An Effective Approach for Improving Data Access Time using Intelligent Node Selection Model (INSM) in Cloud Computing Environment

International Journal of Electrical and Electronics Engineering
© 2023 by SSRG - IJEEE Journal
Volume 10 Issue 5
Year of Publication : 2023
Authors : K. Rajalakshmi, M. Sambath, Linda Joseph, K. Ramesh, R. Surendiran
pdf
How to Cite?

K. Rajalakshmi, M. Sambath, Linda Joseph, K. Ramesh, R. Surendiran, "An Effective Approach for Improving Data Access Time using Intelligent Node Selection Model (INSM) in Cloud Computing Environment," SSRG International Journal of Electrical and Electronics Engineering, vol. 10,  no. 5, pp. 174-184, 2023. Crossref, https://doi.org/10.14445/23488379/IJEEE-V10I5P116

Abstract:

This Cloud environment offers users friendly services that assist them in achieving their professional and personal objectives. Any personal computer or other device with a broadband connection can access the data. The data can be an image file or a document etc. To protect such data from illegal access, proper security measures must be adopted so that the data resides safe and secure in a third party premise. The centremost node always has the lesser possibility of being hacked, leaving the data to be secure aside. Also, the central nodes have improved retrieval time. This study aims to propose an Intelligent Node Selection Model (INSM) comprising centrality measure and choosing the centre most stable nodes with less energy and security cost in the network for placing the data fragments so that the access time gets improved and node failure is significantly reduced. Improving the client success ratio gives the customer a sense of satisfaction. The cost estimation is high as it includes more parameters than the existing one. The different cost estimation at various stages of the Intelligent Node Selection Model (INSM) is compared with the existing node selection mechanism, the Optimal Selection Model. The average cost of node selection is approximately 1.1% higher than the Optimal Selection model as the cost of nodes in the INSM model is incurred for calculating the degree of centrality and node ranking to determine the success probability, security cost and energy cost. Thus, the node access time is better, and the failure of nodes also gets reduced so that the user will have safe access to data. Calculating the degree centrality of all the nodes in a network takes Θ(V2 ) time, and for edges, Θ(E) where V is the vertices and E are the edges.

Keywords:

Centrality measure, Cloud service provider, Degree centrality, Node access time, Node rank, Stable nodes.

References:

[1] Ahmed E. Abdel Raouf, Nagwa L. Badr, and Mohamed F. Tolba, “Dynamic Data Reallocation and Replication over a Cloud Environment,” Concurrency and Computation: Practice and Experience, vol. 30, no. 13, 2018.
[CrossRef][Google Scholar][Publisher Link]
[2] Ketan Bhardwaj et al., “Addressing the Fragmentation Problem in Distributed and Decentralized Edge Computing: A Vision,” In IEEE International Conference on Cloud Engineering, pp. 156-167, 2019.
[CrossRef][Google Scholar][Publisher Link]
[3] R. Dhaya, R. Kanthavel, and Kanagaraj Venusamy, “Cloud Computing Security Protocol Analysis with Parity-Based Distributed File System,” Annals of Operations Research, pp.1-20, 2021.
[CrossRef][Google Scholar][Publisher Link]
[4] K. Dhinakaran et al., “Enhance Hybrid Cloud Security using Vulnerability Management,” In International Conference on Soft Computing and Pattern Recognition, vol. 614, pp. 480-489, 2016.
[CrossRef][Google Scholar][Publisher Link]
[5] S. V. Divya, R. S. Shaji, and P. Venkadesh, “An Efficient Data Storage and Forwarding Mechanism using Fragmentation-Replication and DADR Protocol for Enhancing the Security in Cloud,” Journal of Computational and Theoretical Nanoscience, vol. 15, no. 1, pp. 111-120, 2018.
[CrossRef][Google Scholar][Publisher Link]
[6] K. Rajalakshmi, M. Sambath, and L. Joseph, “Improving File Storage Mechanism using Intelligent Data Fragmentation Model (IDFM) Algorithm and Providing Confidentiality of Data in Cloud Computing Environment,” International Journal of Engineering Trends and Technology, vol. 71, no. 3, pp. 130-142, 2023.
[CrossRef][Publisher Link]
[7] Suji Gopinath, and Elizabeth Sherly, “A Comprehensive Survey on Data Replication Techniques in Cloud Storage Systems,” International Journal of Applied Engineering Research, vol. 13, no. 22, pp. 15926-15932, 2018.
[Google Scholar][Publisher Link]
[8] Nurudeen Mahmud Ibrahim, and Anazida Zainal, “A Feature Selection Technique for CLOUD IDS using Ant Colony Optimization and Decision Tree,” Advanced Science Letters, vol. 23, no. 9, pp. 9163-9169, 2017.
[CrossRef][Google Scholar][Publisher Link]
[9] Nesrine Kaaniche, and Maryline Laurent, “Data Security and Privacy Preservation in Cloud Storage Environments Based on Cryptographic Mechanisms,” Computer Communications, vol. 111, pp. 120-141, 2017.
[CrossRef][Google Scholar][Publisher Link]
[10] Mohammad Javad Abbasi, and Mehrdad Mohri, “Scheduling Tasks in the Cloud Computing Environment with the Effect of Cuckoo Optimization Algorithm,” SSRG International Journal of Computer Science and Engineering, vol. 3, no. 8, pp. 1-9, 2016.
[CrossRef][Google Scholar][Publisher Link]
[11] Hakim Jebari, Siham Rekiek, and Kamal Reklaoui, “Improvement of Nature-Based Optimization Methods for Solving Job shop Scheduling Problems,” International Journal of Engineering Trends and Technology, vol. 71, no. 3, pp. 312-324, 2023.
[CrossRef][Google Scholar][Publisher Link]
[12] Rahul Vishwanath Kale, Bharadwaj Veeravalli, and Xiaoli Wang, “Design and Performance Characterization of Practically Realizable Graph-Based Security Aware Algorithms for Hierarchical and Non-Hierarchical Cloud Architectures,” In International Conference on Frontier Computing, Singapore, vol. 464, pp. 392-402, 2017.
[CrossRef][Google Scholar][Publisher Link]
[13] Samira Kanwal et al., “Head Node Selection Algorithm in Cloud Computing Data Center,” Mathematical Problems in Engineering, vol. 2021, 2021.
[CrossRef][Google Scholar][Publisher Link]
[14] Mihir Manek et al., “Cloud Oriented Distributed and Encrypted File Storage (CODE-FS),” In Fourth International Conference on Computing Communication Control and Automation, pp. 1-5, 2018.
[CrossRef][Google Scholar][Publisher Link]
[15] Gunasekaran Manogaran, Chandu Thota, and M. Vijay Kumar, “Meta Cloud Data Storage Architecture for Big Data Security in Cloud Computing,” Procedia Computer Science, vol. 87, pp.128-133, 2016.
[CrossRef][Google Scholar][Publisher Link]
[16] N. Mansouri, M. M. Javidi, and B. Mohammad Hasani Zade, “A CSO-Based Approach for Secure Data Replication in Cloud Computing Environment,” The Journal of Supercomputing, vol. 77, no. 6, pp. 5882-5933, 2021.
[CrossRef][Google Scholar][Publisher Link]
[17] R. Navinkumar, and R. Ramamoorthy, “Improve Resource Allocation for Cloud Computing Environment,” International Journal of P2P Network Trends and Technology, vol. 6, no. 2, pp. 12-19, 2016.
[CrossRef][Publisher Link]
[18] Muzammil H. Mohammed, and Faiz Baothman, “A Study on Methods to Improve Efficiency of Cloud Computing,” International Journal of Computer and Organization Trends, vol. 10, no. 2, pp. 13-17, 2020.
[CrossRef][Publisher Link]
[19] Imad Eddine Miloudi, Belabbas Yagoubi, and Fatima Zohra Bellounar, “Dynamic Replication Based on a Data Classification Model in Cloud Computing,” In International Symposium on Modelling and Implementation of Complex Systems, vol. 156, pp. 3-17, 2020.
[CrossRef][Google Scholar][Publisher Link]
[20] W. Delishiya Moral, and B. Muthu Kumar, “Improve the Data Retrieval Time and Security through Fragmentation and Replication in the Cloud,” In International Conference on Advanced Communication Control and Computing Technologies, pp. 539-545, 2016.
[CrossRef][Google Scholar][Publisher Link]
[21] Andrea Li, “Privacy, Security and Trust Issues in Cloud Computing,” SSRG International Journal of Computer Science and Engineering, vol. 6, no. 10, pp. 29-32, 2019.
[CrossRef][Google Scholar][Publisher Link]
[22] K. Rajalakshmi, M. Sambath, and Linda Joseph, “Towards Improving Cloud Security and Performance by using Proposed Controlled Replication Model,” In International Conference on Computer, Power and Communications, pp. 12-16, 2022.
[CrossRef][Google Scholar][Publisher Link]
[23] S. Ravichandran, R. Benjohnson, and K. Ramanathan, “Design and Development of Honey Bee Behavior Excited Modern Quality Constructed Entry Controller using Bell-Lapadula Paradigm in Cloud Computing Methodology,” International Journal of Recent Engineering Science, vol. 7, no. 2, pp. 1-7, 2020.
[CrossRef][Google Scholar][Publisher Link]
[24] Sandeep Kumar Polu, “Security Enhancement for Data Objects in Cloud Computing,” International Journal for Innovative Research in Science and Technology, vol. 5, no. 6, pp. 18-21, 2018.
[Google Scholar][Publisher Link]
[25] I. Lakshmi, “A Review On Security In Mobile Cloud Computing,” SSRG International Journal of Mobile Computing and Application, vol. 6, no. 2, pp. 4-11, 2019.
[CrossRef][Publisher Link]
[26] Muzammil H Mohammed, and Faiz Baothman, “Intelligent Workload Management of Computing Resource Allocation For Mobile Cloud Computing,” International Journal of Computer & Organization Trends, vol. 5, no. 2, pp. 30-39, 2015.
[CrossRef][Google Scholar][Publisher Link]
[27] T. Prasuna et al., “A Novel Approach for Improved Data Replication using HDFS,” In 3rd IEEE International Conference on Recent Trends in Electronics, Information and Communication Technology, pp. 854-859, 2018.
[CrossRef][Google Scholar][Publisher Link]
[28] K. Rajalakshmi, K. Ramesh, and P. N. Renjith, “Comparative Study of Cryptographic Algorithms in Cloud Storage Data security,” In 2nd International Conference on Intelligent Technologies, pp. 1-7, 2022.
[CrossRef][Google Scholar][Publisher Link]
[29] Richa Kunal Sharma, and Nalini Kant Joshi, “Security and Privacy Problems in Cloud Computing,” International Journal of Computer and Organization Trends, vol. 9, no. 4, pp. 30-39, 2019.
[CrossRef][Publisher Link]
[30] M. Ramanan, and P. Vivekanandan, “Efficient Data Integrity and Data Replication in the Cloud using Stochastic Diffusion Method,” Cluster Computing, vol. 22, no. 6, pp. 14999-15006, 2019.
[CrossRef][Google Scholar][Publisher Link]
[31] Anand Prakash Singh, and Arjun Choudhary, “Approach for Ensuring Fragmentation and Integrity of Data in SEDuLOUS,” In Proceedings of Second International Conference on Computing, Communications, and Cyber-Security, vol. 203, pp. 857-869, 2021.
[CrossRef][Google Scholar][Publisher Link]
[32] M. A. Sivasankari, M. D. Abirami, and M. K. Ayesha, “Division and Replication of Data in Cloud for Optimal Performance and Security using Fragment Placement Algorithm,” International Research Journal of Advanced Engineering and Science, vol. 1, no. 4, pp. 57-63, 2016.
[Google Scholar][Publisher Link]
[33] R. Sugumar, A. Rajesh, and R. Manivannan, “Performance Analysis of Fragmentation and Replicating Data Over Multi-clouds with Security,” In International Conference on Computer Networks and Communication Technologies, Singapore, vol. 15, pp. 1031-1040, 2019.
[CrossRef][Google Scholar][Publisher Link]
[34] Fursan Thabit et al., “A New Lightweight Cryptographic Algorithm for Enhancing Data Security in Cloud Computing,” Global Transitions Proceedings, vol. 2, no. 1, pp. 91-99, 2021.
[CrossRef][Google Scholar][Publisher Link]