Energy Optimal Cloud Storage and Access Methods for Temporal Cloud Databases



Similar documents
Development of enhanced Third party Auditing Scheme for Secure Cloud Storage

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY

Data Integrity for Secure Dynamic Cloud Storage System Using TPA

SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD

IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD

ISSN Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD

PRIVACY PRESERVING PUBLIC AUDITING FOR SECURED DATA STORAGE IN CLOUD USING BLOCK AUTHENTICATION CODE

Secrecy Maintaining Public Inspecting For Secure Cloud Storage

CLOUD BASED STORAGE SERVICES FOR SECURITY FOLLOWED BY THE DATA AUTHENTICATION

Enable Public Audit ability for Secure Cloud Storage

A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA

PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING

Selective dependable storage services for providing security in cloud computing

Performance Evaluation Panda for Data Storage and Sharing Services in Cloud Computing

SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE

AN APPROACH TOWARDS FUNCTIONING OF PUBLIC AUDITABILITY FOR CLOUD ENRICHMENT

Enabling Data Security in Cloud Computing Using Third Party Auditing and Encryption Services

Improving data integrity on cloud storage services

SHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING

RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM

Energy Efficiency in Secure and Dynamic Cloud Storage

EFFICIENT DISCOVERY OF INTEGRITY AUTOMATION IN HYBRID CLOUD COMPUTING

Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing.

Identifying Data Integrity in the Cloud Storage

A Survey on Privacy-Preserving Techniques for Secure Cloud Storage

Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.

A Survey on Secure Storage Services in Cloud Computing

Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System

Keywords: - Ring Signature, Homomorphic Authenticable Ring Signature (HARS), Privacy Preserving, Public Auditing, Cloud Computing.

DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION

CONSIDERATION OF DYNAMIC STORAGE ATTRIBUTES IN CLOUD

Surveying Cloud Storage Correctness using TPA with BLS

Verifying Correctness of Trusted data in Clouds

Cloud Data Storage Services Considering Public Audit for Security

Security in Cloud Network

Survey Paper on Integrity Auditing of Storage

I. Introduction. A. Related Work

Insuring Security for Outsourced Data Stored in Cloud Environment

How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System

Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving,

Privacy-Preserving Public Auditing & Data Intrgrity for Secure Cloud Storage

IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD ENVIRONMENT

PRIVACY PRESERVATION ALGORITHM USING EFFECTIVE DATA LOOKUP ORGANIZATION FOR STORAGE CLOUDS

A Survey on Data Integrity of Cloud Storage in Cloud Computing

Third Party Auditing For Secure Data Storage in Cloud through Trusted Third Party Auditor Using RC5

Secure Way of Storing Data in Cloud Using Third Party Auditor

Australian Journal of Basic and Applied Sciences

Enhancing Data Security in Cloud Storage Auditing With Key Abstraction

A Secure and Dependable Cloud Storage Service in Cloud Computing

Data Grid Privacy and Secure Storage Service in Cloud Computing

Data Storage Security in Cloud Computing

RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES

A Survey Paper on Secure Auditing and Maintaining Block Level Integrity with Reliability of Data in Cloud

SECURED DATA STORAGE IN CLOUD

Security in Cloud Audit Using the Key Based Homomorphic Linear Authenticator

ADVANCE SECURITY TO CLOUD DATA STORAGE

Index Terms : cloud computing, Distributed Storage, error detection, data recovery, SHA, dynamic block operations

Erasure correcting to enhance data security in cloud data storage

SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING

International Journal of Advance Research in Computer Science and Management Studies

International Journal of Infinite Innovations in Engineering and Technology. ISSN (Online): , ISSN (Print):

Data Integrity Check using Hash Functions in Cloud environment

Near Sheltered and Loyal storage Space Navigating in Cloud

Cloud Data Service for Issues in Scalable Data Integration Using Multi Authority Attribute Based Encryption

Dynamic Resource Allocation and Data Security for Cloud

An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud

Authorized Auditing of Big Data Stored on Cloud with Auditability Aware Data Scheduling

Securing Cloud Data Storage

Ensuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication

Cloud Data Storage Security and Public Auditing

Enabling Public Auditing for Secured Data Storage in Cloud Computing

Privacy Preservation and Integrity Auditing In Cloud Storage or Web Servers

Privacy-Preserving Public Auditing for Secure Cloud Storage

February. ISSN:

Efficient and Secure Dynamic Auditing Protocol for Integrity Verification In Cloud Storage

Data Dynamics for Storage Security and Public Auditability in Cloud Computing

M. Nathiya 2 B.Tech. (IT), M.E. (CSE), Assistant Professor, Shivani Engineering College, Trichy, Tamilnadu, India.

Privacy-Preserving Public Auditing For Secure Cloud Storage

A Proxy-Based Data Security Solution in Mobile Cloud

Secure Privacy Preserving Public Auditing for Cloud storage

Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage

Remote Data Auditing Scheme in Secured Cloud Storage Environment

DATA INTEGRITY PROOF AND SECURE COMPUTATION IN CLOUD COMPUTING

Trusted Public Auditing Process for Secure Cloud Storage

OVERVIEW OF SECURITY ISSUES IN CLOUD COMPUTING

AN EFFICIENT STRATEGY OF THE DATA INTEGRATION BASED CLOUD

How To Ensure Data Integrity In Cloud Computing

TITLE: Secure Auditing and Deduplicating Data in Cloud(Survey Paper)

An Integrated Approach of Data storage and Security in Cloud Computing

Analysis of Secure Cloud Data Sharing Within a Group

An Efficient Checkpointing Scheme Using Price History of Spot Instances in Cloud Computing Environment

AN EXPOSURE TO RELIABLE STORAGE SERVICES IN CLOUD COMPUTING

Index Terms: Cloud Computing, Cloud Security, Mitigation Attack, Service Composition, Data Integrity. 1. Introduction

A Review of Load Balancing Algorithms for Cloud Computing

Enhance Data Security in Cloud Computing using Layered Interleaving Approach

Secure Public Auditing for Cloud Data Storage

Public Auditing For Shared Data with Symposium on Security in the Cloud

Data storage security in Cloud

How To Ensure Data Integrity In Clouds

Transcription:

Energy Optimal Cloud Storage and Access Methods for Temporal Cloud Databases MUTHURAJKUMAR SANNASY*, VIJAYALAKSHMI MUTHUSWAMY, KANNAN ARPUTHARAJ Department of Information Science and Technology College of Engineering College Guindy Campus, Anna University Anna University, Chennai, India - 6 25 INDIA muthurakumarss@gmail.com, viim@annauniv.edu, kannan@annauniv.edu Abstract: - Cloud data storage has the biggest challenge on the maintenance of data integrity at untrusted servers. Moreover in such systems, failures may occur frequently and data errors by clients may also be made for their own benefit. In order to provide effective data integrity and security, it is necessary to propose new storage and retrieval algorithms for cloud databases. In addition, the temporal nature of cloud data necessitates the use of temporal constraints for providing effective database services. In this paper, we propose a new time oriented data staging algorithm for effective storage of application data in the cloud using merkle tree with temporal constraints. Also, we propose a new data retrieval algorithm based on temporal constraints. The proposed algorithm performs optimization using speed, time, energy and security. The main advantage of these proposed algorithms is that they reduce the retrieval time and also the storage cost. The experimental results obtained from this work depict new advantages by optimizing power and load and at the same time it ensures data security. Key-Words: - Energy efficient, Cloud computing, Data staging, Temporal data storage. 1 Introduction Cloud computing helps to provide cost effective services by providing additional processor and memory features. Storing data in cloud computing environment provides more convenience to the database users. Moreover, cloud services are accessed through World Wide Web and provide hence a cloud database a large amount of storage space. The cloud computing platform eliminates the responsibility of local database administrations from the complex task to maintain data. In such a scenario, the users depend only on the cloud provides for the availability and integrity of the data. The advantages of cloud databases include reducing cost and storage. In addition, it motivates to focus on core competencies instead of infrastructures management. However, the existing storage structures are not sufficient store the temporal data obtained from many applications in the cloud. Therefore, it is necessary to propose a new storage structures along with effective retrieval methods to efficiently store and retrieval the temporal data. The cloud computing is capable of storing and retrieving terabytes of data from automatic data sources. There are multiple types of cloud platforms which include public, private and community cloud. However, private clouds are important for most organizations. Hence, this work focuses on the propel of security and power optimization techniques for cloud networks. It also proposes new scheduling algorithms and hence this paper focuses on two aspects namely power optimization and optimal scheduling. Another important challenge to be addressed in cloud databases is the lack of security in untrusted environments including servers. In such a scenario, it is necessary to provide a trust based storage and retrieval technique which can handle temporal data effectively. In this paper, we propose a new Merkle tree based storage structure for storing the temporal data effectively by applying temporal constraints. In addition, we propose a new search technique for effective retrieval of temporal data from the cloud. Finally, we propose a trust based security maintenance algorithm for enhancing the security of ISBN: 978-1-6184-277-4 131

cloud databases. This includes propose it trust based temporal access control techniques in data retrieval. The remainder of this article is organized in the following order. Section 2 provides related work in the literature that deal with energy saving and security in cloud data base. Section 3 shows the architecture of the system proposed in this paper. Section 4 presents the Intelligent Temporal secure Data Staging Algorithm model proposed in this paper. Section 5 makes a comparison of this algorithm with their related algorithms. Section 6 gives the conclusions on this work and suggests some possible future enhancements. Therefore, new algorithms are proposed in this paper for effective power optimization and resource security for obs. 2 Literature Survey There are many existing works that discuss about data staging algorithm [3, 9, 1, 11] for secure data storage which are used to send a common message to a group of users. Ateniese et al. [1] proposed a provable data possession model that considers the public auditability in their to ensure the possession of data in untrusted storage servers for providing secured storage. However, the system has a limitation by imposing priori bound on the number of queries. In addition data security algorithms [2, 6, 7] described a proof of retrievability model in which spot-checking and error-correcting codes have been used to ensure both possession and retrievability of data files on archive service systems. In their model, some special blocks termed as sentinels are randomly embedded into the data files which are used for detection. The data file is further encrypted to protect the positions of these special blocks. In addition, public auditability is not supported in that scheme. Shacham and Waters [5, 8] developed two schemes for secured cloud storage in which they redundantly encode a file with an erasure code. Then they applied an audit that probabilistically ensures that enough blocks are retrievable to reconstruct the file. In their schema, the encoder embeds special blocks into the data file before it is encrypted. Moreover, these blocks are derived from a file containing used details for which the verifier keeps the key. During an audit, the verifier requests a set of special blocks that are not used before and checks them for correctness. However, in their model the verifying party must be trusted and even multiple trusted machines cannot independently verify the blocks. The provable data possession model proposed by Wang et al. [9] describes a scheme to address the concerns in Juels and Kaliski [2] schema. In this system each block of the redundantly encoded data is stored along with a Message Authentication Code (MAC). They also used a third parity audited for providing additional security. Even though, their model is cost effective, the security needs further improvements. In order to overcome the limitation of the existing cloud databases, a new intelligent and secure approach is proposed in this paper for effective storage and retrieval of cloud data. Jens Buysse et al [1] proposed a unified and online scheduling algorithm which uses weighted routing in a typical optical cloud infrastructure. According to them, energy optimization can be performed only at a network or device level. In such scenario, energy efficiency is achieved by using only a minimum amount of energy by their new algorithm. Taner CEVIK et al [13] proposed a power aware routing protocol which considers nodes with higher energy and also the shortest path for performing effective routing. In this paper, we have considered a private cloud platform to carry out the implementation. This algorithm were implemented and tested with the same networks parameters which are used in existing works. From the experiments it is proved that this proposed algorithm are more energy efficient and secured than the related algorithms. 3 System Architecture Fig.1, shows the overall architecture of the system discussed in this paper. It consists of eight maor components namely client, server, trusted TPA, security manager, temporal constraint manager, cloud server, knowledge base and cloud database. Moreover, N number of clients and M number of servers are present in this model in such a way that the N servers can interact with M clients. These interactions take place in the cloud environment in the presence of cloud databases and a cloud data manager. All the data stored in the cloud database are accessed from the server through the client. The client communicates to the cloud database through server. The responsibility of power constraint manager is to check the access pattern of the user in the past and the time duration for each access using temporal constraints. The rule base is used by the power constraint manager which has a collection of active and passive rules and event details. Active rules are ISBN: 978-1-6184-277-4 132

automatically fired in response to abnormal events under the conditions defined. The power constraint manager is responsible not only for power management but also for role management activities including inserting, deleting and updating rules based on agent s feedback. Client Trusted TPA Temporal Constraint Manager Power Constraint Manager Knowledge Base Server Security Manager Cloud Server Cloud Database Fig. 1 Architecture Diagram Encrypted A server may receive request from many different clients in very short period of time. A server host runs one or more server programs which share the resources with clients. Database can access to clients from the cloud and delivered to users on demand through server provided by cloud database servers. By using cloud computing facilities, cloud database can achieve optimized scaling, high availability, multi-tenancy and effective resource allocation. The server communicates to security manager for data storing and retrieving. Security manager communicates with server and at the same time it can also communicate with cloud server, trusted TPA and temporal constraint manager. Trusted TPA is used to compute and maintain trust to secure data. Temporal constraint manager is used not only to check data integrity ans security but also to store and retrieve data from knowledge base to cloud database via cloud server. A cloud server is a logical server that is built, hosted and delivered through a cloud computing platform over the Internet. Cloud server communicates to server through security manager and it also communicates with knowledge base through temporal constraint manager for data transmission. A cloud server may also be called a virtual server or virtual private sever. Cloud database is connected to cloud server for storing data. Cloud databases can offer significant advantages over their traditional counterparts, including increased accessibility, automatic failover and fast automated recovery from failures, automated on-the-go scaling, minimal investment and maintenance of in-house hardware, and potentially better performance. At the same time, cloud databases have their share of potential drawbacks, including security and privacy issues as well as the potential loss of or inability to access critical data in the event of a disaster or bankruptcy of the cloud database service provider. 4 Proposed intelligent temporal secure data staging algorithm The proposed Intelligent Temporal secure Data Staging Algorithm contains three phases namely Intelligent Temporal Multiple Copies without Constraints, Temporal Constraints on database tables and Intelligent Temporal and security constraints for entire database. 4.1 Intelligent temporal multiple copies without constraints In this phase, a new intelligent multicopy algorithm is proposed in this paper to handle multiple distinct data items. In this algorithm, n is the number of requests in sequence, m is the number of processing nodes, k means number of distinct data items, is the th data item, and ti is the ith time stage. This algorithm find the shortest path from source node to designation node that has the request point for item at stage tu. The shortest path is defined on a subset instead of the fully connected network. It is necessary to update the costs for the request points in the affected set due to of the side effects of the shortest path computation. The steps of the proposed algorithm are as fellow s Step1: Find the shortest path sp( p u, pv ) from pu to pv in which pu based on edges of the graph is the node that has the request point for item at stage tu. Step2: Find the minimum cost considering the temporal aspect and using the formula ISBN: 978-1-6184-277-4 133

F ( i) = {min sp( pu, pv ) + { sp( p, )}} t u pv Step3: Find the total cost F (i) using the formula k F( i) = F ( i) = 1. Step4: Find the best path using decision rules based on length and time. This algorithm finds the shortest path between source and designation using Dikstra s algorithm. The decision rules used in step 4 of the algorithm are stored in the Knowledge. They are useful for finding the best path by optimizing distance and cost. This algorithm is used for find the shortest path based on temporal aspects and it is used in intelligent temporal multiple copies without constraints. 4.2 Temporal constraints on database tables In this phase, the temporal constraints on database E tables for the distinct data items are applied. i is a request point node, is the th data item and ti is the ith time stage. A Step1: Select the affected point set i for all the affected request nodes. sp( p, ) Step2: Compute the shortest path u pv of p moving item from node l to p i. Ei Step3: Find the request point using the formula Ei = { Eθ i Step4: Minimize the request between the source and destination node using shortest path SP new source selection. E Step5: Minimize the request SP new and constraints. h, h A i E, using i, 4.3 Intelligent temporal and security constraints for entire database In this phase, intelligent temporal and security constraint for entire database are applied on the distinct data items. F is a data file to be outsourced, denoted as a sequence of n blocks m1, m2,..., mi,..., mn zp for some large prime p and t is a time point from a set of time point T. In this algorithm MAC (.) message authentication code (MAC) function, defined as 1 where k denotes the key space. H (.), h (.) is a cryptographic hash functions. Step 1: Find the bilinear map for storing the data items in Mekle tree blocks. Step 2: Let G1, G, and GT be multiplicative cyclic groups of prime order p. Let g1, g2 and gt be generators of G1, G, and GT respectively. Step 3: A bilinear map is a map e: G1 Χ G GT such that for all a b ab u G, v G, 1 2 anda, b Z p, e( u, v ) = e( u, v) Step4: This bilinearity implies that for any. Step 5: Find the computable algorithm for computing e and the map should be nontrivial, i.e., e is no degenerate: e (g1, g2) 1 Hash functions [4] [7] have been used to verify any kind of data stored, handled and transferred between computers. The prominent goal of using hash functions on Temporal Merkle trees is to make sure that data blocks received are undamaged and unaltered, and even to check that the other host do not send fake blocks. 5 Performance Analysis In this section, we discuss about the performance analysis of our proposed algorithm used in intelligent temporal with other existing algorithms. The proposed and existing algorithms have been implemented in JAVA for measuring the actual computation time to perform with constraint and without constraint operations. In order to measure the actual computation time taken for performing the intelligent temporal operation, we have used various numbers of CPUs, Memory in the third parity side. Similarly, the same number of hardware components is used in the cloud service provider side also for measuring the computation time. For analysing the CPU, main memory and disk usage at user and cloud service provider sides, the simulation software Eucalyptus has been installed in Linux operating system. Moreover, two cluster-level components are deployed at the head-node of one cluster. Finally, every node with a hypervisor was used with a Node Controller (NC) for controlling the hypervisor. The measured computation time for all the existing and proposed algorithm are included in Table 1 and Table 2. Table 1, shows the comparison on the amount of storage by Data Staging without Temporal Constraints Algorithm (DSWOTSA) and Data Staging with Temporal Constraints Algorithm (DSWTSA) in 5 experiments with different number of request. The requests included genuine and malicious user request with a proportion 19:1. From Table 1, it can be observed that the proposed DSWOTSA model performs better when compared ISBN: 978-1-6184-277-4 134

with DSWTSA model in restricting the users and provides more than 9% detection and prevention accuracy. This is due to the use of intelligent agents and effective key sharing techniques proposed and used in this model. S. No. Table 1: Storage requirements analysis Amount Time in data Time in data of staging staging with storage without temporal (GB) temporal constraints constraints (ms) (ms) 1 5 11.142 11.124 2 1 11.148 11.126 3 15 11.149 11.131 4 2 11.153 11.136 5 25 11.159 11.142 Table 2, shows the comparison on the amount of storage by Data Staging without agents and with agents 5 experiments with different number of request. The requests included genuine and malicious user request with a proportion 19:1. From Table 2, it can be observed that the proposed DSWOTSA model performs better when compared with DSWTSA model in restricting the users and provides more than 9% detection and prevention accuracy. Table 2: Storage analysis for agents S. Storage Data Data staging No. (GB) staging time time with (ms) agents (ms) 1 5 1.115 9.454 2 1 1.448 9.121 3 15 1.149 9.311 4 2 1.155 9.153 5 25 1.459 9.122 Fig. 2, shows the data stored by the users who were permitted by the Cloud Data Staging without Constraint Algorithm. From this figure, it is observed that the security level of data storage in Data Staging with Temporal Constraints Algorithm () is 5% more than the security level of data storage in Data Staging without Temporal Constraints Algorithm (). Moreover, our is more useful for securing data storage than. Security Level (%) 1 9 8 7 6 5 4 3 2 1 1 2 3 4 5 Data Size (GB) Fig. 2 Data storage security level using and Fig. 3, shows the data stored by the users who were permitted by the Cloud Data Staging without Constraint Algorithm. From this figure, it is observed that the security level of data storage in Data Staging with Temporal Agent Temporal Constraints algorithm (DSWTATCA) is 1% more than the security level of data storage in Data Staging without Agent with Temporal Constraints Algorithm (DSWOAWTCA). Moreover, 1% of data store is more in comparison with the existing algorithm and hence the security is enhanced. This is due to the fact that temporal constraints are used effectively to check the abnormal users. Security Level (%) 1 9 8 7 6 5 4 3 2 1 1 2 3 4 5 Data Size (GB) DSWTATCA DSWOAWTCA Fig. 3 Data storage security level using DSWTATCA and DSWOAWTCA ISBN: 978-1-6184-277-4 135

Fig. 4, shows comparison between Conventional Application Time by Existing Data Staging without Temporal Constraint Algorithm () and Data Staging with Temporal Constraint Algorithm () when the request is sent during time interval (t1, t2). From the implementation carried out in this model, it is observed that the time is reduced by 7% in when it is compared with. 6 5 4 3 2 1 Fig.4: Conventional applications time using and Fig. 5, shows comparison between Temporal Application Time by Existing Data Staging without Temporal Constraint Algorithm () and Data Staging with Temporal Constraint Algorithm () when the request is sent during time interval (t1, t2). From the implementation carried out in this model, it is observed that there is a difference in number of users by 25% in time who were data storage and retrieval in comparison with the Temporal Data Staging Algorithm. Time (ms) Time (ms) 6 5 4 3 2 1 1 3 5 7 9 Conventional Applications 1 3 5 7 9 Temporal Applications Fig. 5: Temporal applications time using and Fig 6. shows, the energy take to revoke permissions when they are requested by the user. From the graph, it can be seen that the energy required for processing revoke is proportional to the number of user sessions and number of users who requested for rollback at a time. Even though the revoking energy increases with the number of users, it decreases after certain limit due to the application logic and presence of intelligent agent who learn the behavior. Therefore Temporal Power Constraints algorithm consumes less energy when compared to Round Robin Algorithm model. Energy Level (%) 1 9 8 7 6 5 4 3 2 1 Fig. 6: Energy Level using and 6 Conclusions 1 2 3 4 5 Data Size (GB) In this paper, new algorithms are proposed for effective data staging of different data items in a fully connected cloud network environment so that it is possible to make easy cloud-based services with least cost. This optimal data storage and staging strategies are based on the temporal constraints which are used to minimize the total staging cost. We have validated the proposed algorithms by implementing these algorithms on a private cloud by conducting -experiments. From his implementation, it has been observed that the proposed data staging algorithms provide better storage and retrieval facilities. In addition, security is maintained in this work using trust management and temporal constraints. Further works in this direction can be the use of computations intelligent techniques for effective decision making. References: [1] Ateniese, G., Burns G. R., Curtmola R.., Herring J., Kissner, L., Peterson, Z. & Song, D. Provable Data Possession at Untrusted Stores. Proc. 14th ACM Conference Computer and ISBN: 978-1-6184-277-4 136

Communication Security (CCS 7), pp. 598-69, 27. [2] Juels, A. & Kaliski, B.S. Proceedings: Proofs of Retrievability for Large Files. Proc. 14th ACM Conference Computer and Comm. Security (CCS 7), pp. 584-597, 27. [3] Wang, Q., Wang, C., Li, J., Ren, K. & Lou, W. Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing. Proceedings. 14th European ymp. Research in Computer Security (ESORICS 9), pp. 355-37, 29. [4] Jakobsson, M., Leighton, T., Micali, S. & Szydlo, M. Fractal Merkle Tree Representation and Traversal. 23. [5] Shacham, H. & Waters, B. Compact Proofs of Retrievability. Proceeding 14th International Conference. Theory and Application of Cryptology and Information Security: Advances in Cryptology (ASIACRYPT 8), pp. 9-17, 28. [6] Szydlo, M. Merkle Tree Traversal in Log Space and Time. Proceeding International Conference on the Theory and Application of Cryptographic Techniques, 24. [7] Nurmi, D., Wolski, R., Grzegorczyk, C., Obertelli, G. & Soman, S. The Eucalyptus Open-source Cloud-computing System. Proceeding International Conference on the Cluster Computing and the Grid, 29. [8] Shacham, H. & Waters, B. Compact Proofs of Retrievability. Proceeding International Conference on the Theory of Cryptography, February, 28. [9] Wang, C., Wang, Q., Ren, K. & Lou, W. Privacy-Preserving Public Auditing for Storage Security in Cloud Computing. Proceedings IEEE INFOCOM 1, Mar. 21. [1] Armbrust, M., Fox, A., Griffith, R., Joseph, V., Katz, V., Konwinski, V., Lee, V., Patterson, D.A.., Rabkin, A., Stoica, I. & Zaharia, M. Above the Clouds: A Berkeley View of Cloud Computing. Technical Report UCB-EECS- 29-28, Univ. of California, Berkeley, Feb. 29. [11] Wang, Y., Veeravalli, B. & Tham, C. On Data Staging Algorithms for Shared Data Accesses in Clouds. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 24 (4), pp: 825 838, APRIL 213. [12] Taner CEVIK, Abdul Halim ZAIM, Derya YILTAS. Localized Power-Aware Routing With an Energy Efficient Pipelined Wakeup Schedule for Wireless Sensor Networks, Turkish Journal of Electrical Engineering & Computer Sciences 212; 2: 964 978. [13] Ganapathy, S., Kulothungan, K., Muthurakumar, S., Viayalakshmi, M., Yogesh, P and Kannan, A., 213. Intelligent feature selection and classification techniques for intrusion detection in networks: a survey, EURASIP- Journal of Wireless Communications and Networking - Springer Open Journal, 271: 1 16. ISBN: 978-1-6184-277-4 137