Efficient Big Data Storage in Cloud with Unique Authentication Approach for Privacy Access

Authors

  • S. Subbalakshmi Ph.D Scholar, Department of Computer Science and Engineering, Jawaharlal Nehru Technological University Anantapur, Ananthapuramu, Andhra Pradesh, India
  • K. Madhavi Professor, Department of Computer Science and Engineering, Jawaharlal Nehru Technological University Anantapur, Ananthapuramu, Andhra Pradesh, India

Keywords:

Big data, Data Storage, Cloud Computing, Security, Encryption

Abstract

The growth of in-network services in the IT sector has a significant impact on the storage as well as distribution of data in the cloud. The main problem is addressing customers' worries about data security and privacy because this new computing along with service technology requires users to entrust their critical data to the cloud service provider (CSP). Due to these security and privacy concerns, organizations are still hesitant to put their data on the cloud. Existing encryption techniques can safeguard data secrecy, but there are several downsides, including the risk of sensitive data leakage due to access patterns. The proposed approach combines the production of distinct keys with a security algorithm. The improved Elliptic curve with Diffie-Hellman (IECDH) security technique is used in this study, where unique encryption and decryption data are used. This technique effectively decreased the computing difficulty and encrypted the data. In an experimental examination, evaluation metrics such as computing overhead, decryption time, encryption time, as well as key generation time are used to determine how well the proposed IECDH performs.

Downloads

Download data is not yet available.

References

Lo'ai, A. Tawalbeh, and GokaySaldamli. "Reconsidering big data security and privacy in cloud and mobile cloud systems." Journal of King Saud University-Computer and Information Sciences 33, no. 7 (2021): 810-819.

Ghayvat, Hemant, Sharnil Pandya, Pronaya Bhattacharya, Mohd Zuhair, Mamoon Rashid, Saqib Hakak, and Kapal Dev. "CP-BDHCA: Blockchain-based Confidentiality-Privacy preserving Big Data scheme for healthcare clouds and applications." IEEE Journal of Biomedical and Health Informatics 26, no. 5 (2021): 1937-1948.

Sharma, Pratima, Malaya Dutta Borah, and SuyelNamasudra. "Improving security of medical big data by using Blockchain technology." Computers & Electrical Engineering 96 (2021): 107529.

Deepa, Natarajan, Quoc-Viet Pham, Dinh C. Nguyen, Sweta Bhattacharya, B. Prabadevi, Thippa Reddy Gadekallu, Praveen Kumar Reddy Maddikunta, Fang Fang, and Pubudu N. Pathirana. "A survey on blockchain for big data: approaches, opportunities, and future directions." Future Generation Computer Systems (2022).

Subramanian, E. K., and Latha Tamilselvan. "Elliptic curve Diffie–Hellman cryptosystem in big data cloud security." Cluster Computing 23 (2020): 3057-3067.

Dhiman, Gaurav, Sapna Juneja, Hamidreza Mohafez, Ibrahim El-Bayoumy, Lokesh Kumar Sharma, Maryam Hadizadeh, Mohammad Aminul Islam, Wattana Viriyasitavat, and Mayeen Uddin Khandaker. "Federated learning approach to protect healthcare data over big data scenario." Sustainability 14, no. 5 (2022): 2500.

Koo, Jahoon, Giluk Kang, and Young-Gab Kim. "Security and privacy in big data life cycle: a survey and open challenges." Sustainability 12, no. 24 (2020): 10571.

Awaysheh, Feras M., Mohammad N. Aladwan, MamounAlazab, Sadi Alawadi, José C. Cabaleiro, and Tomás F. Pena. "Security by design for big data frameworks over cloud computing." IEEE Transactions on Engineering Management 69, no. 6 (2021): 3676-3693.

Chenthara, Shekha, Khandakar Ahmed, Hua Wang, and Frank Whittaker. "Security and privacy-preserving challenges of e-health solutions in cloud computing." IEEE access 7 (2019): 74361-74382.

Khan, Mudassir, and Mohd Dilshad Ansari. "Security and privacy issue of big data over the cloud computing: a comprehensive analysis." IJRTE-Scopus Indexed 7, no. 6s (2019): 413-417.

Rawat, Danda B., Ronald Doku, and Moses Garuba. "Cybersecurity in big data era: From securing big data to data-driven security." IEEE Transactions on Services Computing 14, no. 6 (2019): 2055-2072.

Yadav, Dharminder, Dr Maheshwari, and Dr Chandra. "Big data hadoop: Security and privacy." In Proceedings of 2nd International Conference on Advanced Computing and Software Engineering (ICACSE). 2019.

Tan, Liang, Na Shi, Caixia Yang, and Keping Yu. "A blockchain-based access control framework for cyber-physical-social system big data." IEEE Access 8 (2020): 77215-77226.

Shahzad, Iqra, Ayesha Maqbool, Tauseef Rana, Alina Mirza, Wazir Zada Khan, Sung Won Kim, Yousaf Bin Zikria, and Sadia Din. "Blockchain-based green big data visualization: BGbV." Complex & Intelligent Systems 8, no. 5 (2022): 3707-3718.

Hu, Xiaohan, Rong Jiang, Mingyue Shi, and Jingwei Shang. "A privacy protection model for health care big data based on trust evaluation access control in cloud service environment." Journal of Intelligent & Fuzzy Systems 38, no. 3 (2020): 3167-3178.

Hasan, Mohammad Kamrul, Ali Alkhalifah, Shayla Islam, Nissrein BM Babiker, AKM Ahasan Habib, AzanaHafizah Mohd Aman, and Md Arif Hossain. "Blockchain technology on smart grid, energy trading, and big data: security issues, challenges, and recommendations." Wireless Communications and Mobile Computing 2022 (2022): 1-26.

S. Wang, J. Zhou, J. K. Liu, J. Yu, J. Chen, W. Xie, "An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing", IEEE Transactions on Information Forensics and Security, Vol. 11 (6), 2016.

Y. Meng and Y. Meng, "A novel attribute-based signcryption scheme in cloud computing environments", In Proc. IEEE International Conference on Information and Automation, pp. 1976-1979, 2016.

H. Hong, Y. Xia, Z. Sun, X. Liu, "Provably secure attribute-based signcryption with delegated computation and efficient key updating", KSII Transactions on Internet & Information Systems, vol. 11, no. 5, pp. 2646-2659, 2017.

Anbuchelian, S., C. M. Sowmya, and C. Ramesh. "Efficient and secure auditing scheme for privacy preserving data storage in cloud." Cluster Computing 22 (2019): 9767-9775.

R. Glenn S. Frankel and S. Kelly, "The AES-CBC Cipher Algorithm and Its Use with IPsec", September 2003. http://tools.ietf.org/html/rfc3602.

Downloads

Published

24.03.2024

How to Cite

Subbalakshmi, S. ., & Madhavi, K. . (2024). Efficient Big Data Storage in Cloud with Unique Authentication Approach for Privacy Access. International Journal of Intelligent Systems and Applications in Engineering, 12(3), 631–637. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/5294

Issue

Section

Research Article