A novel system architecture for secure authentication and data sharing in cloud enabled Big Data Environment

被引:27
|
作者
Narayanan, Uma [1 ]
Varghese, Paul [2 ]
Joseph, Shelbi [1 ]
机构
[1] CUSAT, SOE, Div IT, Kochi, Kerala, India
[2] Rajagiri Sch Engn & Technol, Comp Sci Dept, Kochi, Kerala, India
关键词
Big data outsourcing; Big data sharing; Big data management; SALSA encryption with MapReduce; Fractal index tree; SHA-3; SCHEME; EFFICIENT; PRIVACY;
D O I
10.1016/j.jksuci.2020.05.005
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid growth of data sources, Big data security in Cloud is a big challenge. Different issues have ascended in the area of Big data security such as infrastructure security, data privacy, data management and data integrity. Currently, Big data processing, analytics and storage is secured using cryptography algorithms, which are not appropriate for Big data protection over Cloud. In this paper, we present a solution for addressing the main issues in Big data security over Cloud. We propose a novel system architecture called the Secure Authentication and Data Sharing in Cloud (SADS-Cloud). There are three processes involved in this paper including (i). Big Data Outsourcing, (ii). Big Data Sharing and (iii). Big Data Management. In Big data outsourcing, the data owners are registered to a Trust Center using SHA-3 hashing algorithm. The MapReduce model is used to split the input file into fixed-size of blocks of data and SALSA20 encryption algorithm is applied over each block. In Big data sharing, data users participate in a secure file retrieval. For this purpose, user's credentials (ID, password, secure ID, and current times-tamp, email id) are hashed and compared with that stored in a database. In Big data management, there are three important processes implemented to organize data. They are as follows: Compression using Lemperl Ziv Markow Algorithm (LZMA), Clustering using Density-based Clustering of Applications with Noise (DBSCAN), and Indexing using Fractal Index Tree. The proposed scheme for these processes are implemented using Java Programming and performance tested for the following metrics: Information Loss, Compression Ratio, Throughput, Encryption Time and Decryption Time. (C) 2020 The Authors. Published by Elsevier B.V. on behalf of King Saud University.
引用
收藏
页码:3121 / 3135
页数:15
相关论文
共 50 条
  • [1] CHARON: A Secure Cloud-of-Clouds System for Storing and Sharing Big Data
    Mendes, Ricardo
    Oliveira, Tiago
    Cogo, Vinicius
    Neves, Nuno
    Bessani, Alysson
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2021, 9 (04) : 1349 - 1361
  • [2] A novel data sharing model for cloud environment using dual key authentication
    Mamidisetti G.
    Makala R.
    [J]. International Journal of Cloud Computing, 2020, 9 (2-3) : 295 - 310
  • [3] A Comprehensive Review on Secure Data Sharing in Cloud Environment
    Sita Kumari Kotha
    Meesala Shobha Rani
    Bharat Subedi
    Anilkumar Chunduru
    Aravind Karrothu
    Bipana Neupane
    V E Sathishkumar
    [J]. Wireless Personal Communications, 2022, 127 (3) : 2161 - 2188
  • [4] A Comprehensive Review on Secure Data Sharing in Cloud Environment
    Kotha, Sita Kumari
    Rani, Meesala Shobha
    Subedi, Bharat
    Chunduru, Anilkumar
    Karrothu, Aravind
    Neupane, Bipana
    Sathishkumar, V. E.
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2022, 127 (03) : 2161 - 2188
  • [5] A Secure Cloud-Assisted Certificateless Group Authentication Scheme for VANETs in Big Data Environment
    Tan, Haowen
    Chung, Ilyong
    [J]. BDE 2019: 2019 INTERNATIONAL CONFERENCE ON BIG DATA ENGINEERING, 2019, : 101 - 107
  • [6] Secure Big Data Storage and Sharing Scheme for Cloud Tenants
    CHENG Hongbing
    RONG Chunming
    HWANG Kai
    WANG Weihong
    LI Yanyan
    [J]. China Communications, 2015, 12 (06) : 106 - 115
  • [7] Secure Big Data Storage and Sharing Scheme for Cloud Tenants
    Cheng Hongbing
    Rong Chunming
    Hwang Kai
    Wang Weihong
    Li Yanyan
    [J]. CHINA COMMUNICATIONS, 2015, 12 (06) : 106 - 115
  • [8] Blockchain and Data Integrity Authentication Technique for Secure Cloud Environment
    Ramachandran, A.
    Ramadevi, P.
    Alkhayyat, Ahmed
    Yousif, Yousif Kerrar
    [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2023, 36 (02): : 2055 - 2070
  • [9] Conditional Proxy Re-Encryption for Secure Big Data Group Sharing in Cloud Environment
    Son, Junggab
    Kim, Donghyun
    Hussain, Rasheed
    Oh, Heekuck
    [J]. 2014 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2014, : 541 - 546
  • [10] Secure Authentication in Cloud Big Data with Hierarchical Attribute Authorization Structure
    Shen, Jian
    Liu, Dengzhi
    Liu, Qi
    Sun, Xingming
    Zhang, Yan
    [J]. IEEE TRANSACTIONS ON BIG DATA, 2021, 7 (04) : 668 - 677