Security framework based multi agent system architecture to facilitate data fetching from cloud data storage

Cloud computing is Internet-based computing, where information, resources, and softwares are shared through distributed cloud server or Cloud Data Storage (CDS). However, in order to enjoy the wide utilization of cloud computing through wired/wireless networking, providing sufficient assurance of i...

Full description

Saved in:
Bibliographic Details
Main Author: Mohamed, Amir Mohamed Talib
Format: Thesis
Language:English
Published: 2012
Subjects:
Online Access:http://psasir.upm.edu.my/id/eprint/32230/1/FSKTM%202012%2016R.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
id my-upm-ir.32230
record_format uketd_dc
spelling my-upm-ir.322302015-01-19T07:12:09Z Security framework based multi agent system architecture to facilitate data fetching from cloud data storage 2012-09 Mohamed, Amir Mohamed Talib Cloud computing is Internet-based computing, where information, resources, and softwares are shared through distributed cloud server or Cloud Data Storage (CDS). However, in order to enjoy the wide utilization of cloud computing through wired/wireless networking, providing sufficient assurance of information security such as confidentiality, correctness assurance, availability, and integrity are the critical factors of success promotion. In this research, a comprehensive security framework based on Multi Agent System (MAS) architecture for CDS in order to facilitate confidentiality, correctness assurance, availability and integrity of users’ data in the cloud is proposed. This security framework consists of two main layers of agent layer and CDS layer. The proposed MAS architecture includes five types of agents: Cloud Service Provider Agent (CSPA), Cloud Data Correctness Agent (CDCorA), Cloud Data Confidentiality Agent (CDConA), Cloud Data Availability Agent (CDAA) and Cloud Data Integrity Agent (CDIA). In order to evaluate our proposed security framework based on MAS architecture, a pre-survey is conducted using a questionnaire survey. Rasch methodology is used to analyze the pilot data. This research is carried out in five steps of a Secure System Development Life Cycle (SecSDLC) utilized as a research methodology. The main phases of SecSDLC are investigation, analysis, design, implementation, and testing and validation. An approach that superimposes agents to handle security of CSD is designed using the Prometheus Design Tool (PDT). Ontology-driven MAS architecture that helps in providing a unified agent-based interaction system on top of cloud services using Protégé is implemented. In this research, a prototype named as Ganawa Security as a Service (GSecaaS) for CDS security is implemented. This prototype utilized specialized autonomous agents for specific services and allows agents to interact. To simulate the agents, Oracle database packages and triggers are used to implement agent functions, and Oracle jobs are utilized to create agents. GSecaaS is quantitatively and qualitatively evaluated to determine the most appropriate security policies to the development of cloud security algorithm. Based on the evaluation of the post-survey, GSecaaS has been developed. GSecaaS offered many benefits due to its verified and well-designed architecture in CDS. These include the functionality of the SecureFormula, correctness assurance protocol, availability solution, CloudZone and the overall GSecaaS satisfaction rates are high (90%, 95%, 78%, 92% and 99%, respectively). The security performance of GSecaaS in CDS is increased and GSecaaS’s response time is stable and acceptable. Multiagent systems Cloud computing - Security measures Computer security 2012-09 Thesis http://psasir.upm.edu.my/id/eprint/32230/ http://psasir.upm.edu.my/id/eprint/32230/1/FSKTM%202012%2016R.pdf application/pdf en public phd doctoral Universiti Putra Malaysia Multiagent systems Cloud computing - Security measures Computer security Faculty of Computer Science and Information Technology
institution Universiti Putra Malaysia
collection PSAS Institutional Repository
language English
topic Multiagent systems
Cloud computing - Security measures
Computer security
spellingShingle Multiagent systems
Cloud computing - Security measures
Computer security
Mohamed, Amir Mohamed Talib
Security framework based multi agent system architecture to facilitate data fetching from cloud data storage
description Cloud computing is Internet-based computing, where information, resources, and softwares are shared through distributed cloud server or Cloud Data Storage (CDS). However, in order to enjoy the wide utilization of cloud computing through wired/wireless networking, providing sufficient assurance of information security such as confidentiality, correctness assurance, availability, and integrity are the critical factors of success promotion. In this research, a comprehensive security framework based on Multi Agent System (MAS) architecture for CDS in order to facilitate confidentiality, correctness assurance, availability and integrity of users’ data in the cloud is proposed. This security framework consists of two main layers of agent layer and CDS layer. The proposed MAS architecture includes five types of agents: Cloud Service Provider Agent (CSPA), Cloud Data Correctness Agent (CDCorA), Cloud Data Confidentiality Agent (CDConA), Cloud Data Availability Agent (CDAA) and Cloud Data Integrity Agent (CDIA). In order to evaluate our proposed security framework based on MAS architecture, a pre-survey is conducted using a questionnaire survey. Rasch methodology is used to analyze the pilot data. This research is carried out in five steps of a Secure System Development Life Cycle (SecSDLC) utilized as a research methodology. The main phases of SecSDLC are investigation, analysis, design, implementation, and testing and validation. An approach that superimposes agents to handle security of CSD is designed using the Prometheus Design Tool (PDT). Ontology-driven MAS architecture that helps in providing a unified agent-based interaction system on top of cloud services using Protégé is implemented. In this research, a prototype named as Ganawa Security as a Service (GSecaaS) for CDS security is implemented. This prototype utilized specialized autonomous agents for specific services and allows agents to interact. To simulate the agents, Oracle database packages and triggers are used to implement agent functions, and Oracle jobs are utilized to create agents. GSecaaS is quantitatively and qualitatively evaluated to determine the most appropriate security policies to the development of cloud security algorithm. Based on the evaluation of the post-survey, GSecaaS has been developed. GSecaaS offered many benefits due to its verified and well-designed architecture in CDS. These include the functionality of the SecureFormula, correctness assurance protocol, availability solution, CloudZone and the overall GSecaaS satisfaction rates are high (90%, 95%, 78%, 92% and 99%, respectively). The security performance of GSecaaS in CDS is increased and GSecaaS’s response time is stable and acceptable.
format Thesis
qualification_name Doctor of Philosophy (PhD.)
qualification_level Doctorate
author Mohamed, Amir Mohamed Talib
author_facet Mohamed, Amir Mohamed Talib
author_sort Mohamed, Amir Mohamed Talib
title Security framework based multi agent system architecture to facilitate data fetching from cloud data storage
title_short Security framework based multi agent system architecture to facilitate data fetching from cloud data storage
title_full Security framework based multi agent system architecture to facilitate data fetching from cloud data storage
title_fullStr Security framework based multi agent system architecture to facilitate data fetching from cloud data storage
title_full_unstemmed Security framework based multi agent system architecture to facilitate data fetching from cloud data storage
title_sort security framework based multi agent system architecture to facilitate data fetching from cloud data storage
granting_institution Universiti Putra Malaysia
granting_department Faculty of Computer Science and Information Technology
publishDate 2012
url http://psasir.upm.edu.my/id/eprint/32230/1/FSKTM%202012%2016R.pdf
_version_ 1747811651832250368