Tier Application in Multi-Cloud Databases to Improve Security and Service Availability

Tier Application in Multi-Cloud Databases to Improve Security and Service Availability

Shaurya Gupta (Amity University Rajasthan, India), Ramesh Chandra Poonia (Norwegian University of Science and Technology, Norway), Vijander Singh (Amity University Rajasthan, India) and Linesh Raja (Amity University Rajasthan, India)
DOI: 10.4018/978-1-5225-8407-0.ch005

Abstract

The need for data outsourcing or database as a service (DaaS) is extremely important for any organization. In addition, data storage or data retrieval cost high especially for small companies. This chapter aims to study the various challenges in cloud computing communication issue. The chapter on multi-tiering a cloud emphasizes security enhancement due to the application of tiers in the cloud such that services availability is also improved. Cloud computing is a recent network trend for advanced communication systems. A lot of research led to the advancements in the areas of newer modes but multi-tiering a cloud is still an embarking issue for the researchers.
Chapter Preview
Top

Introduction

The need for Data outsourcing or database as a service (DaaS) is significant for any organization. Besides, data storage or data retrieval cost high, especially for small companies. This chapter aims to study the various challenges in cloud computing communication issue. Proposed Chapter on multi-tiering in cloud emphasizes security enhancement in the application of tiers in the cloud and improve services availability.

Motivation and Objective

Cloud computing is a recent network trend for advanced communication systems. Much research led to the advancements in the areas of newer modes but multi-tiering a cloud is still an embarking issue for the researchers. The purpose of the proposed new model by applying tier is to address the security and the privacy risks issues in a cloud computing environment. There are three security factors that h examined in the proposed model, namely data integrity, data intrusion and service availability.

Literature Survey

Mentioned below is the schematic block diagram of a cloud system in Figure 1. It describes how communication is achieved in the cloud paradigm.

Figure 1.

Overview of cloud model

978-1-5225-8407-0.ch005.f01

Part A is the client side, which sends data inquiries to server or instance such as in Amazon in the cloud service provider (CSP) in part B.

Mohammed A. AlZain, Ben Soh and Eric Pardede in 2011 argued that the data source in part B stores the data in the cloud side which is a trusted cloud, additional to ensuring the privacy of any query that the client has made and for the security of the client stored data.

MCDB provides cloud with database stored in a multi-cloud service provider which is different than Amazon cloud service. MCDB model does not preserve security by a single cloud; rather security and privacy of data preserved by applying multi shares technique (Jijun Lu, Swapna S. Gokhale, 2012) on multi-cloud providers. It avoids the adverse effects of a single cloud, reduces the security risks from a malicious insider in the cloud computing environment, and reduces the negative impact of encryption techniques.

MCDB preserves security and privacy of user’s data by replicating data among several clouds and by using the secret sharing approach. Mohammed A. AlZain, Ben Soh and Eric Pardede in 2011 observed that it deals with the database management system DBMS (data source) to manage and control the operations between the clients and the cloud service providers (CSP).

MCDB has three layers the presentation layer, the application layer, and the data management layer. The presentation layer contains the end user's browser and the HTTP server. The management layer consists of the Database Management System (DBMS) and the database service provider. DBMS communicates with the Servlet Engine through the JDBC protocol. According to Mohammed A. AlZain, Ben Soh and Eric Pardede in 2011 communication between components are through a secured private high-speed network that uses secure protocols.

Veluru, S., Rahulamathavan, Y., Gupta, B. B., & Rajarajan, M. in 2015 given an idea to preserve privacy in text analytics applying data mining in several fields of e-mail addresses. They presented a survey of text mining and privacy preserving techniques strategies and challenges in e-mail analysis.

Gupta, S., & Gupta, B. B. in 2017 given an analysis between web application and available development platforms.

Gupta, B. B. (Ed.) in 2018 in his book provided the details about Security and privacy in cloud computing, ad-hoc networks, e-services, mobile systems, WSNs, distributed system, grid systems and many more.

Stergiou, C., Psannis, K. E., Kim, B. G., & Gupta, B. in 2018 presented a survey of IoT and Cloud Computing with a focus on the security issues of both technologies. Authors combine the two aforementioned technologies i.e. Cloud Computing and IoT, to examine the standard features and to discover the benefits of their integration. They also provided the contribution of Cloud Computing to the IoT technology. They surveyed the security challenges of the integration of IoT and Cloud Computing.

Complete Chapter List

Search this Book:
Reset