Journal of Information Security

Volume 3, Issue 4 (October 2012)

ISSN Print: 2153-1234   ISSN Online: 2153-1242

Google-based Impact Factor: 3.79  Citations  

Towards a Comprehensive Security Framework of Cloud Data Storage Based on Multi Agent System Architecture

HTML  Download Download as PDF (Size: 332KB)  PP. 295-306  
DOI: 10.4236/jis.2012.34036    6,701 Downloads   11,908 Views  Citations

ABSTRACT

The tremendous growth of the cloud computing environments requires new architecture for security services. Cloud computing is the utilization of many servers/data centers or cloud data storages (CDSs) housed in many different locations and interconnected by high speed networks. CDS, like any other emerging technology, is experiencing growing pains. It is immature, it is fragmented and it lacks standardization. Although security issues are delaying its fast adoption, cloud computing is an unstoppable force and we need to provide security mechanisms to ensure its secure adoption. In this paper a comprehensive security framework based on Multi-Agent System (MAS) architecture for CDS to facilitate confidentiality, correctness assurance, availability and integrity of users' data in the cloud is proposed. Our security framework consists of two main layers as agent layer and CDS layer. Our propose MAS architecture includes main five types of agents: Cloud Service Provider Agent (CSPA), Cloud Data Confidentiality Agent (CDConA), Cloud Data Correctness Agent (CDCorA), Cloud Data Availability Agent (CDAA) and Cloud Data Integrity Agent (CDIA). In order to verify our proposed security framework based on MAS architecture, pilot study is conducted using a questionnaire survey. Rasch Methodology is used to analyze the pilot data. Item reliability is found to be poor and a few respondents and items are identified as misfits with distorted measurements. As a result, some problematic questions are revised and some predictably easy questions are excluded from the questionnaire. A prototype of the system is implemented using Java. To simulate the agents, oracle database packages and triggers are used to implement agent functions and oracle jobs are utilized to create agents.

Share and Cite:

A. Mohamed Talib, R. Atan, R. Abdullah and M. Azrifah Azmi Murad, "Towards a Comprehensive Security Framework of Cloud Data Storage Based on Multi Agent System Architecture," Journal of Information Security, Vol. 3 No. 4, 2012, pp. 295-306. doi: 10.4236/jis.2012.34036.

Cited by

[1] Merjenje uspešnosti prodajnih aktivnosti na osnovi profiliranja in sledenja uporabnikov preko storitev v oblaku
[2] Investigating Cyber Security Awareness Among Preservice Teachers During the COVID-19 Pandemic
European, Mediterranean, and …, 2021
[3] Trust Based Approach and Risk Management for IT Systems in Cloud Service Selection
2020
[4] Agent based information security framework for hybrid cloud computing
2019
[5] Agent Based Information Security Framework for Hybrid Cloud Computing.
2019
[6] A multi-agent system approach based on cryptographic algorithm for securing communications and protecting stored data in the cloud-computing environment
2019
[7] IMPROVED RSYNC ALGORITHM TO MINIMIZE COMMUNICATION COST USING MULTI-AGENT SYSTEMS FOR SYNCHRONIZATION IN MULTI-LEARNING …
2017
[8] Agent Based Information Security Threat Management Framework for Hybrid Cloud Computing
2017
[9] Strategic Cyber-Risk Implications of Cloud Technology Adoption in the US Financial Services Sector
ProQuest Dissertations Publishing, 2017
[10] Big Data Services Security and Security challenges in cloud environment
2016
[11] Improve security and availability for cloud storage
2016
[12] A Survey on Trust Models in Cloud Computing
2016
[13] A Multi Agent System for Secured Storage and Effective Access in Cloud Using Data Mining Approach
Asian Journal of Information Technology, 2016
[14] Modeling Risk Assessment in Computational Grid Using Machine Learning Techniques
2016
[15] Software Agent and Cloud Forensics: A Conceptual Framework
International Journal of Computers , 2016
[16] An Integrated Framework of Multi Software Agent and Cloud Forensics
WSEAS TRANSACTIONS on COMPUTER RESEARCH, 2016
[17] ﮐﺑﺷﻟا ﺔﻣوظﻧﻣ ﻲﻓ رطﺎﺧﻣﻟا مﯾﯾﻘﺗ ﺔﯾﺑﺳوﺣﻟا ﺔ ﺑﺎ ﺔﻟﻵا مﻟﻌﺗ قرط مادﺧﺗﺳ‎
2016
[18] A Model of Online Assessment and Teaching Monitoring for Learning Management System to Improve Learning Cognitive Skills
2015
[19] A Proxy-Based Data Security Solution in Mobile Cloud
International Journal of Security and Its Applications, 2015
[20] Preface: Agents and semantic techniques as pillars of the as-a-service paradigm
2015
[21] A Proxy-Based Data Security Solution in Mobile Cloud.
International Journal of Security & Its Applications, 2015
[22] A GUIDELINE TO IMPROVE THE INFORMATION ASSURANCE IN CLOUD COMPUTING
International Journal of Social Science & Interdisciplinary Research, 2015
[23] Technological Change and Employee Motivation in a Telecom Operations Team
Walden Dissertations and Doctoral Studies, 2015
[24] Privacy Proof of Data Transportability from one Cloud to another Cloud Service Provider
2015
[25] Addressing Data Security and Performance Issues on the Cloud
International Journal of Computer Applications, 2014
[26] Multi Agent System-Based on Case Based Reasoning for Cloud Computing System
APJ, 2014
[27] Secure the Cloud Storage and Recovery of Security Risks and Problems in Single Cloud.
S Chekuri, SS Reddy - sites.ijrit.com, 2014
[28] Review on multi-agent system collaboration in learning management system domain by deploying wireless sensor networks for student location detection
Journal of Computer Science, 2014
[29] Data Storage Security in Cloud Computing
2013
[30] Data Storage Security in Cloud Computing: A survey
2013
[31] 基于可信代理的访问控制模型
武汉大学学报: 理学版, 2013
[32] An integrated framework for evaluating big-data storage solutions-IDA case study
Science and Information Conference (SAI), 2013. IEEE, 2013
[33] Data Storage Security in Cloud Computing-A Survey
International Journal of Advanced Research in Computer Science and Software Engineering, 2013

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.