A Cost Optimal Information Dispersal Framework for Cloud Storage System

  • Sukhwant KaurEmail author
  • Makhan Singh
  • Sarbjeet Singh
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 941)


In cloud computing, secure storage and retrieval is of significant importance. Along with that, maintaining confidentiality, reliability and availability of data is also an important objective. This can be achieved by dispersing the data into pieces and storing them at different places. But with the increase in data reliability and availability, the cost of maintaining those pieces also increases, which users hesitate to pay. Thus, a strategy is required to maintain a balance between these objectives and cost paid by user. In this paper, efforts have been made to propose a cost optimal information dispersal framework for cloud storage systems that uses an optimization algorithm for the optimal cost expenditure and information dispersal algorithm for the secure storage and retrieval of data. A system architecture is also presented that tells the different components required for the implementation of this strategy.


QoS parameters Implicit security Information dispersal Knapsack algorithm 


  1. 1.
    Buyya, R., Yeo, C.S., Venugopal, S., Broberg, J., Brandic, I.: Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility. Futur. Gener. Comput. Syst. 25(6), 599–616 (2009)CrossRefGoogle Scholar
  2. 2.
    Google Cloud Storage. Accessed 15 Aug 2018
  3. 3.
    IBM Cloud. Accessed 15 Aug 2018
  4. 4.
    Amazon Web Services. Accessed 15 Aug 2018
  5. 5.
    Ardagna, D., Casale, G., Ciavotta, M., Perez, J.F., Wang, W.: Quality-of-service in cloud computing: modeling techniques and their applications. J. Internet Serv. Appl. 5(1), 11 (2014)CrossRefGoogle Scholar
  6. 6.
    Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)MathSciNetCrossRefGoogle Scholar
  7. 7.
    Rabin, M.O.: Efficient dispersal of information for security, load balancing, and fault tolerance. J. ACM (JACM) 36(2), 335–348 (1989)MathSciNetCrossRefGoogle Scholar
  8. 8.
    Lyuu, Y.-D.: Fast fault-tolerant parallel communication and on-line maintenance for hypercubes using information dispersal. Math. Syst. Theory 24, 273–294 (1991)MathSciNetCrossRefGoogle Scholar
  9. 9.
    Sun, H.M., Shieh, S.P.: Optimal information dispersal for increasing the reliability of a distributed service. IEEE Trans. Reliab. 46(4), 462–472 (1997)CrossRefGoogle Scholar
  10. 10.
    Beguin, P., Cresti, A.: General information dispersal algorithms. Theor. Comput. Sci. 209, 87–105 (1998)MathSciNetCrossRefGoogle Scholar
  11. 11.
    Garay, J.A., Gennaro, R., Jutla, C., Rabin, T.: Secure distributed storage and retrieval. Theor. Comput. Sci. 243, 363–389 (2000)MathSciNetCrossRefGoogle Scholar
  12. 12.
    Nakayama, M.K., Yener, B.: Optimal information dispersal for probabilistic latency targets. Comput. Netw. 36, 695–707 (2001)CrossRefGoogle Scholar
  13. 13.
    De Santis, A., Masucci, B.: On information dispersal algorithms. In: Proceedings of IEEE International Symposium on Information Theory, no. 410. IEEE (2002)Google Scholar
  14. 14.
    Bella, G., Pistagna, C., Riccobene, S.: Distributed backup through information dispersal. Electron. Notes Theor. Comput. Sci. 142, 63–67 (2006)CrossRefGoogle Scholar
  15. 15.
    Parakh, A., Kak, S.: Online data storage using implicit security. Inf. Sci. 179, 3323–3331 (2009)CrossRefGoogle Scholar
  16. 16.
    Seiger, R., Groß, S., Schill, A.: SecCSIE: a secure cloud storage integrator for enterprises. In: 2011 IEEE 13th Conference on Commerce and Enterprise Computing (CEC), pp. 252–255. IEEE, Luxembourg (2011)Google Scholar
  17. 17.
    Lin, S.J., Chung, W.-H.: An efficient (n, k) information dispersal algorithm based on fermat number transforms. IEEE Trans. Inf. Forensics Secur. 8(8), 1371–1383 (2013)CrossRefGoogle Scholar
  18. 18.
    Parakh, A., Mahoney, W.: Privacy preserving computations using implicit security. IEEE (2013)Google Scholar
  19. 19.
    Asha, S.I.: Security issues and solutions in cloud computing a survey. Int. J. Comput. Sci. Inf. Secur. (IJCSIS) 14(5), 309–315 (2016)Google Scholar
  20. 20.
    Sighom, J.R.N., Zhang, P., You, L.: Security enhancement for data migration in the cloud. Future Internet 9(23), 23 (2017)CrossRefGoogle Scholar
  21. 21.
    Mar, K.K., Hu, Z., Low, C.Y., Wang, M.: Securing cloud data using information dispersal. In: 2016 14th Annual Conference on Privacy, Security and Trust (PST). IEEE, New Zealand (2016)Google Scholar
  22. 22.
    Pooranian, Z., Chen, K., Yu, C., Conti, M.: RARE: defeating side channels based on data-deduplication in cloud storage. In: IEEE INFOCOM 2018 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 444–449. IEEE, Honolulu (2018)Google Scholar
  23. 23.
    Saaty, T.L.: Theory and applications of the analytic network process: decision making with benefits, opportunities, costs, and risks, 3rd edn. RWS Publications, Pittsburgh (2005)Google Scholar
  24. 24.
    Horowitz, E., Sahni, S.: Computing partitions with applications to the knapsack problem. J. Assoc. Comput. Mach. 21(2), 277–292 (1974)MathSciNetCrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.University Institute of Engineering and TechnologyPanjab UniversityChandigarhIndia

Personalised recommendations