Skip to main content
Log in

Secure aware disaster recovery in cloud using an adaptive coati optimization algorithm

  • Original Research
  • Published:
International Journal of Information Technology Aims and scope Submit manuscript

Abstract

As cloud computing has developed and gained in popularity, people and businesses have quickly adapted to using cloud services for a variety of purposes. The fundamental driver of this movement is the abundance of advantages offered by cloud services, including their low pricing, high computing power, and online storage capabilities. However, security issues namely, malicious attacks, information loss, and system disasters are affecting the customer satisfaction level. To avoid these security issues, data security and recovery concepts are introduced. Here, the data security is achieved by hybrid cryptography technique and data recovery is achieved by adaptive coati optimization (ACO) algorithm. The presented system consists of four modules namely, (i) Secure file uploading (ii) Replica generation (iii) Data backup, and (iv) Retrieval. At first, we encrypt the medical data using hybrid cipher policy attribute-based encryption. Using this technique we can improve the confidentiality of the medical data. Then, we divide the encrypted medical data into several files and upload the file into the equivalent virtual machine using the ACO algorithm. The replica is then created based on the bandwidth of each file. Then, the user query-based files are backup and retrieved based on replicas. The effectiveness of the presented technique is analysed based on different metrics.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Availability of data and material

Data sharing is not applicable to this article because of proprietary nature.

Code availability

Code sharing is not applicable to this article because of proprietary nature.

References

  1. Aceto G, Persico V, Pescapé A (2020) Industry 4.0 and health: internet of things, big data, and cloud computing for healthcare 4.0. J Ind Inf Integrtion 18:100129

    Google Scholar 

  2. Khanom T (2017) Cloud accounting: a theoretical overview. IOSR J Bus Manag 19(6):31–38

    Article  Google Scholar 

  3. Liu CH, Lin FQ, Chiang DL, Chen TL, Chen CS, Lin HY, Chung YF, Chen TS (2013) Secure PHR access control scheme for healthcare application clouds. In: 2013 42nd International conference on parallel processing. IEEE, pp 1067–1076

  4. Qi S, Zheng Y, Li M, Liu Y, Qiu J (2016) Scalable industry data access control in RFID-enabled supply chain. IEEE/ACM Trans Netw 24(6):3551–3564

    Article  Google Scholar 

  5. Gunawi HS, Hao M, Suminto RO, Laksono A, Satria AD, Adityatama J, Eliazar KJ (2016) Why does the cloud stop computing? Lessons from hundreds of service outages. In: Proceedings of the Seventh ACM Symposium on Cloud Computing, pp 1–16

  6. Qi S, Zheng Y (2019) Crypt-DAC: cryptographically enforced dynamic access control in the Cloud. IEEE Trans Depend Secure Comput 18(2):765–779

    Article  Google Scholar 

  7. Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D (2007) Provable data possession at untrusted stores. In: Proceedings of the 14th ACM conference on Computer and communications security, pp 598–609

  8. Juels A, Kaliski Jr, BS (2007) PORs: proofs of retrievability for large files. In: Proceedings of the 14th ACM conference on Computer and communications security pp 584–597

  9. Erway CC, Küpçü A, Papamanthou C, Tamassia R (2015) Dynamic provable data possession. ACM Trans Inf Syst Secur (TISSEC) 17(4):1–29

    Article  Google Scholar 

  10. Wang Q, Wang C, Li J, Ren K, Lou W (2009) Enabling public verifiability and data dynamics for storage security in cloud computing. In: Computer Security–ESORICS 2009: 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21–23, 2009. Proceedings 14, Springer Berlin Heidelberg, pp 355–370

  11. Rajak A, Tripathi R (2023) DL-SkLSTM approach for cyber security threats detection in 5G enabled IIoT. Int J Inf Technol 1–8

  12. Singhal D, Ahuja L, Seth A (2023) POSMETER: proof-of-stake blockchain for enhanced smart meter data security. Int J Inf Technol 1–14

  13. Sahi A, Lai D, Li Y (2016) Security and privacy preserving approaches in the eHealth clouds with disaster recovery plan. Comput Biol Med 78:1–8

    Article  Google Scholar 

  14. Chang D, Li L, Chang Y, Qiao Z (2021) Cloud computing storage backup and recovery strategy based on secure IoT and spark. Mob Inf Syst 2021:1–13

    Google Scholar 

  15. Jiang T, Meng W, Yuan X, Wang L, Ge J, Ma J (2021) ReliableBox: secure and verifiable cloud storage with location-aware backup. IEEE Trans Parallel Distrib Syst 32(12):2996–3010

    Article  Google Scholar 

  16. Logeshwaran J, Ramesh G, Aravindarajan V (2023) A secured database monitoring method to improve data backup and recovery operations in cloud computing. BOHR Int J Comput Sci 2(1):1–7

    Article  Google Scholar 

  17. Chang V (2015) Towards a big data system disaster recovery in a private cloud. Ad Hoc Netw 35:65–82

    Article  Google Scholar 

  18. Alsubaei F, Abuhussein A, Shandilya V, Shiva S (2019) IoMT-SAF: internet of medical things security assessment framework. Internet of Things 8:100123

    Article  Google Scholar 

  19. Yue X, Wang H, Jin D, Li M, Jiang W (2016) Healthcare data gateways: found healthcare intelligence on blockchain with novel privacy risk control. J Med Syst 40:1–8

    Article  Google Scholar 

  20. Liu CH, Lin FQ, Chen CS, Chen TS (2015) Design of secure access control scheme for personal health record-based cloud healthcare service. Secur Commun Netw 8(7):1332–1346

    Article  Google Scholar 

  21. Kumar A (2023) Detection and prevention of DDoS attacks on edge computing of IoT devices through reinforcement learning. Int J Inf Technol 1–12

  22. Kaur R, Laxmi V, Balkrishan (2022) Performance evaluation of task scheduling algorithms in virtual cloud environment to minimize makespan. Int J Inf Technol 1–15

  23. Abur M, Junaidu S, Obiniyi A (2022) Personal identifiable information privacy model for securing of users’ attributes transmitted to a federated cloud environment. Int J Inf Technol 14(1):421–435

    Google Scholar 

Download references

Funding

The authors declare that they have competing interests and funding.

Author information

Authors and Affiliations

Authors

Contributions

All authors read and approved the final manuscript.

Corresponding author

Correspondence to S. Vinothkumar.

Ethics declarations

Conflict of interest

On behalf of all authors, the corresponding author states that there is no conflict of interest.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Vinothkumar, S., Amutharaj, J. Secure aware disaster recovery in cloud using an adaptive coati optimization algorithm. Int. j. inf. tecnol. (2024). https://doi.org/10.1007/s41870-024-01790-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s41870-024-01790-5

Keywords

Navigation