CFP last date
22 April 2024
Reseach Article

A Unique Approach to Element Management and Secure Cloud Storage Backup for Sensitive Data

Published on December 2011 by Srinivas M N, Srinivas B V, Marx R
Communication and Networks
Foundation of Computer Science USA
COMNETCN - Number 1
December 2011
Authors: Srinivas M N, Srinivas B V, Marx R
93fa00aa-05b0-4692-b83c-00b36d479554

Srinivas M N, Srinivas B V, Marx R . A Unique Approach to Element Management and Secure Cloud Storage Backup for Sensitive Data. Communication and Networks. COMNETCN, 1 (December 2011), 1-5.

@article{
author = { Srinivas M N, Srinivas B V, Marx R },
title = { A Unique Approach to Element Management and Secure Cloud Storage Backup for Sensitive Data },
journal = { Communication and Networks },
issue_date = { December 2011 },
volume = { COMNETCN },
number = { 1 },
month = { December },
year = { 2011 },
issn = 0975-8887,
pages = { 1-5 },
numpages = 5,
url = { /specialissues/comnetcn/number1/5438-1001/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Special Issue Article
%1 Communication and Networks
%A Srinivas M N
%A Srinivas B V
%A Marx R
%T A Unique Approach to Element Management and Secure Cloud Storage Backup for Sensitive Data
%J Communication and Networks
%@ 0975-8887
%V COMNETCN
%N 1
%P 1-5
%D 2011
%I International Journal of Computer Applications
Abstract

With dynamic trends and new developments in hardware and software, and the need to manage them efficiently, designing an Element Management System (EMS) for effective management of Network Element’s (NE) is a challenging task. Small and medium businesses may not have the required skills or resources to manage their EMS. Large businesses may also want to use EMS services from skilled vendors. With the emergence of cloud computing technology, EMS can be provided as a service, i.e., SaaS (software as service) to different customers. As promising as it is, this paradigm also brings forth many new challenges for data security and access control when users outsource confidential and old management data for sharing on public cloud ,i.e., which are not within the same trusted domain. In this proposed scheme, the EMS is provided as a service to different sites of the organization using a private cloud. Sensitive data is stored in the public cloud which comprises of the current configuration of the complete private cloud, important disaster recovery data and management data. This would provide a confidential and secure backup of EMS. This would be useful in the case of natural calamities (tsunami, tornado, earth quake, etc.), terrorist attacks and any other disaster that strikes the private cloud. The clients/data owners, who require management data, can access the data from the public cloud. While accessing data from the public cloud, integrity and confidentiality of the data is preserved by using 2 techniques, namely Attribute Based Encryption (ABE) and Proxy Re-Encryption (PRE).

References
  1. Srinivas.M.N,” An Efficient and Cost-Effective Approach to Manage Network Elements in a Campus like Environment”, International Journal of Advances in Computer Networks and Security, pp.28-32, 2011.
  2. Shucheng Yu,”Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing”.
  3. Xiaosong Wang, ”Studies on Network Management System Framework of Campus Network”, 2nd International Asia Conference on Informatics in Control, Automation and Robotics, pp. 285-289, Car 2010.
  4. Md. Jakir Hossen, Abd Rahman Ramli, and Mohd. Khazani Abdullah,”Web-based Network Device Management Using SNMP Servlet”,IEEE2003.
  5. G. Ateniese, K. Fu, M. Green, and S. Hohenberger, “Improved proxy re-encryption schemes with applications to secure distributed storage,” in Proc. of NDSS’05, 2005.
  6. Hwa-Chun Lin and Chien-Hsing Wang,”Distributed Network Management by HTTP-based remote invocation”, Global Telecomrnunications Conference – Globecorn '99.
  7. S. D. C. di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati, “Over-encryption: Management of access control evolution on outsourced data,” in Proc. of VLDB’07, 2007.
  8. Chien-Chung Shen,”A Network Management Architecture for Battlefield Networks” ATIRP, pp. 1226-1231, IEEE 1997.
  9. G. Mansfield, M. Murtha, K. Higuchi, K. Jayanthi, B.Chakraborty, Y. Nemoto and S.Noguchi,” Network Management In a Large-scale OSI-based Campus Network using SNMP”, IEEE 1992.
  10. Hwa-Chun Lin and Chien-Hsing Wang,”Distributed Network Management by HTTP-based remote invocation”, Global Telecomrnunications Conference – Globecorn '99.
  11. Jae-Kyu Chun, Ki-Yong Cho, Seok-Hyung Cho, Young-Woo Lee and Young-Il Kim,” Network Management Based on PC Communication Platform with SNMP and mobile agents” Proceeding of the 22nd international on Distributed systems workshop,(1CDCSW?02),IEEE 2002.
  12. Amazon Web Services (AWS), Online at http://aws. amazon.com.
  13. Google App Engine, Online at http://code.google.com/appengine/.
  14. Microsoft Azure, http://www.microsoft.com/azure/.
  15. V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of encrypted data,” in Proc. Of CCS’06, 2006.
  16. M. Blaze, G. Bleumer, and M. Strauss, “Divertible protocols and atomic proxy cryptography,” in Proc. of EUROCRYPT ’98, 1998.
  17. Annie Ibrahim rana,”New Roles of Policy –based Management in Home Area Networks-Concepts, Constraints and Challenges”,IEEE 2009.
  18. Jong-Wook Beak,” ATM Customer Network Management Using WWW and CORBA Technologies”. IEEE 1998.
  19. Marcus Burner,“Probabilistic Decentralized Network Management ” , IEEE 2009.
  20. Harry Li and Guangjing Chen,” Wireless LAN Network Management System”,IEEE 2004.
  21. WebNMS Online at http://www.webnms.com
  22. OpenNMS Online at http://www.opennms.com
  23. SNMP4J API Online at http://www.snmp4j.org/
  24. Cloud Online at http://thecloudtutorial.com/
Index Terms

Computer Science
Information Sciences

Keywords

Element Management System Network Element Disaster recovery Attribute Based Encryption Proxy Re-Encryption Disaster Recovery plan mission critical functions