Call for Paper

CAE solicits original research papers for the July 2021 Edition. Last date of manuscript submission is June 30, 2021.

Read More

A Highly Dynamic Locality Aware Secure Data Availability Routing Framework for Ad Hoc Clouds

Niroj Kumar Pani, Bikram Keshari Ratha, Sarojananda Mishra. Published in Distributed Systems.

Communications on Applied Electronics
Year of Publication: 2016
Publisher: Foundation of Computer Science (FCS), NY, USA
Authors: Niroj Kumar Pani, Bikram Keshari Ratha, Sarojananda Mishra
10.5120/cae2016652461

Niroj Kumar Pani, Bikram Keshari Ratha and Sarojananda Mishra. A Highly Dynamic Locality Aware Secure Data Availability Routing Framework for Ad Hoc Clouds. Communications on Applied Electronics 6(4):13-19, December 2016. BibTeX

@article{10.5120/cae2016652461,
	author = {Niroj Kumar Pani and Bikram Keshari Ratha and Sarojananda Mishra},
	title = {A Highly Dynamic Locality Aware Secure Data Availability Routing Framework for Ad Hoc Clouds},
	journal = {Communications on Applied Electronics},
	issue_date = {December 2016},
	volume = {6},
	number = {4},
	month = {Dec},
	year = {2016},
	issn = {2394-4714},
	pages = {13-19},
	numpages = {7},
	url = {http://www.caeaccess.org/archives/volume6/number4/687-2016652461},
	doi = {10.5120/cae2016652461},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

Ad hoc clouds in an integration of mobile ad hoc network over the cloud computing environment. In ad hoc clouds since the infrastructure setup is implemented over existing sporadically available, non-exclusive (primarily used for some other purpose) mobile devices they offer an attractive alternative to the existing data center cloud model in terms of cost and computational overhead. In this paper, we propose a secure routing framework for ad hoc cloud environments that optimizes itself depending upon the locality of nodes with respect to the cloudlets that form the ad hoc cloud. The scheme not only establishes a secure and reliable route between two nodes but also supports secure data packet forwarding. We specify the design of the protocol and examines its capacity to withstand possible security threats.

References

  1. G. Kirby, A. Dearle, A. Macdonald, and A. Fernandes, "An approach to ad hoc cloud computing," arXiv preprint arXiv: 1002.4738, 2010.
  2. S. K. Pippal, S. Mishra, and D. S. Kushwaha, "Architectural Design and Issues for Ad-Hoc Clouds," Advances in Communication, Network, and Computing, pp.291-296, 2012.
  3. A. R. Mohammad, A. S. Elham, and Y. Jararweh, "AMCC: Ad-hoc based Mobile Cloud Computing Modeling," Procedia Computer Science, vol. 56, pp.580-585, 2015.
  4. P. Gupta, A. Seetharaman, and J. R. Raj, “The usage and adoption of cloud computing by small and medium businesses,” International Journal of Information Management, vol. 33, no. 5, pp. 861–874, 2013.
  5. H. Wang, W. He, and F.-K. Wang, “Enterprise cloud service architectures,” Information Technology and Management, vol. 13, no. 4, pp. 445–454, 2012.
  6. G. Kirby, A. Dearle, A. Macdonald, and A. Fernandes, "An approach to ad hoc cloud computing," arXiv preprint arXiv: 1002.4738, 2010.
  7. S. K. Pippal, S. Mishra, and D. S. Kushwaha, "Architectural Design and Issues for Ad-Hoc Clouds," Advances in Communication, Network, and Computing, pp.291-296, 2012
  8. A. R. Mohammad, A. S. Elham, and Y. Jararweh, "AMCC: Ad-hoc based Mobile Cloud Computing Modeling," Procedia Computer Science, vol. 56, pp.580-585, 2015.
  9. N. Fernando, S. W. Loke, and W. Rahayu, "Mobile cloud computing: A survey," Future Generation Computer Systems, vol. 29, no. 1, pp.84-106, 2013.
  10. S. Srinivasamurty and D. Q. Liu, “Survey on cloud computing security,” In Proceedings of the 2nd IEEE International Conference on Cloud Computing Technology and Science. IEEE, pp. 1–8, 2010.
  11. M. Almorsy, J. Grundy, and I. M¨uller, “An analysis of the cloud computing security problem,” in Proceedings of the 17th Asia Pacific Software Engineering Conference (APSEC), Cloud Workshop, Sydney, Australia, 2010, pp. 1–7.
  12. Z. J. Haas, M.R. Pearlman, and P. Samar, "The zone routing protocol (ZRP) for ad hoc networks," IETF Internet Draft, 2002.
  13. B. A. Forouzan and D. Mukhopadhyay, “Cryptography and Network Security,” Special Indian Edition, McGraw-Hill Education, 2011.
  14. S. Ghazizadeh, O. Ilghami, E. Sirin, and F. Yaman, "Security-aware adaptive dynamic source routing protocol," In Proceedings of 27th Annual IEEE Conference on Local Computer Networks (LCN 2002), IEEE, pp. 751-760, 2002.
  15. M. H. Kharche, and M. D. S. Chouhan, "Building trust in cloud using public key infrastructure," International Journal of Advanced Computer Science and Applications, vol. 3, no. 3, 2012.
  16. Behrouz A. Forouzan, "Data Communications and Networking," 4th Edition, Tata McGraw, 2013.
  17. M. O. Pervaiz, M. Cardei, and J. Wu, "Routing security in ad hoc wireless networks," Network Security, Springer US, pp. 117-142. 2010.
  18. Z. J. Haas, M. R. Pearlman, and P. Samar, "Intrazone routing protocol (iarp)," IETF Internet Draft, 2002.
  19. E. Alotaibi and B. Mukherjee, "A survey on routing algorithms for wireless Ad-Hoc and mesh networks," Computer networks, vol. 56, no. 2, pp. 940-965, 2012.
  20. H. Bakht, "Survey of routing protocols for mobile ad-hoc network," International Journal of Information and Communication Technology Research, vol. 1, no. 6, 2011.
  21. Niroj Kumar Pani, Bikram Keshari Rath, and Sarojananda Mishra, "A Topology-Hiding Secure On-Demand Routing Protocol for Wireless Ad Hoc Network," International Journal of Computer Applications, vol. 144, no. 4, pp. 42-50, 2016.
  22. Y. C. Hu, A. Perrig, and D. B. Johnson, “Packet Leashes: A defence against Wormhole attacks in Wireless Ad Hoc networks,” In INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies, vol. 3, pp. 1976-1986, 2003
  23. http://www.isi.edu/nsam/ns

Keywords

Cloud computing; Ad hoc clouds; Security attacks; Secure routing.