Uma estratégia paralela e distribuída para assegurar a confidencialidade de dados armazenados em nuvem

Detalhes bibliográficos
Ano de defesa: 2017
Autor(a) principal: Dantas, Lucas Moura
Orientador(a): Monteiro Filho, José Maria da Silva
Banca de defesa: Não Informado pela instituição
Tipo de documento: Dissertação
Tipo de acesso: Acesso aberto
Idioma: por
Instituição de defesa: Não Informado pela instituição
Programa de Pós-Graduação: Não Informado pela instituição
Departamento: Não Informado pela instituição
País: Não Informado pela instituição
Palavras-chave em Português:
Link de acesso: http://www.repositorio.ufc.br/handle/riufc/38718
Resumo: Nowadays, the storage of large amounts of confidential data in cloud servers is a common practice, since such strategy allows to reduce costs and also increases data availability. However, in cloud computing environment, data control is no longer owned by its legitimated user, becoming a storage service provider responsability. Such scenario gives rise to new challenges related to privacy, security and confidentiality. At this context, different solutions have been proposed for ensuring the confidentiality of the cloud stored data. In generall, such approaches are based on cryptography, data fragmentation or a combination of these two methodologies. Recently, a new approach, denoted QSM-EXTRACTION, has been proposed. The QSM-EXTRACTION strategy is based on the fragmentation of a digital file into fragments named information objects, on the decomposition of these objects through the extraction of some features and on the dispersion of these features in different cloud storage services. However, despite being developed for cloud computing environment, QSM-EXTRACTION method adopts a centralized execution approach, which may compromise the performance of the decomposition step. At the present work, we propose a paralell and distributed version of the QSM-EXTRACTION strategy, named pdQSM-EXTRACTION, which exploits the MapReduce paradigm aiming to provide a higher efficiency for the process of extracting features from information objects. The pdQSM-EXTRACTION approach has been implemented in Scala language programming, using Apache Spark framework. Several computing experiments and simulations have been performed aiming to evaluate the proposed approach. The obtained results, considering file sizes greater than or equal to 4GB, show that pdQSM-EXTRACTION strategy presents better performance than the one obtained by the QSM-EXTRACTION strategy, evaluated by computing the input time, defined as the total time spent to decompose a given file generating three other files containing the characteristics of quality, quantity and measurement. Thus, considering the processing of files whose sizes are greater than or equal to 4GB and the addition of one or more slave nodes by the pdQSM-EXTRACTION strategy, the ratio between the input time obtained by the pdQSM-EXTRACTION strategy and the input time obtained by the QSM-EXTRACTION strategy presented minimum and maximum values respectively of 53.57 % and 95.83 %. Therefore, we achieve to demonstrate the feasibility of pdQSM-EXTRACTION approach for applications involving large data volumes.
id UFC-7_be48308b2ccf2034aaa5da9bea2cf4be
oai_identifier_str oai:repositorio.ufc.br:riufc/38718
network_acronym_str UFC-7
network_name_str Repositório Institucional da Universidade Federal do Ceará (UFC)
repository_id_str
spelling Dantas, Lucas MouraMadeiro, João Paulo do ValeMonteiro Filho, José Maria da Silva2019-01-08T16:25:27Z2019-01-08T16:25:27Z2017DANTAS, Lucas Moura. Uma estratégia paralela e distribuída para assegurar a confidencialidade de dados armazenados em nuvem. 2017. 140 f. Dissertação (Mestrado em Ciência da Computação) - Universidade Federal do Ceará, Fortaleza, 2017.http://www.repositorio.ufc.br/handle/riufc/38718Nowadays, the storage of large amounts of confidential data in cloud servers is a common practice, since such strategy allows to reduce costs and also increases data availability. However, in cloud computing environment, data control is no longer owned by its legitimated user, becoming a storage service provider responsability. Such scenario gives rise to new challenges related to privacy, security and confidentiality. At this context, different solutions have been proposed for ensuring the confidentiality of the cloud stored data. In generall, such approaches are based on cryptography, data fragmentation or a combination of these two methodologies. Recently, a new approach, denoted QSM-EXTRACTION, has been proposed. The QSM-EXTRACTION strategy is based on the fragmentation of a digital file into fragments named information objects, on the decomposition of these objects through the extraction of some features and on the dispersion of these features in different cloud storage services. However, despite being developed for cloud computing environment, QSM-EXTRACTION method adopts a centralized execution approach, which may compromise the performance of the decomposition step. At the present work, we propose a paralell and distributed version of the QSM-EXTRACTION strategy, named pdQSM-EXTRACTION, which exploits the MapReduce paradigm aiming to provide a higher efficiency for the process of extracting features from information objects. The pdQSM-EXTRACTION approach has been implemented in Scala language programming, using Apache Spark framework. Several computing experiments and simulations have been performed aiming to evaluate the proposed approach. The obtained results, considering file sizes greater than or equal to 4GB, show that pdQSM-EXTRACTION strategy presents better performance than the one obtained by the QSM-EXTRACTION strategy, evaluated by computing the input time, defined as the total time spent to decompose a given file generating three other files containing the characteristics of quality, quantity and measurement. Thus, considering the processing of files whose sizes are greater than or equal to 4GB and the addition of one or more slave nodes by the pdQSM-EXTRACTION strategy, the ratio between the input time obtained by the pdQSM-EXTRACTION strategy and the input time obtained by the QSM-EXTRACTION strategy presented minimum and maximum values respectively of 53.57 % and 95.83 %. Therefore, we achieve to demonstrate the feasibility of pdQSM-EXTRACTION approach for applications involving large data volumes.Atualmente, o armazenamento de grandes quantidades de dados confidenciais em servidores na nuvem é uma prática comum, uma vez que permite reduzir custos e aumentar a disponibilidade desses dados. Porém, nos ambientes de computação em nuvem, o controle dos dados deixa de ser do seu proprietário e passa a ser do provedor do serviço de armazenamento, o que faz surgir novos desafios relacionados à privacidade, segurança e confidencialidade. Neste contexto, diferentes soluções para assegurar a confidencialidade dos dados armazenados na nuvem foram propostas. Em geral, tais estratégias utilizam criptografia, fragmentação de dados ou uma combinação dessas duas abordagens. Recentemente, uma nova solução, denominada QSM-EXTRACTION, foi proposta. A estratégia QSM-EXTRACTION baseia-se na fragmentação de um arquivo digital em fragmentos denominados objetos de informação, na decomposição desses objetos por meio da extração de suas características e na dispersão dessas características em diferentes serviços de armazenamento em nuvem. Contudo, apesar de ter sido concebida para o ambiente de computação em nuvem, a QSM-EXTRACTION adota uma abordagem de execução centralizada, o que pode comprometer o desempenho da etapa de decomposição. Neste trabalho, propomos uma versão paralela e distribuída da estratégia QSM-EXTRACTION, denominada pdQSM-EXTRACTION, a qual explora o paradigma MapReduce com a finalidade de possibilitar uma maior eficiência no processo de extração das características dos objetos de informação. A abordagem pdQSM-EXTRACTION foi implementada em linguagem Scala utilizando-se o framework Apache Spark. Diversos experimentos foram realizados para avaliar a estratégia proposta. Os resultados obtidos demonstram que para arquivos com tamanhos maiores ou iguais a 4GB, a estratégia pdQSM-EXTRACTION apresenta desempenho melhor que o obtido pela estratégia QSM-EXTRACTION, avaliado pelo cálculo do tempo de entrada, definido como o tempo total gasto para decompor um dado arquivo gerando-se outros três arquivos contendo as características de qualidade, quantidade e medida. Assim, considerando-se o processamento de arquivos com tamanhos maiores ou iguais a 4GB e a adição de um ou mais nós escravos pela estratégia pdQSM-EXTRACTION, a razão entre o tempo de entrada obtido pela estratégia pdQSM-EXTRACTION e o tempo de entrada obtido pela estratégia QSM-EXTRACTION apresentou valores mínimos e máximos respectivamente de 53,57% e 95,83%. Portanto, comprova-se viabilidade da utilização da abordagem pdQSM-EXTRACTION em aplicações envolvendo grandes volumes de dados.PrivacidadeConfidencialidadeComputação em nuvemUma estratégia paralela e distribuída para assegurar a confidencialidade de dados armazenados em nuvemA parallel and distributed strategy to ascertain the confidentiality of data stored in the cloudinfo:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/masterThesisporreponame:Repositório Institucional da Universidade Federal do Ceará (UFC)instname:Universidade Federal do Ceará (UFC)instacron:UFCinfo:eu-repo/semantics/openAccessLICENSElicense.txtlicense.txttext/plain; charset=utf-81748http://repositorio.ufc.br/bitstream/riufc/38718/4/license.txt8a4605be74aa9ea9d79846c1fba20a33MD54ORIGINAL2017_dis_lmdantas.pdf2017_dis_lmdantas.pdfapplication/pdf2111634http://repositorio.ufc.br/bitstream/riufc/38718/3/2017_dis_lmdantas.pdff6192401f06175bb440aa3caf625edcbMD53riufc/387182020-06-29 16:24:39.719oai:repositorio.ufc.br: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Repositório InstitucionalPUBhttp://www.repositorio.ufc.br/ri-oai/requestbu@ufc.br || repositorio@ufc.bropendoar:2020-06-29T19:24:39Repositório Institucional da Universidade Federal do Ceará (UFC) - Universidade Federal do Ceará (UFC)false
dc.title.pt_BR.fl_str_mv Uma estratégia paralela e distribuída para assegurar a confidencialidade de dados armazenados em nuvem
dc.title.en.pt_BR.fl_str_mv A parallel and distributed strategy to ascertain the confidentiality of data stored in the cloud
title Uma estratégia paralela e distribuída para assegurar a confidencialidade de dados armazenados em nuvem
spellingShingle Uma estratégia paralela e distribuída para assegurar a confidencialidade de dados armazenados em nuvem
Dantas, Lucas Moura
Privacidade
Confidencialidade
Computação em nuvem
title_short Uma estratégia paralela e distribuída para assegurar a confidencialidade de dados armazenados em nuvem
title_full Uma estratégia paralela e distribuída para assegurar a confidencialidade de dados armazenados em nuvem
title_fullStr Uma estratégia paralela e distribuída para assegurar a confidencialidade de dados armazenados em nuvem
title_full_unstemmed Uma estratégia paralela e distribuída para assegurar a confidencialidade de dados armazenados em nuvem
title_sort Uma estratégia paralela e distribuída para assegurar a confidencialidade de dados armazenados em nuvem
author Dantas, Lucas Moura
author_facet Dantas, Lucas Moura
author_role author
dc.contributor.co-advisor.none.fl_str_mv Madeiro, João Paulo do Vale
dc.contributor.author.fl_str_mv Dantas, Lucas Moura
dc.contributor.advisor1.fl_str_mv Monteiro Filho, José Maria da Silva
contributor_str_mv Monteiro Filho, José Maria da Silva
dc.subject.por.fl_str_mv Privacidade
Confidencialidade
Computação em nuvem
topic Privacidade
Confidencialidade
Computação em nuvem
description Nowadays, the storage of large amounts of confidential data in cloud servers is a common practice, since such strategy allows to reduce costs and also increases data availability. However, in cloud computing environment, data control is no longer owned by its legitimated user, becoming a storage service provider responsability. Such scenario gives rise to new challenges related to privacy, security and confidentiality. At this context, different solutions have been proposed for ensuring the confidentiality of the cloud stored data. In generall, such approaches are based on cryptography, data fragmentation or a combination of these two methodologies. Recently, a new approach, denoted QSM-EXTRACTION, has been proposed. The QSM-EXTRACTION strategy is based on the fragmentation of a digital file into fragments named information objects, on the decomposition of these objects through the extraction of some features and on the dispersion of these features in different cloud storage services. However, despite being developed for cloud computing environment, QSM-EXTRACTION method adopts a centralized execution approach, which may compromise the performance of the decomposition step. At the present work, we propose a paralell and distributed version of the QSM-EXTRACTION strategy, named pdQSM-EXTRACTION, which exploits the MapReduce paradigm aiming to provide a higher efficiency for the process of extracting features from information objects. The pdQSM-EXTRACTION approach has been implemented in Scala language programming, using Apache Spark framework. Several computing experiments and simulations have been performed aiming to evaluate the proposed approach. The obtained results, considering file sizes greater than or equal to 4GB, show that pdQSM-EXTRACTION strategy presents better performance than the one obtained by the QSM-EXTRACTION strategy, evaluated by computing the input time, defined as the total time spent to decompose a given file generating three other files containing the characteristics of quality, quantity and measurement. Thus, considering the processing of files whose sizes are greater than or equal to 4GB and the addition of one or more slave nodes by the pdQSM-EXTRACTION strategy, the ratio between the input time obtained by the pdQSM-EXTRACTION strategy and the input time obtained by the QSM-EXTRACTION strategy presented minimum and maximum values respectively of 53.57 % and 95.83 %. Therefore, we achieve to demonstrate the feasibility of pdQSM-EXTRACTION approach for applications involving large data volumes.
publishDate 2017
dc.date.issued.fl_str_mv 2017
dc.date.accessioned.fl_str_mv 2019-01-08T16:25:27Z
dc.date.available.fl_str_mv 2019-01-08T16:25:27Z
dc.type.status.fl_str_mv info:eu-repo/semantics/publishedVersion
dc.type.driver.fl_str_mv info:eu-repo/semantics/masterThesis
format masterThesis
status_str publishedVersion
dc.identifier.citation.fl_str_mv DANTAS, Lucas Moura. Uma estratégia paralela e distribuída para assegurar a confidencialidade de dados armazenados em nuvem. 2017. 140 f. Dissertação (Mestrado em Ciência da Computação) - Universidade Federal do Ceará, Fortaleza, 2017.
dc.identifier.uri.fl_str_mv http://www.repositorio.ufc.br/handle/riufc/38718
identifier_str_mv DANTAS, Lucas Moura. Uma estratégia paralela e distribuída para assegurar a confidencialidade de dados armazenados em nuvem. 2017. 140 f. Dissertação (Mestrado em Ciência da Computação) - Universidade Federal do Ceará, Fortaleza, 2017.
url http://www.repositorio.ufc.br/handle/riufc/38718
dc.language.iso.fl_str_mv por
language por
dc.rights.driver.fl_str_mv info:eu-repo/semantics/openAccess
eu_rights_str_mv openAccess
dc.source.none.fl_str_mv reponame:Repositório Institucional da Universidade Federal do Ceará (UFC)
instname:Universidade Federal do Ceará (UFC)
instacron:UFC
instname_str Universidade Federal do Ceará (UFC)
instacron_str UFC
institution UFC
reponame_str Repositório Institucional da Universidade Federal do Ceará (UFC)
collection Repositório Institucional da Universidade Federal do Ceará (UFC)
bitstream.url.fl_str_mv http://repositorio.ufc.br/bitstream/riufc/38718/4/license.txt
http://repositorio.ufc.br/bitstream/riufc/38718/3/2017_dis_lmdantas.pdf
bitstream.checksum.fl_str_mv 8a4605be74aa9ea9d79846c1fba20a33
f6192401f06175bb440aa3caf625edcb
bitstream.checksumAlgorithm.fl_str_mv MD5
MD5
repository.name.fl_str_mv Repositório Institucional da Universidade Federal do Ceará (UFC) - Universidade Federal do Ceará (UFC)
repository.mail.fl_str_mv bu@ufc.br || repositorio@ufc.br
_version_ 1847793015203037184