Intelligent cryptography approach for secure distributed big data storage in cloud computing

被引:136
|
作者
Li, Yibin [1 ]
Gai, Keke [2 ]
Qiu, Longfei [3 ]
Qiu, Meikang [2 ]
Zhao, Hui [4 ]
机构
[1] Shandong Univ, Sch Comp Sci & Technol, Jinan, Shandong, Peoples R China
[2] Pace Univ, Dept Comp Sci, New York, NY 10038 USA
[3] Nanjing Foreign Language Sch, Nanjing, Jiangsu, Peoples R China
[4] Henan Univ, Software Sch, Kaifeng 475000, Henan, Peoples R China
基金
美国国家科学基金会;
关键词
Intelligent cryptography; Cybersecurity; Mass distributed storage; Cloud computing; Big data; SEARCHABLE ENCRYPTION; SCHEME; CHALLENGES; MANAGEMENT; NETWORKS; PRIVACY; SYSTEMS;
D O I
10.1016/j.ins.2016.09.005
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Implementing cloud computing empowers numerous paths for Web-based service offerings to meet diverse needs. However, the data security and privacy has become a critical issue that restricts many cloud applications. One of the major concerns in security and privacy is caused by the fact that cloud operators have chances to reach the sensitive data. This concern dramatically increases users' anxiety and reduces the adoptability of cloud computing in many fields, such as the financial industry and governmental agencies. This paper focuses on this issue and proposes an intelligent cryptography approach, by which the cloud service operators cannot directly reach partial data. The proposed approach divides the file and separately stores the data in the distributed cloud servers. An alternative approach is designed to determine whether the data packets need a split in order to shorten the operation time. The proposed scheme is entitled Security-Aware Efficient Distributed Storage (SA-EDS) model, which is mainly supported by our proposed algorithms, including Alternative Data Distribution (ADZ) Algorithm, Secure Efficient Data Distributions (SED2) Algorithm and Efficient Data Conflation (EDCon) Algorithm. Our experimental evaluations have assessed both security and efficiency performances and the experimental results depict that our approach can effectively defend main threats from clouds and requires with an acceptable computation time. (C) 2016 Elsevier Inc. All rights reserved.
引用
收藏
页码:103 / 115
页数:13
相关论文
共 50 条
  • [1] A Distributed Mobile Cloud Computing Model for Secure Big Data
    Sung, Soonhwa
    Youn, Cheong
    Kong, Eunbae
    Ryou, Jaecheol
    [J]. 2016 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2016, : 312 - 316
  • [2] Secure storage of data in cloud computing
    20150500466883
    [J]. (1) School of Computer and Software and Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science and Technology, Nanjing; 210044, China, 1600, IEEE Tainan Section; International Society of Management Engineers; JSPS/NSFC/NRF A3 Foresight Program Ultra-Realistic Acoustic Interactive Communication on Next-Generation Internet; Tainan Chapter of IEEE Signal Processing Society; Waseda University (Institute of Electrical and Electronics Engineers Inc.):
  • [3] Efficient and secure big data storage system with leakage resilience in cloud computing
    Zhang, Yinghui
    Yang, Menglei
    Zheng, Dong
    Lang, Pengzhen
    Wu, Axin
    Chen, Chen
    [J]. SOFT COMPUTING, 2018, 22 (23) : 7763 - 7772
  • [4] Efficient and secure big data storage system with leakage resilience in cloud computing
    Yinghui Zhang
    Menglei Yang
    Dong Zheng
    Pengzhen Lang
    Axin Wu
    Chen Chen
    [J]. Soft Computing, 2018, 22 : 7763 - 7772
  • [5] Secure Data Process in Distributed Cloud Computing
    Sharmila, P.
    Danapaquiame, N.
    Subhapriya, R.
    Janakiram, A.
    Amudhavel, J.
    [J]. BIOSCIENCE BIOTECHNOLOGY RESEARCH COMMUNICATIONS, 2018, 11 (01): : 75 - 84
  • [6] A hybrid cryptography technique for data storage on cloud computing
    Bermani, Ali Kadhim
    Murshedi, Tariq A. K.
    Abod, Zaid A.
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2021, 24 (06): : 1613 - 1624
  • [7] Secure File storage in Cloud Computing using Hybrid Cryptography Algorithm
    Maitri, Punam V.
    Verma, Aruna
    [J]. PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2016, : 1635 - 1638
  • [8] Secure sharing with cryptography in cloud computing
    Chachapara, Kajal
    Bhadlawala, Sunny
    [J]. 2013 4TH NIRMA UNIVERSITY INTERNATIONAL CONFERENCE ON ENGINEERING (NUICONE 2013), 2013,
  • [9] Data storage with secure boundary in cloud computing
    Zhu, Shuaishuai
    Han, Yiliang
    [J]. ICIC Express Letters, 2014, 8 (09): : 2389 - 2394
  • [10] A Secure and Searchable Data Storage in Cloud Computing
    Gupta, Sarika
    Satapathy, Sangita Rani
    Mehta, Piyush
    Tripathy, Anupam
    [J]. PROCEEDINGS OF THE 2013 3RD IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2013, : 106 - 109