh B. Gurav,"Secure Cloud Computing Using Decentralized Information Flow Control", International Advanced Research Journal in Science, Engineering and Technology, Vol.3, No.6, 2016
15 Z. Su, Y. Peng, F. Ge, C. Song, F. Ma and F. Biennier, "Collaboration-oriented information flow analysis and control for Mobile Cloud," 2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT), Ghaziabad, India, 2017, pp. 1-6. doi: 10.1109/CIACT.2017.7977319   DOI
16 Neeta R. Somavanshi, Y. B. Gurav, "SURVEY OF DECENTRALIZED INFORMATION FLOWCONTROLFOR RELATIONAL DATABASE-IFDB", International J. of Engg. Research & Indu. Appls. (IJERIA), Vol.8, No.8, 2015
17 Z. Su, Y. Peng, F. Ge, C. Song, F. Ma and F. Biennier, "Collaboration-oriented information flow analysis and control for Mobile Cloud," 2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT), Ghaziabad, India, 2017, pp. 1-6. doi: 10.1109/CIACT.2017.7977319   DOI
18 Kalev Alpernas,Cormac Flanagan, Sadjad Fouladi, Leonid Ryzhyk, Mooly Sagiv, Thomas Schmitz, Keith Winstein, "Secure serverless computing using dynamic information flow control", Proceedings of the ACM on Programming Languages, Vol.2, 2018
19 Kriti Bhushan & Brij B. Gupta, "Network flow analysis for detection and mitigation of Fraudulent Resource Consumption (FRC) attacks in multimedia cloud computing", Multimed Tools Appl, 2018
20 X. Lu, L. Cao and X. Du, "Dynamic Control Method for Tenants' Sensitive Information Flow Based on Virtual Boundary Recognition," IEEE Access, vol. 8, pp. 162548-162568, 2020. doi: 10.1109/ACCESS.2020.3021415   DOI
21 M. Elsayed and M. Zulkernine, "IFCaaS: Information Flow Control as a Service for Cloud Security," 2016 11th International Conference on Availability, Reliability and Security (ARES), Salzburg, Austria, 2016, pp. 211-216. doi: 10.1109/ARES.2016.27   DOI
22 G. Kozhevnikov, O. Pihnastyi and M. Glavchev, "Input Flow Control Algorithms of the Trasnsport System," 2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T), Kharkiv, Ukraine, 2020, pp. 301-305. doi: 10.1109/PICST51311.2020.9468108   DOI
23 T. F. J. -. Pasquier, J. Singh, J. Bacon and D. Eyers, "Information Flow Audit for PaaS Clouds," 2016 IEEE International Conference on Cloud Engineering (IC2E), Berlin, Germany, 2016, pp. 42-51. doi: 10.1109/IC2E.2016.19   DOI
24 Anum Khurshid1 Abdul Nasir Khan1 Fiaz Gul Khan1 Mazhar Ali1 Junaid Shuja1 Atta ur Rehman Khan, "Secure-CamFlow: A device-oriented security model to assist information flow control systems in cloud environments for IoTs, Wiley, 2019
25 T. Jia, L. Yang, P. Chen, Y. Li, F. Meng and J. Xu, "LogSed: Anomaly Diagnosis through Mining Time-Weighted Control Flow Graph in Logs," 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), Honololu, HI, USA, 2017, pp. 447-455. doi: 10.1109/CLOUD.2017.64   DOI