A high performance peer to cloud and peer model augmented with hierarchical secure communications

نویسندگان

  • Zhe Sun
  • Jun Shen
چکیده

This paper presents a secure storage model named Peer to Cloud and Peer (P2CP). P2CP uses the cloud storage system as a backbone storage system. However, when data transmission occurs, the data nodes, cloud user, and the non-cloud user are involved to complete the transaction all together. The users, typically the client peers, can communicate with each other directly, thus bypassing servers on the cloud. Similarly, cloud servers can communicate with each other in a P2P mode. We also introduce a "hierarchy security" method to guarantee the data security in the proposed P2CP storage model. A key feature of our P2CP is that it has three data transmission tunnels: the cloud-user data transmission tunnel, the clients' data transmission tunnel, and the common data transmission tunnel. Assuming that the P2CP model follows the Poisson process or Little's law, we not only mathematically prove that the speed of P2CP is generally better than that of the pure peer-topeer (P2P) model, the peer to server and peer (P2SP) model or the pure cloud model, but also testify the results through simulations. Beyond security, we also investigate the performance of another characteristic of usability of the data storage, namely availability, where P2CP is more robust to the failures of peers or servers in the cloud environment.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure web services using two-way authentication and three-party key establishment for service delivery

With the advance of web technologies, a large quantity of transactions have been processed through web services. Service Provider needs encryption via public communication channel in order that web services can be delivered to Service Requester. Such encryptions can be realized using secure session keys. Traditional approaches which can enable such transactions are based on peer-to-peer archite...

متن کامل

Power and Time Efficient Structural Cloud for Hierarchical Peer to Peer Networking

Cloud computing is a promising profitable infrastructure framework that assures to eradicate the requirement for sustaining expensive computing facilities by companies and institutes alike. Information systems supported on the cloud computing and peer-to-peer (P2P) model are now receiving popularity. In the cloud computing form, a cloud of servers sustain few clients with different types of ser...

متن کامل

A Distributed Authentication Model for an E-Health Network Using Blockchain

Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...

متن کامل

DisTriB: Distributed Trust Management Model Based on Gossip Learning and Bayesian Networks in Collaborative Computing Systems

The interactions among peers in Peer-to-Peer systems as a distributed collaborative system are based on asynchronous and unreliable communications. Trust is an essential and facilitating component in these interactions specially in such uncertain environments. Various attacks are possible due to large-scale nature and openness of these systems that affects the trust. Peers has not enough inform...

متن کامل

A Distributed Authentication Model for an E-Health Network Using Blockchain

Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Journal of Systems and Software

دوره 86  شماره 

صفحات  -

تاریخ انتشار 2013