A novel system architecture for secure authentication and data sharing in cloud enabled Big Data Environment

被引:28
|
作者
Narayanan, Uma [1 ]
Varghese, Paul [2 ]
Joseph, Shelbi [1 ]
机构
[1] CUSAT, SOE, Div IT, Kochi, Kerala, India
[2] Rajagiri Sch Engn & Technol, Comp Sci Dept, Kochi, Kerala, India
关键词
Big data outsourcing; Big data sharing; Big data management; SALSA encryption with MapReduce; Fractal index tree; SHA-3; SCHEME; EFFICIENT; PRIVACY;
D O I
10.1016/j.jksuci.2020.05.005
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid growth of data sources, Big data security in Cloud is a big challenge. Different issues have ascended in the area of Big data security such as infrastructure security, data privacy, data management and data integrity. Currently, Big data processing, analytics and storage is secured using cryptography algorithms, which are not appropriate for Big data protection over Cloud. In this paper, we present a solution for addressing the main issues in Big data security over Cloud. We propose a novel system architecture called the Secure Authentication and Data Sharing in Cloud (SADS-Cloud). There are three processes involved in this paper including (i). Big Data Outsourcing, (ii). Big Data Sharing and (iii). Big Data Management. In Big data outsourcing, the data owners are registered to a Trust Center using SHA-3 hashing algorithm. The MapReduce model is used to split the input file into fixed-size of blocks of data and SALSA20 encryption algorithm is applied over each block. In Big data sharing, data users participate in a secure file retrieval. For this purpose, user's credentials (ID, password, secure ID, and current times-tamp, email id) are hashed and compared with that stored in a database. In Big data management, there are three important processes implemented to organize data. They are as follows: Compression using Lemperl Ziv Markow Algorithm (LZMA), Clustering using Density-based Clustering of Applications with Noise (DBSCAN), and Indexing using Fractal Index Tree. The proposed scheme for these processes are implemented using Java Programming and performance tested for the following metrics: Information Loss, Compression Ratio, Throughput, Encryption Time and Decryption Time. (C) 2020 The Authors. Published by Elsevier B.V. on behalf of King Saud University.
引用
下载
收藏
页码:3121 / 3135
页数:15
相关论文
共 50 条
  • [21] Secure Data Sharing in Public Cloud
    Kanaparti, Venkataramana
    Kumar, Naveen R.
    Tatekalva, Sandhya
    Padmavathamma, M.
    FOURTH INTERNATIONAL CONFERENCE ON DIGITAL IMAGE PROCESSING (ICDIP 2012), 2012, 8334
  • [22] Secure Data Sharing with Confidentiality, Integrity and Access Control in Cloud Environment
    Rajkumar, V
    Prakash, M.
    Vennila, V.
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 40 (02): : 779 - 793
  • [23] ECC Based Secure Sharing of Healthcare Data in the Health Cloud Environment
    Hema, V. Sri Vigna
    Kesavan, Ramesh
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 108 (02) : 1021 - 1035
  • [24] ECC Based Secure Sharing of Healthcare Data in the Health Cloud Environment
    V. Sri Vigna Hema
    Ramesh Kesavan
    Wireless Personal Communications, 2019, 108 : 1021 - 1035
  • [25] Secure data sharing with confidentiality, integrity and access control in cloud environment
    Rajkumar V.
    Prakash M.
    Vennila V.
    Computer Systems Science and Engineering, 2021, 40 (02): : 779 - 793
  • [26] Blockchain broadcast proxy ReEncryption in cloud environment for secure data sharing
    Pillai, Beena G.
    Dayanand, N. Lal
    Prasanna, T. Venkatesh
    SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2024, 49 (02):
  • [27] A System Architecture for Running Big Data Workflows in the Cloud
    Kashlev, Andrey
    Lu, Shiyong
    2014 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING (SCC 2014), 2014, : 51 - 58
  • [28] An Efficient Data Security System for Group Data Sharing in Cloud System Environment
    Mercy, S. Simla
    Srikanth, G. Umarani
    2014 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2014,
  • [29] SecSVA: Secure Storage, Verification, and Auditing of Big Data in the Cloud Environment
    Aujla, Gagangeet Singh
    Chaudhary, Rajat
    Kumar, Neeraj
    Das, Ashok Kumar
    Rodrigues, Joel J. P. C.
    IEEE COMMUNICATIONS MAGAZINE, 2018, 56 (01) : 78 - 85
  • [30] Decentralized blockchain based authentication for secure data sharing in Cloud-IoTDeBlock-Sec
    Uma Narayanan
    Varghese Paul
    Shelbi Joseph
    Journal of Ambient Intelligence and Humanized Computing, 2022, 13 : 769 - 787