Call for Paper - July 2022 Edition
IJCA solicits original research papers for the July 2022 Edition. Last date of manuscript submission is June 20, 2022. Read More

A Unique Approach to Element Management and Secure Cloud Storage Backup for Sensitive Data

Print
PDF
IJCA Special Issue on Communication and Networks
© 2011 by IJCA Journal
comnetcn - Number 1
Year of Publication: 2011
Authors:
Srinivas M N
Srinivas B V
Marx R

Srinivas M N, Srinivas B V and Marx R. Article: A Unique Approach to Element Management and Secure Cloud Storage Backup for Sensitive Data. IJCA Special Issue on Communication and Networks comnetcn(1):1-5, December 2011. Full text available. BibTeX

@article{key:article,
	author = {Srinivas M N and Srinivas B V and Marx R},
	title = {Article: A Unique Approach to Element Management and Secure Cloud Storage Backup for Sensitive Data},
	journal = {IJCA Special Issue on Communication and Networks},
	year = {2011},
	volume = {comnetcn},
	number = {1},
	pages = {1-5},
	month = {December},
	note = {Full text available}
}

Abstract

With dynamic trends and new developments in hardware and software, and the need to manage them efficiently, designing an Element Management System (EMS) for effective management of Network Element’s (NE) is a challenging task. Small and medium businesses may not have the required skills or resources to manage their EMS. Large businesses may also want to use EMS services from skilled vendors. With the emergence of cloud computing technology, EMS can be provided as a service, i.e., SaaS (software as service) to different customers. As promising as it is, this paradigm also brings forth many new challenges for data security and access control when users outsource confidential and old management data for sharing on public cloud ,i.e., which are not within the same trusted domain. In this proposed scheme, the EMS is provided as a service to different sites of the organization using a private cloud. Sensitive data is stored in the public cloud which comprises of the current configuration of the complete private cloud, important disaster recovery data and management data. This would provide a confidential and secure backup of EMS. This would be useful in the case of natural calamities (tsunami, tornado, earth quake, etc.), terrorist attacks and any other disaster that strikes the private cloud. The clients/data owners, who require management data, can access the data from the public cloud. While accessing data from the public cloud, integrity and confidentiality of the data is preserved by using 2 techniques, namely Attribute Based Encryption (ABE) and Proxy Re-Encryption (PRE).

References

  • Srinivas.M.N,” An Efficient and Cost-Effective Approach to Manage Network Elements in a Campus like Environment”, International Journal of Advances in Computer Networks and Security, pp.28-32, 2011.
  • Shucheng Yu,”Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing”.
  • Xiaosong Wang, ”Studies on Network Management System Framework of Campus Network”, 2nd International Asia Conference on Informatics in Control, Automation and Robotics, pp. 285-289, Car 2010.
  • Md. Jakir Hossen, Abd Rahman Ramli, and Mohd. Khazani Abdullah,”Web-based Network Device Management Using SNMP Servlet”,IEEE2003.
  • G. Ateniese, K. Fu, M. Green, and S. Hohenberger, “Improved proxy re-encryption schemes with applications to secure distributed storage,” in Proc. of NDSS’05, 2005.
  • Hwa-Chun Lin and Chien-Hsing Wang,”Distributed Network Management by HTTP-based remote invocation”, Global Telecomrnunications Conference – Globecorn '99.
  • S. D. C. di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati, “Over-encryption: Management of access control evolution on outsourced data,” in Proc. of VLDB’07, 2007.
  • Chien-Chung Shen,”A Network Management Architecture for Battlefield Networks” ATIRP, pp. 1226-1231, IEEE 1997.
  • G. Mansfield, M. Murtha, K. Higuchi, K. Jayanthi, B.Chakraborty, Y. Nemoto and S.Noguchi,” Network Management In a Large-scale OSI-based Campus Network using SNMP”, IEEE 1992.
  • Hwa-Chun Lin and Chien-Hsing Wang,”Distributed Network Management by HTTP-based remote invocation”, Global Telecomrnunications Conference – Globecorn '99.
  • Jae-Kyu Chun, Ki-Yong Cho, Seok-Hyung Cho, Young-Woo Lee and Young-Il Kim,” Network Management Based on PC Communication Platform with SNMP and mobile agents” Proceeding of the 22nd international on Distributed systems workshop,(1CDCSW?02),IEEE 2002.
  • Amazon Web Services (AWS), Online at http://aws. amazon.com.
  • Google App Engine, Online at http://code.google.com/appengine/.
  • Microsoft Azure, http://www.microsoft.com/azure/.
  • V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of encrypted data,” in Proc. Of CCS’06, 2006.
  • M. Blaze, G. Bleumer, and M. Strauss, “Divertible protocols and atomic proxy cryptography,” in Proc. of EUROCRYPT ’98, 1998.
  • Annie Ibrahim rana,”New Roles of Policy –based Management in Home Area Networks-Concepts, Constraints and Challenges”,IEEE 2009.
  • Jong-Wook Beak,” ATM Customer Network Management Using WWW and CORBA Technologies”. IEEE 1998.
  • Marcus Burner,“Probabilistic Decentralized Network Management ” , IEEE 2009.
  • Harry Li and Guangjing Chen,” Wireless LAN Network Management System”,IEEE 2004.
  • WebNMS Online at http://www.webnms.com
  • OpenNMS Online at http://www.opennms.com
  • SNMP4J API Online at http://www.snmp4j.org/
  • Cloud Online at http://thecloudtutorial.com/