Preprint
Communication

Safe Control of Autonomous Cloud Entities in Distributed Systems

Altmetrics

Downloads

229

Views

64

Comments

1

This version is not peer-reviewed

Submitted:

29 January 2023

Posted:

30 January 2023

You are already at the latest version

Alerts
Abstract
In recent years, Cloud Computing and Big Data have been considered the most attractive areas that are revolutionizing the IT world. Cloud Computing paradigm has recently appeared that allows running proprietary or difficult portable applications outside their original software environment on one or more virtual hardware platforms. Therefore, we are to developing such techniques which make it possible to secure communication between the communicating Cloud entities. These techniques must take into account several factors due to the data transmitted in this type of environment is proprietary and of significant size. Conventional data security techniques are not suitable for today's cloud usage. Hence, the main research of this thesis is to define an adaptable architecture with the aim to propose a scalable system that supports cloud services. We will define feasible security solutions dedicated to the Cloud computing context in order to robustly protect data stored in the Cloud. We are more precisely looking for working on NoSQL databases. We also intend to propose a secure solution based on the blockchain that has powerful features like decentralization, autonomy, security, reliability, and transparency.
Keywords: 
Subject: Computer Science and Mathematics  -   Information Systems

1. Introduction

The Internet revolution and the increasingly massive creation of data in digital form facilitate communications and exchanges and therefore weaken the information stored. Indeed, public networks including distributed systems and cloud computing create security breaches also in terms of privacy and it is more manageable for an attacker to access data [1,2,3,4]. Similarly, the replacement of human beings by machines and programs makes relations much more anonymous even though access to this information requires strong authentication methods [5,6].
In addition, the dematerialization and creation of other means of legal proof such as digital signatures instead of handwritten ones, all contributed to the increase in these security breaches. Thus, the digital revolution in the world of communication and information has opened many areas of security investigation as our daily lives have been invaded by smart cards, banking transactions, internet, mobile phone, etc.
There are many techniques to combat attacks targeting information in general and personal life in particular. These techniques are distributed on different levels such as networks, applications, storage devices, etc. However, one of the most important means of protection remains to keep this data with its original owner. The great development of technology such as IoT, cloud, speed of the internet, and the opening of the world to some of it led to the production of a huge amount of data, which led to the need to store data in a place other than the place of its production, we mean usually the Cloud.
Figure 1. Cloud security
Figure 1. Cloud security
Preprints 68004 g001

2. Approach

Security is an important part of many areas [7,8,9,10]. The data security process goes through many steps, starting from access control (Authentication, Authorization, and Audit) by using different mechanisms (LDAP, PKI, and roles management) and ending with our main interest which is data encryption in storage. Most NoSQL databases don’t support any security function integration, despite the fact that there are other databases that use techniques such as "Transparent Data Encryption (TDE)" and "Third Party Storage Encryption" (e.g. Linux Unified Key Setup, IBM Guardium Data Encryption, Vormetric Data Security Platform, Bitlocker Drive Encryption), which applies an encryption approach; whether Symmetric (DES and AES Algorithms) or Asymmetric (RSA Algorithm). Based on these techniques and approaches, this work attempts to develop another approach that is more confidential and robust against attacks.
Figure 2. Data Encryption-Decryption in cloud computing
Figure 2. Data Encryption-Decryption in cloud computing
Preprints 68004 g002

3. Encountered Obstacles

The difference between traditional and NoSQL DB shows several obstacles:
  • The kind of NoSQL DB types (key-value, document-oriented, column-oriented, graph-oriented).
  • The choice of which one of these types we will be working on.
  • NoSQL DB is designed to provide real-time performance while managing a large amount of data poses a challenge for encryption operations.
  • NoSQL DB couldn’t assure ACID properties (atomicity, consistency, isolation, and durability).
  • Few open sources NoSQL DB available.

4. Model

When this data is personal or sensitive, the cloud cannot be trusted and the client can not store data in a readable way (in clair), so the client will have to encrypt it. On the other hand, the client not only uses storage service but may ask the cloud to perform operations on this encrypted data such as addition and multiplication. It is obvious to know that not any encryption method will allow these operations to be performed, meaning that the cloud entities will ask the client to decrypt the data before performing the operation, and this is exactly what happens with the classic encryption methods. That is, the cloud entities are not autonomous, and therefore privacy cannot be preserved.
In our work, we want to add autonomy to the cloud entities and make them process the encrypted data without the need to decrypt it by its original owner, which is called homomorphic encryption [11,12]. On the other hand, distributed systems may suffer, whether at the level of IoT or at the level of cloud entities, from some security problems that homomorphic cannot solve, such as domination, when these systems depend on the current leading technology in collecting and storing data, which is the blockchain. In order to raise the level of security in the cloud and distributed systems in terms of collecting and storing data, as well as giving autonomy, flexibility, and confidence to the cloud entities, we will develop security mechanisms using blockchain. Therefore,
This solution consists in developing consensus algorithms [13,14,15] that can be used in many domains [16,17].
Figure 3. Homomorphic encryption
Figure 3. Homomorphic encryption
Preprints 68004 g003

References

  1. Darwazeh, N.S.; Al-Qassas, R.S.; AlDosari, F.; others. A secure cloud computing model based on data classification. Procedia Computer Science 2015, 52, 1153–1158. [Google Scholar] [CrossRef]
  2. Oppermann, A.; Toro, F.G.; Thiel, F.; Seifert, J.P. Secure cloud computing: Reference architecture for measuring instrument under legal control. Security and Privacy 2018, 1, e18. [Google Scholar] [CrossRef]
  3. Youssef, A.E.; Alageel, M. A framework for secure cloud computing. International Journal of Computer Science Issues (IJCSI) 2012, 9, 487. [Google Scholar]
  4. Stergiou, C.; Psannis, K.E.; Kim, B.G.; Gupta, B. Secure integration of IoT and cloud computing. Future Generation Computer Systems 2018, 78, 964–975. [Google Scholar] [CrossRef]
  5. Kara, M.; Laouid, A.; AlShaikh, M.; Bounceur, A.; Hammoudeh, M. Secure key exchange against man-in-the-middle attack: Modified diffie-hellman protocol. Jurnal Ilmiah Teknik Elektro Komputer dan Informatika 2021, 7, 380–387. [Google Scholar] [CrossRef]
  6. KARA, M.; LAOUID, A.; BOUNCEUR, A.; HAMMOUDEH, M.; ALSHAIKH, M. Perfect Confidentiality through Unconditionally Secure Homomorphic Encryption Using OTP With a Single Pre-Shared Key. Journal of Information Science and Engineering 2023, 39, 183–195. [Google Scholar] [CrossRef]
  7. Kara, M.; Laouid, A.; Bounceur, A.; Hammoudeh, M.; Alshaikh, M.; Kebache, R. Semi-Decentralized Model for Drone Collaboration on Secure Measurement of Positions. The 5th International Conference on Future Networks & Distributed Systems, 2021, pp. 64–69.
  8. Kahla, M.E.; Beggas, M.; Laouid, A.; Kara, M.; AlShaikh, M. Asymmetric Image Encryption Based on Twin Message Fusion. 2021 International Conference on Artificial Intelligence for Cyber Security Systems and Privacy (AI-CSP). IEEE, 2021, pp. 1–5.
  9. Habib, A.; Laouid, A.; Kara, M. Secure Consensus Clock Synchronization in Wireless Sensor Networks. 2021 International Conference on Artificial Intelligence for Cyber Security Systems and Privacy (AI-CSP). IEEE, 2021, pp. 1–6.
  10. Chait, K.; Laouid, A.; Laouamer, L.; Kara, M. A Multi-Key Based Lightweight Additive Homomorphic Encryption Scheme. 2021 International Conference on Artificial Intelligence for Cyber Security Systems and Privacy (AI-CSP). IEEE, 2021, pp. 1–6.
  11. Kara, M.; Laouid, A.; Yagoub, M.A.; Euler, R.; Medileh, S.; Hammoudeh, M.; Eleyan, A.; Bounceur, A. A fully homomorphic encryption based on magic number fragmentation and El-Gamal encryption: Smart healthcare use case. Expert Systems 2022, 39, e12767. [Google Scholar] [CrossRef]
  12. Kara, M.; Laouid, A.; Euler, R.; Yagoub, M.A.; Bounceur, A.; Hammoudeh, M.; Medileh, S. A homomorphic digit fragmentation encryption scheme based on the polynomial reconstruction problem. The 4th International Conference on Future Networks and Distributed Systems (ICFNDS), 2020, pp. 1–6.
  13. Kara, M.; Laouid, A.; Hammoudeh, M.; Alshaikh, M.; Bounceur, A. Proof of Chance: A Lightweight Consensus Algorithm for the Internet of Things. IEEE Transactions on Industrial Informatics 2022, 18, 8336–8345. [Google Scholar] [CrossRef]
  14. Kara, M.; Laouid, A.; Bounceur, A.; Lalem, F.; AlShaikh, M.; Kebache, R.; Sayah, Z. A Novel Delegated Proof of Work Consensus Protocol. 2021 International Conference on Artificial Intelligence for Cyber Security Systems and Privacy (AI-CSP). IEEE, 2021, pp. 1–7.
  15. Kara, M.; Laouid, A.; AlShaikh, M.; Hammoudeh, M.; Bounceur, A.; Euler, R.; Amamra, A.; Laouid, B. A compute and wait in pow (cw-pow) consensus algorithm for preserving energy consumption. Applied Sciences 2021, 11, 6750. [Google Scholar] [CrossRef]
  16. Kara, M.; Laouid, A.; Bounceur, A.; Hammoudeh, M. Secure Clock Synchronization Protocol in Wireless Sensor Networks 2023.
  17. Kara, M. A Lightweight Clock Synchronization Technique for Wireless Sensor Networks: A Randomization-Based Secure Approach 2023.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
Copyright: This open access article is published under a Creative Commons CC BY 4.0 license, which permit the free download, distribution, and reuse, provided that the author and preprint are cited in any reuse.
Prerpints.org logo

Preprints.org is a free preprint server supported by MDPI in Basel, Switzerland.

Subscribe

© 2024 MDPI (Basel, Switzerland) unless otherwise stated