Distributed information dispersal approach in cloud storage systems for enhancing availability and reliability

Cloud computing is Internet based technology where the users can subscribe high quality of services from data and software that resides solely in the remote servers. This provides many benefits for the users to create and store data in the remote servers thereby utilizing fewer resources in client s...

Full description

Saved in:
Bibliographic Details
Main Author: Farahpoor, Mohammadali
Format: Thesis
Published: 2014
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Cloud computing is Internet based technology where the users can subscribe high quality of services from data and software that resides solely in the remote servers. This provides many benefits for the users to create and store data in the remote servers thereby utilizing fewer resources in client system. However cloud computing has many challenging design issues that possess security and performance concerns. One of the biggest concerns in security issues is data storage security. Securing information in this type of systems is important because of the openness of cloud infrastructure, thus working on new approaches which can provide confidentiality, integrity and availability (CIA) is necessary. One of the best approaches which can be used for providing CIA in cloud computing is threshold secret sharing schemes and one of the robust threshold secret sharing schemes is Krawczyk’s Hybrid approach that is a combination of Shamir’s Secret Sharing and Rabin’s Information Dispersal Algorithm. One of the most dangerous attacks which can compromise the availability of information in this approach is DDOS attack, because in this approach Server (dealer) is responsible for performing many processes such as key generation, encryption, distribution and decryption of data, therefore in a successful DDOS attack it will be overwhelmed because of high workload. In this project we try to reduce the impact of DDOS attack on the server by providing a distributed computing mechanism on cloud computing that can distribute the workload between nodes of networks. Then by leasing and configuring real cloud computing system and implementing both approaches on that and executing DDOS attack on both of approaches we could analyze and compare current hybrid approach and proposed hybrid approach and could show that enhanced hybrid approach can reduce the impact of DDOS attack on the server considerably