How To Create A Privacy Preserving And Dynamic Load Balancing System In A Distributed System



Similar documents
Self Reconfigurable Distributed Load Balancing For Secure and Privacy-Preserving Information Brokering.

EFFICIENCY INFORMATION BROKING SYSTEM SERVICE FOR COORDINATE ROUTING IN CLOUD

A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing

Near Sheltered and Loyal storage Space Navigating in Cloud

Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November ISSN

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

International Journal of Advanced Research in Computer Science and Software Engineering

International journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online

Data management using Virtualization in Cloud Computing

Secure Alternate Viable Technique of Securely Sharing The Personal Health Records in Cloud

Monitoring Performances of Quality of Service in Cloud with System of Systems

Dynamic Query Updation for User Authentication in cloud Environment

A Semantic Marketplace of Peers Hosting Negotiating Intelligent Agents

Role Based Encryption with Efficient Access Control in Cloud Storage


Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving,

Implementation of P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains

EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption

ADVANCE SECURITY TO CLOUD DATA STORAGE

Index Terms : Load rebalance, distributed file systems, clouds, movement cost, load imbalance, chunk.

A Layered Signcryption Model for Secure Cloud System Communication

A Novel Load Balancing Optimization Algorithm Based on Peer-to-Peer

Load Balancing in Structured Peer to Peer Systems

Load Balancing in Structured Peer to Peer Systems

Transform Your Business and Protect Your Cisco Nexus Investment While Adopting Cisco Application Centric Infrastructure

PSG College of Technology, Coimbatore Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS.

A Survey on Scalable Data Security and Load Balancing in Multi Cloud Environment

Updating Your Microsoft SQL Server 2005 Skills to SQL Server 2008

Online Transaction Processing in SQL Server 2008

A Novel Technique of Privacy Protection. Mining of Association Rules from Outsourced. Transaction Databases

Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.

Cloud Information Accountability Framework for Auditing the Data Usage in Cloud Environment

An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud

An Efficient Secure Multi Owner Data Sharing for Dynamic Groups in Cloud Computing

Secure cloud access system using JAR ABSTRACT:

Security over Cloud Data through Encryption Standards

Survey on Efficient Information Retrieval for Ranked Query in Cost-Efficient Clouds

Distributed auditing mechanism in order to strengthen user s control over data in Cloud computing Environment

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015

ACL Based Dynamic Network Reachability in Cross Domain

Survey on Load Rebalancing for Distributed File System in Cloud

Data Integrity for Secure Dynamic Cloud Storage System Using TPA

How To Detect Denial Of Service Attack On A Network With A Network Traffic Characterization Scheme

International Journal of Scientific & Engineering Research, Volume 4, Issue 10, October-2013 ISSN

Secure Role-Based Access Control on Encrypted Data in Cloud Storage using Raspberry PI

A Road Map on Security Deliverables for Mobile Cloud Application

The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network

A Novel Way of Deduplication Approach for Cloud Backup Services Using Block Index Caching Technique

Data Integration Hub for a Hybrid Paper Search

ASurveyonEncryption andimprovedvirtualizationsecuritytechniquesforcloudinfrastructure

A SYSTEM FOR DENIAL OF SERVICE ATTACK DETECTION BASED ON MULTIVARIATE CORRELATION ANALYSIS

Index Terms: Cloud Computing, Cloud Security, Mitigation Attack, Service Composition, Data Integrity. 1. Introduction

A B S T R A C T. Index Trems- Wi-Fi P2P, WLAN, Mobile Telephony, Piconet I. INTRODUCTION

International Journal of Advance Research in Computer Science and Management Studies

International Journal of Advanced Research in Computer Science and Software Engineering

Secure Cloud Transactions by Performance, Accuracy, and Precision

IMPLEMENTATION OF SOURCE DEDUPLICATION FOR CLOUD BACKUP SERVICES BY EXPLOITING APPLICATION AWARENESS

A Survey Paper: Cloud Computing and Virtual Machine Migration

On the features and challenges of security and privacy in distributed internet of things. C. Anurag Varma CpE /24/2016

IMPACT OF DISTRIBUTED SYSTEMS IN MANAGING CLOUD APPLICATION

Load Balancing in Cloud Computing using Observer's Algorithm with Dynamic Weight Table

Metastorm BPM Interwoven Integration. Process Mapping solutions. Metastorm BPM Interwoven Integration. Introduction. The solution

Data Security Using Reliable Re-Encryption in Unreliable Cloud

Protect Integrity of Data in Cloud Assisted Privacy Preserving Mobile Health Monitoring

Development of enhanced Third party Auditing Scheme for Secure Cloud Storage

CLOUDDMSS: CLOUD-BASED DISTRIBUTED MULTIMEDIA STREAMING SERVICE SYSTEM FOR HETEROGENEOUS DEVICES

Secure Data Sharing in Cloud Computing using Hybrid cloud

An Implementation of RSA Algorithm in Google Cloud using Cloud SQL

AN ENHANCED ATTRIBUTE BASED ENCRYPTION WITH MULTI PARTIES ACCESS IN CLOUD AREA

HIDS and NIDS Hybrid Intrusion Detection System Model Design Zhenqi Wang 1, a, Dankai Zhang 1,b

A Clustered Approach for Load Balancing in Distributed Systems

Single Sign-On Secure Authentication Password Mechanism

DELEGATING LOG MANAGEMENT TO THE CLOUD USING SECURE LOGGING

International Journal of Advanced Research in Computer Science and Software Engineering

DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION

IMPLEMENTATION OF NOVEL MODEL FOR ASSURING OF CLOUD DATA STABILITY

An Efficient and Light weight Secure Framework for Applications of Cloud Environment using Identity Encryption Method

Implementation of Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage

Fig. 3. PostgreSQL subsystems

CLOUD BASED PEER TO PEER NETWORK FOR ENTERPRISE DATAWAREHOUSE SHARING

IMPROVED LOAD BALANCING MODEL BASED ON PARTITIONING IN CLOUD COMPUTING

Secure Attack Measure Selection and Intrusion Detection in Virtual Cloud Networks. Karnataka.

Data Management in an International Data Grid Project. Timur Chabuk 04/09/2007

Secure Authentication of Distributed Networks by Single Sign-On Mechanism

Secure & Encrypted Accessing and Sharing of Data in Distributed Virtual Cloud

Transcription:

Enforcing Secure and Privacy-Preserving Information Brokering with Dynamic Load Balancing in Distributed Information Sharing. 1 M.E. Computer Engineering Department GHRCEM, Wagholi, Pune. Jyotimore2283@gmail.com 2 Department of Computer, GHRCEM, Wagholi, Pune, India University Of Pune Abstract This paper describes concept of privacy preserving and dynamic load balancing. To preserve sensitive information Privacy Preserving is used. Information sharing through on-demand access has been increased in organizations (e.g. libraries, enterprise). Information sharing among large scale loosely unified data sources are connected via peer-to-peer overlay network by Information Brokering System (IBS). Information Brokering System (IBS) is distributed system providing data access through set of brokers. The set of brokers are used to make decisions to locate data sources for client queries. A solution in Information Brokering process of multiple stakeholders is Privacy Preserving Information Brokering (PPIB) to preserve privacy. To integrate security with query routing has been achieved by automaton segmentation and query segment encryption. The attacker could infer the privacy by two attacks named as correlation attack and inference attack. I also focus on concept of Load Balancing. Load balancing has important impact on performance. In distributed system, load balancing is applied among nodes for redistributing the workload. Load balancing improves resource utilization and response time for implementing this concept; I focus on Dynamic Load Balancing Algorithm. Keywords Privacy, PPIB, Automaton segmentation, query segment encryption, Load Balancing, distributed system. 1. Introduction There is increasing need for information sharing in recent years, in different organization. In designing distributed information sharing system, there is need for peer autonomy. The existing system work on 1) Query Answering model, 2) Distributed database system [2]. In Query Answering model, peers are fully autonomous but no system-wide communication. In Distributed database system, all participates don t have autonomy and they are managed by centralized DBMs.Both of the spectrum are not suitable for newly application. The centralized DBMs is not suitable for sensitive and autonomous data provider. For this problem, the solution is Data Centric overlay. The 207

system consisting of data sources and brokers. Brokers are helping to make routing decision for queries. In earlier study, distributed system providing data access through set of brokers.ibs system providing scalability, on-demand data access with transparency and server autonomy. The problem with IBS infrastructure is brokers are not fully trusted Figure 1. Overview of the IBS infrastructure. To overcome this problem, Privacy Preserving Information Brokering (PPIB) introduced. In this paper, it introduced the implementation of Dynamic Load Balancing concept. Dynamic load balancing improves system performance. Load Balancing means redistribute workload among the nodes of distribute system to improve resource utilization and response time [6]. 2. Background In order to provide privacy and security Privacy Preserving Information Brokering (PPIB) introduced. PPIB has two types of brokering component 1) Brokers and 2) Co-ordinator [1][2]. The user authentication and query forwarding is done by brokers. Access control and query routing is done by co-ordinator. In this paper, two attacks have been discussed and also provide solution to overcome those attacks for security purpose. In this paper, it introduced concept of dynamic load balancing. For improving system performance dynamic load balancing is implemented. 3. The Problem In the Information brokering system, there are mainly three types of stakeholder data owner, data provider and data requester. The information is may be different from one another. The main problem has been created by attacker. Attacker could infer privacy of data owner, data provider and data requester. Also introduce problem of system performance. There are two types of attacks as follows 1).Inference attack 2).Attributecorrelation attack[1][2]. Inference attack This attack is totally based on the guessing the query. If the guess is matches, the query will be inferred. Attribute-correlation attack This attack is depends on predicates. Attacker prevents query, which contain 208

predicates. To infer sensitive information, the attacker correlate attributes Need for improving Performance Solution: PPIB has been provided for overcome these attacks. In this way, privacy is preserved. And also Dynamic load balancing algorithm is implemented for improving performance of system. 4. Privacy Preserving Information Brokering (PPIB) 4.1 Architecture of PPIB: Brokers: Brokers are attached through coordinators. The main function of brokers is for user authentication and query forwarding. Coordinator: Coordinator is responsible for access control and content based query routing. Central Authority: Central Authority is responsible for metadata maintenance and key management. 4.2 Two Novel Schemes: A. Automata Segmentation The data is share between multiple organizations. Organizations have their own ideas and goals. Global components are divided locally and forwarded to the coordinators. The query must be partitioned into multiple parts and parts are forwarded to the local coordinators. Automata Segmentation includes deployment, segmentation and replication [1][2]. B. Query Segment Encryption Figure 1. Architecture of PPIB. PPIB has mainly three types of brokering components: (a) Brokers (b) Coordinators and (c) Central authority (CA) [2]. In Query Segment Encryption phase, segmented query is encrypted by the coordinator. It consists of post-encryption and pre-encryption modules. Coordinator uses the key to encrypt the query segment. The encrypted query has been send to the next coordinator. Until it reaches its data server, query must be prevented. Query has been forwarded to destination [1][2]. 4.3 4-Phases of PPIB 209

5. Conclusion Fig 3. 4-Phases of PPIB. Phase 1: To join the system user needs to authenticate to local broker. The user submits encrypted segment with XML query by unique session key Ks and public level keys, data servers encrypted with the public key, to return data. Phase 2: The task of metadata preparation is done by broker. 1. It extracts the role of the user authenticated and attaches it to the encrypted XML query; 2. For each query it makes a unique ID, and attaches QID with its own address to the query. Data server can directly return the data. Phase 3: The query receives by the root of the coordinator tree and its metadata from a local the query within the coordinator tree, until it reaches a leaf coordinator, which broker, it follows schemes i.e. the automata segmentation scheme for segment the XML query and to perform access control the query segment encryption scheme and to route sends the query to related data servers. Phase 4: In this phase, the data server gets a safe query in an encrypted form. The data server evaluates the query and after decryption returns the data, encrypted by Ks, to the broker of the query [2]. This system gives different ways for privacy and security issues. We studied how the privacy and security is maintained. Attacker could infer privacy of data owner, data provider and data requester. Also introduce problem of system performance. There are two types of attacks: inference attack and Attribute-correlation attack are studied. In this paper, we studied PPIB architecture, two novel scheme, and phases of PPIB. This system proposes a new approach for Dynamic load Balancing concept. 6. References [1] Enforcing Secure and Privacy- Preserving Information Brokering in Distributed Information Sharing, by Bo Luo, Chao-Hsien Chu, Peng Liu Dongwon Lee, Fengjun Li, IEEE TRANSCATIONS ON INFORMATION FORENSICS AND SECURITY, 2013. [2] Ms. Pradnya Kamble, Mr. Mukesh Kawatghare, Review on Enforcing Secure And Privacy Preserving Information Brokering In Distributed Information Sharing. [3] In-broker access control: Towards efficient end-to-end performance of information brokerage systems, by F. Li, P. Liu, D. Lee, B. Luo, W. Lee, and P. Mitra, C. Chu, in Proc. IEEE SUTC, 2006. [4] A. Banu Prabha Security Enforcement with query routing Information Brokering in Distributed Information Sharing IOSR-JCE,Issue 2, Vol 16,Ver.XI Mar-Apr 2014 210

[5] Noe Elisa, K. Suresh Babu SURVEY ON PROTECTING PRIVACY ANDSECURITY IN XML INFORMATION BROKERING IJCSMC, Vol.3, Issue.4 April 2014. [6] EXECUTION ANALYSIS OF LOAD BALANCING ALGORITHMS IN CLOUD COMPUTING ENVIRONMENT Ajanta De Sarkar,Soumya Ray. IJCCSA, Vol.2, No.5, October 2012. [7] S.S.Apte,Abhijit A. Rajguru,, A Comparative Performance Analysis of Load Balancing Algorithms in Distributed System using Qualitative Parameters Volume-1,Issue-3,August- 2012. [8] Rima Lingawar,Milind Srode,Mangesh Ghonge, Survey on Load-Balancing Techniques in Cloud Computing IJARCE,Vol.1,No.3,May 2014. AUTHORS First Author Ms. Jyoti M.More, ME (Computer Engineering), GHRCEM, Wagholi Pune. email : jyotimore2283@gmail.com Second Author Ms. Urmila Biradar, ME(CE),GHRCEM,Wagholi pune. 211