Layers Based Optimal Privacy Preservation of the On-premise Data Supported by the Dual Authentication and Lightweight on Fly Encryption in Cloud Ecosystem

被引:2
|
作者
Hemanth Kumar, N. P. [1 ]
Prabhudeva, S. [2 ]
机构
[1] Alvas Inst Engn & Technol, Dept Comp Sci & Engn, Mijar, Moodbidri, India
[2] Jawaharlal Nehru Natl Coll Engn, Dept ISE, Shivamogga, India
关键词
Big Data; Privacy; Cloud; BIG DATA;
D O I
10.1007/s11277-021-08681-z
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The Big Data stored in the cloud-based clusters of nodes requires an efficient mechanism to protect its privacy information. The traditional anonymization approach for privacy preservation is not applicable for Big Data due to overheads induced as the data storage mechanism follows a distributed file system in the cloud eco-store. This paper presents a dual-layer security model that mitigates the attackers' effect on access to private information. The model architecture consists of a strong authentication mechanism where the key generation to get the access control adopts a high random and customization policy so that at first hand the intruder's probability of entering into the cloud system is nullified and effectively handles the anonymity attack, in the second part of the security model the privacy information part of the data is encrypted with a very lightweight encryption method, and it gets synchronized with the data-deduplication template of the data nodes in the cloud so that the proposed model provides higher security of the privacy information in less time complexities of the cryptographic algorithm which makes the models more reliable as well as flexible to adopt it in the real-time scenario. The behavioral analysis of the proposed Auth-PP for the file-token generation system becomes stable with the incremental file size and exhibits a consistency measure (Ct) = 0.56, which is a mean orient pattern that shows strong stability against the file size so quite adaptable for the big data. The computational performance analysis for cost assessment of encryption and decryption process shows 72% performance improvement for running time for variable file sizes and also exhibits the superior outcome of overall 69.9% for file chunking into the data node on the respective cloud. For the decryption process also, it is observed that the formulated approach attains superior performance in terms of time complexity.
引用
收藏
页码:1489 / 1508
页数:20
相关论文
共 10 条
  • [1] Layers Based Optimal Privacy Preservation of the On-premise Data Supported by the Dual Authentication and Lightweight on Fly Encryption in Cloud Ecosystem
    N. P. Hemanth Kumar
    S. Prabhudeva
    Wireless Personal Communications, 2021, 121 : 1489 - 1508
  • [2] Dual Authentication-Based Encryption with a Delegation System to Protect Medical Data in Cloud Computing
    Badr, Aymen Mudheher
    Zhang, Yi
    Umar, Hafiz Gulfam Ahmad
    ELECTRONICS, 2019, 8 (02):
  • [3] A fully homomorphic–elliptic curve cryptography based encryption algorithm for ensuring the privacy preservation of the cloud data
    G. Prabu Kanna
    V. Vasudevan
    Cluster Computing, 2019, 22 : 9561 - 9569
  • [4] Performance analysis of privacy preservation-based authentication scheme and cryptographic-based data protocols for DSaC in cloud
    Pawar, Ankush Balaram
    Ghumbre, Shashikant U.
    Jogdand, Rashmi M.
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2023, 22 (3-4) : 298 - 322
  • [5] An Efficient Dual Encryption of IoMT data Using Lightweight Security Scheme for Cloud Based IoT Environment
    Kumar, Sanjay
    Abhishek, Kumar
    Jhaveri, Rutvij H.
    Alabdulatif, Abdulatif
    Gaur, Rajkumar
    38TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2023, 2023, : 1782 - 1788
  • [6] A fully homomorphic-elliptic curve cryptography based encryption algorithm for ensuring the privacy preservation of the cloud data
    Kanna, G. Prabu
    Vasudevan, V.
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 4): : S9561 - S9569
  • [7] APRO: Secret Key Based Data Encryption and Mutual Authentication with Privacy Preservation Model in IoT Using Autoregressive Poor and Rich Optimization
    Palekar, Supriya
    Radhika, Y.
    CYBERNETICS AND SYSTEMS, 2024, 55 (04) : 823 - 847
  • [8] DEC-LADE: Dual elliptic curve-based lightweight authentication and data encryption scheme for resource constrained smart devices
    Rao, Vidya
    Prema, K., V
    IET WIRELESS SENSOR SYSTEMS, 2021, 11 (02) : 91 - 109
  • [9] Ciphertext-Policy Attribute-Based Encryption for Cloud Storage: Toward Data Privacy and Authentication in AI-Enabled IoT System
    Chinnasamy, P.
    Deepalakshmi, P.
    Dutta, Ashit Kumar
    You, Jinsang
    Joshi, Gyanendra Prasad
    MATHEMATICS, 2022, 10 (01)
  • [10] A dual hashing-based authentication and secure data transmission scheme for vehicular cloud environment using MECC with optimal resource allocation mechanism
    J. Varalakshmi
    S. Dhanasekaran
    Soft Computing, 2024, 28 (17-18) : 10423 - 10437