Abstract
As cloud computing has developed and gained in popularity, people and businesses have quickly adapted to using cloud services for a variety of purposes. The fundamental driver of this movement is the abundance of advantages offered by cloud services, including their low pricing, high computing power, and online storage capabilities. However, security issues namely, malicious attacks, information loss, and system disasters are affecting the customer satisfaction level. To avoid these security issues, data security and recovery concepts are introduced. Here, the data security is achieved by hybrid cryptography technique and data recovery is achieved by adaptive coati optimization (ACO) algorithm. The presented system consists of four modules namely, (i) Secure file uploading (ii) Replica generation (iii) Data backup, and (iv) Retrieval. At first, we encrypt the medical data using hybrid cipher policy attribute-based encryption. Using this technique we can improve the confidentiality of the medical data. Then, we divide the encrypted medical data into several files and upload the file into the equivalent virtual machine using the ACO algorithm. The replica is then created based on the bandwidth of each file. Then, the user query-based files are backup and retrieved based on replicas. The effectiveness of the presented technique is analysed based on different metrics.
Similar content being viewed by others
Availability of data and material
Data sharing is not applicable to this article because of proprietary nature.
Code availability
Code sharing is not applicable to this article because of proprietary nature.
References
Aceto G, Persico V, Pescapé A (2020) Industry 4.0 and health: internet of things, big data, and cloud computing for healthcare 4.0. J Ind Inf Integrtion 18:100129
Khanom T (2017) Cloud accounting: a theoretical overview. IOSR J Bus Manag 19(6):31–38
Liu CH, Lin FQ, Chiang DL, Chen TL, Chen CS, Lin HY, Chung YF, Chen TS (2013) Secure PHR access control scheme for healthcare application clouds. In: 2013 42nd International conference on parallel processing. IEEE, pp 1067–1076
Qi S, Zheng Y, Li M, Liu Y, Qiu J (2016) Scalable industry data access control in RFID-enabled supply chain. IEEE/ACM Trans Netw 24(6):3551–3564
Gunawi HS, Hao M, Suminto RO, Laksono A, Satria AD, Adityatama J, Eliazar KJ (2016) Why does the cloud stop computing? Lessons from hundreds of service outages. In: Proceedings of the Seventh ACM Symposium on Cloud Computing, pp 1–16
Qi S, Zheng Y (2019) Crypt-DAC: cryptographically enforced dynamic access control in the Cloud. IEEE Trans Depend Secure Comput 18(2):765–779
Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D (2007) Provable data possession at untrusted stores. In: Proceedings of the 14th ACM conference on Computer and communications security, pp 598–609
Juels A, Kaliski Jr, BS (2007) PORs: proofs of retrievability for large files. In: Proceedings of the 14th ACM conference on Computer and communications security pp 584–597
Erway CC, Küpçü A, Papamanthou C, Tamassia R (2015) Dynamic provable data possession. ACM Trans Inf Syst Secur (TISSEC) 17(4):1–29
Wang Q, Wang C, Li J, Ren K, Lou W (2009) Enabling public verifiability and data dynamics for storage security in cloud computing. In: Computer Security–ESORICS 2009: 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21–23, 2009. Proceedings 14, Springer Berlin Heidelberg, pp 355–370
Rajak A, Tripathi R (2023) DL-SkLSTM approach for cyber security threats detection in 5G enabled IIoT. Int J Inf Technol 1–8
Singhal D, Ahuja L, Seth A (2023) POSMETER: proof-of-stake blockchain for enhanced smart meter data security. Int J Inf Technol 1–14
Sahi A, Lai D, Li Y (2016) Security and privacy preserving approaches in the eHealth clouds with disaster recovery plan. Comput Biol Med 78:1–8
Chang D, Li L, Chang Y, Qiao Z (2021) Cloud computing storage backup and recovery strategy based on secure IoT and spark. Mob Inf Syst 2021:1–13
Jiang T, Meng W, Yuan X, Wang L, Ge J, Ma J (2021) ReliableBox: secure and verifiable cloud storage with location-aware backup. IEEE Trans Parallel Distrib Syst 32(12):2996–3010
Logeshwaran J, Ramesh G, Aravindarajan V (2023) A secured database monitoring method to improve data backup and recovery operations in cloud computing. BOHR Int J Comput Sci 2(1):1–7
Chang V (2015) Towards a big data system disaster recovery in a private cloud. Ad Hoc Netw 35:65–82
Alsubaei F, Abuhussein A, Shandilya V, Shiva S (2019) IoMT-SAF: internet of medical things security assessment framework. Internet of Things 8:100123
Yue X, Wang H, Jin D, Li M, Jiang W (2016) Healthcare data gateways: found healthcare intelligence on blockchain with novel privacy risk control. J Med Syst 40:1–8
Liu CH, Lin FQ, Chen CS, Chen TS (2015) Design of secure access control scheme for personal health record-based cloud healthcare service. Secur Commun Netw 8(7):1332–1346
Kumar A (2023) Detection and prevention of DDoS attacks on edge computing of IoT devices through reinforcement learning. Int J Inf Technol 1–12
Kaur R, Laxmi V, Balkrishan (2022) Performance evaluation of task scheduling algorithms in virtual cloud environment to minimize makespan. Int J Inf Technol 1–15
Abur M, Junaidu S, Obiniyi A (2022) Personal identifiable information privacy model for securing of users’ attributes transmitted to a federated cloud environment. Int J Inf Technol 14(1):421–435
Funding
The authors declare that they have competing interests and funding.
Author information
Authors and Affiliations
Contributions
All authors read and approved the final manuscript.
Corresponding author
Ethics declarations
Conflict of interest
On behalf of all authors, the corresponding author states that there is no conflict of interest.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Vinothkumar, S., Amutharaj, J. Secure aware disaster recovery in cloud using an adaptive coati optimization algorithm. Int. j. inf. tecnol. (2024). https://doi.org/10.1007/s41870-024-01790-5
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s41870-024-01790-5