Efficient Big Data Storage in Cloud with Unique Authentication Approach for Privacy Access
Keywords:
Big data, Data Storage, Cloud Computing, Security, EncryptionAbstract
The growth of in-network services in the IT sector has a significant impact on the storage as well as distribution of data in the cloud. The main problem is addressing customers' worries about data security and privacy because this new computing along with service technology requires users to entrust their critical data to the cloud service provider (CSP). Due to these security and privacy concerns, organizations are still hesitant to put their data on the cloud. Existing encryption techniques can safeguard data secrecy, but there are several downsides, including the risk of sensitive data leakage due to access patterns. The proposed approach combines the production of distinct keys with a security algorithm. The improved Elliptic curve with Diffie-Hellman (IECDH) security technique is used in this study, where unique encryption and decryption data are used. This technique effectively decreased the computing difficulty and encrypted the data. In an experimental examination, evaluation metrics such as computing overhead, decryption time, encryption time, as well as key generation time are used to determine how well the proposed IECDH performs.
Downloads
References
Lo'ai, A. Tawalbeh, and GokaySaldamli. "Reconsidering big data security and privacy in cloud and mobile cloud systems." Journal of King Saud University-Computer and Information Sciences 33, no. 7 (2021): 810-819.
Ghayvat, Hemant, Sharnil Pandya, Pronaya Bhattacharya, Mohd Zuhair, Mamoon Rashid, Saqib Hakak, and Kapal Dev. "CP-BDHCA: Blockchain-based Confidentiality-Privacy preserving Big Data scheme for healthcare clouds and applications." IEEE Journal of Biomedical and Health Informatics 26, no. 5 (2021): 1937-1948.
Sharma, Pratima, Malaya Dutta Borah, and SuyelNamasudra. "Improving security of medical big data by using Blockchain technology." Computers & Electrical Engineering 96 (2021): 107529.
Deepa, Natarajan, Quoc-Viet Pham, Dinh C. Nguyen, Sweta Bhattacharya, B. Prabadevi, Thippa Reddy Gadekallu, Praveen Kumar Reddy Maddikunta, Fang Fang, and Pubudu N. Pathirana. "A survey on blockchain for big data: approaches, opportunities, and future directions." Future Generation Computer Systems (2022).
Subramanian, E. K., and Latha Tamilselvan. "Elliptic curve Diffie–Hellman cryptosystem in big data cloud security." Cluster Computing 23 (2020): 3057-3067.
Dhiman, Gaurav, Sapna Juneja, Hamidreza Mohafez, Ibrahim El-Bayoumy, Lokesh Kumar Sharma, Maryam Hadizadeh, Mohammad Aminul Islam, Wattana Viriyasitavat, and Mayeen Uddin Khandaker. "Federated learning approach to protect healthcare data over big data scenario." Sustainability 14, no. 5 (2022): 2500.
Koo, Jahoon, Giluk Kang, and Young-Gab Kim. "Security and privacy in big data life cycle: a survey and open challenges." Sustainability 12, no. 24 (2020): 10571.
Awaysheh, Feras M., Mohammad N. Aladwan, MamounAlazab, Sadi Alawadi, José C. Cabaleiro, and Tomás F. Pena. "Security by design for big data frameworks over cloud computing." IEEE Transactions on Engineering Management 69, no. 6 (2021): 3676-3693.
Chenthara, Shekha, Khandakar Ahmed, Hua Wang, and Frank Whittaker. "Security and privacy-preserving challenges of e-health solutions in cloud computing." IEEE access 7 (2019): 74361-74382.
Khan, Mudassir, and Mohd Dilshad Ansari. "Security and privacy issue of big data over the cloud computing: a comprehensive analysis." IJRTE-Scopus Indexed 7, no. 6s (2019): 413-417.
Rawat, Danda B., Ronald Doku, and Moses Garuba. "Cybersecurity in big data era: From securing big data to data-driven security." IEEE Transactions on Services Computing 14, no. 6 (2019): 2055-2072.
Yadav, Dharminder, Dr Maheshwari, and Dr Chandra. "Big data hadoop: Security and privacy." In Proceedings of 2nd International Conference on Advanced Computing and Software Engineering (ICACSE). 2019.
Tan, Liang, Na Shi, Caixia Yang, and Keping Yu. "A blockchain-based access control framework for cyber-physical-social system big data." IEEE Access 8 (2020): 77215-77226.
Shahzad, Iqra, Ayesha Maqbool, Tauseef Rana, Alina Mirza, Wazir Zada Khan, Sung Won Kim, Yousaf Bin Zikria, and Sadia Din. "Blockchain-based green big data visualization: BGbV." Complex & Intelligent Systems 8, no. 5 (2022): 3707-3718.
Hu, Xiaohan, Rong Jiang, Mingyue Shi, and Jingwei Shang. "A privacy protection model for health care big data based on trust evaluation access control in cloud service environment." Journal of Intelligent & Fuzzy Systems 38, no. 3 (2020): 3167-3178.
Hasan, Mohammad Kamrul, Ali Alkhalifah, Shayla Islam, Nissrein BM Babiker, AKM Ahasan Habib, AzanaHafizah Mohd Aman, and Md Arif Hossain. "Blockchain technology on smart grid, energy trading, and big data: security issues, challenges, and recommendations." Wireless Communications and Mobile Computing 2022 (2022): 1-26.
S. Wang, J. Zhou, J. K. Liu, J. Yu, J. Chen, W. Xie, "An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing", IEEE Transactions on Information Forensics and Security, Vol. 11 (6), 2016.
Y. Meng and Y. Meng, "A novel attribute-based signcryption scheme in cloud computing environments", In Proc. IEEE International Conference on Information and Automation, pp. 1976-1979, 2016.
H. Hong, Y. Xia, Z. Sun, X. Liu, "Provably secure attribute-based signcryption with delegated computation and efficient key updating", KSII Transactions on Internet & Information Systems, vol. 11, no. 5, pp. 2646-2659, 2017.
Anbuchelian, S., C. M. Sowmya, and C. Ramesh. "Efficient and secure auditing scheme for privacy preserving data storage in cloud." Cluster Computing 22 (2019): 9767-9775.
R. Glenn S. Frankel and S. Kelly, "The AES-CBC Cipher Algorithm and Its Use with IPsec", September 2003. http://tools.ietf.org/html/rfc3602.
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.