Abstract
Big data is a high volume data, as it comprises complex and large volume of information. A successful solution is to redistribute the data to a cloud server that has the capacity of storing and processing big data in an effective manner. The main intention of the research is to secure storage of big data and effective access control mechanism. The main stages of the proposed method are map reduce framework, secure storage process and access control mechanism process. Map Reduce is a distributed programming framework used to process big data. In mapper, the input dataset is grouped using hybrid kernel fuzzy c means (HKFCM) clustering algorithm. Finally, the reduced output is fed to the data owner for secure storage. In secure storage process, the suggested method utilizes optimal elliptic curve cryptography (OECC). Here the fundamental values are optimally selected by Modified grasshopper optimization algorithm (MGOA). In the access control mechanism, the effective policy update is proposed along with data storage construction and data deconstruction stage. The routine of the recommended method is assessed using memory and execution time by differentiating the number data size, number cluster size and the number of mapper. The proposed method attains the minimum time and memory utilization when compared to the existing method. The suggested method is implemented in cloud sim with Hadoop Map-reduce framework.
Similar content being viewed by others
References
Assunção MD, Calheiros RN, Bianchi S, Netto MA, Buyya R (2015) Big data computing and clouds: trends and future directions. J Parallel Distrib Comput 79:3–15
Batista BG, Ferreira CH, Segura DC, Leite Filho DM, Peixoto ML (2017) A QoS-driven approach for cloud computing addressing attributes of performance and security. Futur Gener Comput Syst 68:260–274
Bui DM, Yoon Y, Huh EN, Jun S, Lee S (2017) Energy efficiency for cloud computing system based on predictive optimization. J Parallel Distrib Comput 102:103–114
Chen G, Wu S, Wang Y (2015) The evolvement of big data systems: from the perspective of an information security application. Big Data Research 2(2):65–73
UCI Machine Learning Repository (1999), from http://archive.ics.uci.edu/ml/datasets/kdd+cup+1999+data.
Fugkeaw S, Sato H (2018) Scalable and secure access control policy update for outsourced big data. Futur Gener Comput Syst 79:364–373
Hashem IA, Yaqoob I, Anuar NB, Mokhtar S, Gani A, Khan SU (2015) The rise of “big data” on cloud computing: review and open research issues. Inf Syst 47:98–115
Hu C, Cheng X, Tian Z, Yu J, Akkaya K, Sun L (2015) An attribute-based sign cryption scheme to secure attribute-defined multicast communications. In: Secure comm, pp 418–437
Kindervag J, Balaouras S, Hill B, Mak K (2012) Control and protect sensitive information in the era of big data, pp 1–7
Kshetri N (2014) Big data′ s impact on privacy, security and consumer welfare. Telecommun Policy 38:1134–1145
Li P, Guo S, Miyazaki T, Xie M, Hu J, Zhuang W (2016) Privacy-preserving access to big data in the cloud. IEEE Cloud Comput 5:34–42
Nigoti R, Jhuria M, Singh S (2013) A survey of cryptographic algorithms for cloud computing. J Emerging Tech Comp App Sci 4:141–146
Perera C, Ranjan R, Wang L, Khan SU, Zomaya AY (2015) Big data privacy in the internet of things era. IT Prof 17:32–39
Ramachandran M (2016) Software security requirements management as an emerging cloud computing service. Int J Inf Manage 4:580–590
Shanmugapriya E, Kavitha R (2019) Medical big data analysis: preserving security and privacy with hybrid cloud technology. Soft Comput. https://doi.org/10.1007/s00500-019-03857-z
Shen J, Wang C, Wang A, Ji S, Zhang Y (2018) A searchable and verifiable data protection scheme for scholarly big data. IEEE Emerg Top Com 14:8
Singh S, Jeong YS, Park JH (2016) A survey on cloud computing security: issues, threats, and solutions. J Netw Comput Appl 75:200–222
Tan Z, Nagar UT, He X, Nanda P, Liu RP, Wang S, Hu J (2014) Enhancing big data security with collaborative intrusion detection. IEEE Cloud Comput 3:27–33
Thiyagarajan VS, Ayyasamy A (2017) Privacy preserving over big data through VSSFA and MapReduce framework in cloud environment. Wirel Pers Commun 4:6239–6263
Wang Z, Cao C, Yang N, Chang V (2017) ABE with improved auxiliary input for big data security. J Comput Syst Sci 89:41–50
Xiong H, Choo KK, Vasilakos AV (2017) Revocable identity-based access control for big data with verifiable outsourced computing. IEEE Trans Big Data 6:1
Yan Z, Ding W, Yu X, Zhu H, Deng RH (2016) Deduplication on encrypted big data in cloud. IEEE Trans Big Data 2:138–150
Yan Z, Deng RH, Varadharajan V (2017) Cryptography and data security in cloud computing. Inf Syst 387:53–55
Yang LT, Huang G, Feng J, Xu L (2017) Parallel GNFS algorithm integrated with parallel block Wiedemann algorithm for RSA security in cloud computing. Inf Sci 387:254–265
Yang K, Han Q, Li H, Zheng K, Su Z, Shen X (2017) An efficient and fine-grained big data access control scheme with privacy-preserving policy. IEEE Internet Things J 2:563–571
Yang Y, Zheng X, Guo W, Liu X, Chang V (2018) Privacy-preserving smart IoT-based healthcare big data storage and self-adaptive access control system. Inf Sci:1–26
Zhou W, Feng D, Tan Z, Zheng Y (2018) Improving big data storage performance in hybrid environment. J Comput Sci 26:409–418
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
we as authors declares that there is no conflict of interest.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Verma, O.P., Jain, N. & Pal, S.K. Design and analysis of an optimal ECC algorithm with effective access control mechanism for big data. Multimed Tools Appl 79, 9757–9783 (2020). https://doi.org/10.1007/s11042-019-7677-2
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-019-7677-2