Skip to main content
Log in

Design and analysis of an optimal ECC algorithm with effective access control mechanism for big data

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Big data is a high volume data, as it comprises complex and large volume of information. A successful solution is to redistribute the data to a cloud server that has the capacity of storing and processing big data in an effective manner. The main intention of the research is to secure storage of big data and effective access control mechanism. The main stages of the proposed method are map reduce framework, secure storage process and access control mechanism process. Map Reduce is a distributed programming framework used to process big data. In mapper, the input dataset is grouped using hybrid kernel fuzzy c means (HKFCM) clustering algorithm. Finally, the reduced output is fed to the data owner for secure storage. In secure storage process, the suggested method utilizes optimal elliptic curve cryptography (OECC). Here the fundamental values are optimally selected by Modified grasshopper optimization algorithm (MGOA). In the access control mechanism, the effective policy update is proposed along with data storage construction and data deconstruction stage. The routine of the recommended method is assessed using memory and execution time by differentiating the number data size, number cluster size and the number of mapper. The proposed method attains the minimum time and memory utilization when compared to the existing method. The suggested method is implemented in cloud sim with Hadoop Map-reduce framework.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Assunção MD, Calheiros RN, Bianchi S, Netto MA, Buyya R (2015) Big data computing and clouds: trends and future directions. J Parallel Distrib Comput 79:3–15

    Article  Google Scholar 

  2. Batista BG, Ferreira CH, Segura DC, Leite Filho DM, Peixoto ML (2017) A QoS-driven approach for cloud computing addressing attributes of performance and security. Futur Gener Comput Syst 68:260–274

    Article  Google Scholar 

  3. Bui DM, Yoon Y, Huh EN, Jun S, Lee S (2017) Energy efficiency for cloud computing system based on predictive optimization. J Parallel Distrib Comput 102:103–114

    Article  Google Scholar 

  4. Chen G, Wu S, Wang Y (2015) The evolvement of big data systems: from the perspective of an information security application. Big Data Research 2(2):65–73

    Article  Google Scholar 

  5. UCI Machine Learning Repository (1999), from http://archive.ics.uci.edu/ml/datasets/kdd+cup+1999+data.

  6. Fugkeaw S, Sato H (2018) Scalable and secure access control policy update for outsourced big data. Futur Gener Comput Syst 79:364–373

    Article  Google Scholar 

  7. Hashem IA, Yaqoob I, Anuar NB, Mokhtar S, Gani A, Khan SU (2015) The rise of “big data” on cloud computing: review and open research issues. Inf Syst 47:98–115

    Article  Google Scholar 

  8. Hu C, Cheng X, Tian Z, Yu J, Akkaya K, Sun L (2015) An attribute-based sign cryption scheme to secure attribute-defined multicast communications. In: Secure comm, pp 418–437

  9. Kindervag J, Balaouras S, Hill B, Mak K (2012) Control and protect sensitive information in the era of big data, pp 1–7

  10. Kshetri N (2014) Big data′ s impact on privacy, security and consumer welfare. Telecommun Policy 38:1134–1145

    Article  Google Scholar 

  11. Li P, Guo S, Miyazaki T, Xie M, Hu J, Zhuang W (2016) Privacy-preserving access to big data in the cloud. IEEE Cloud Comput 5:34–42

    Article  Google Scholar 

  12. Nigoti R, Jhuria M, Singh S (2013) A survey of cryptographic algorithms for cloud computing. J Emerging Tech Comp App Sci 4:141–146

    Google Scholar 

  13. Perera C, Ranjan R, Wang L, Khan SU, Zomaya AY (2015) Big data privacy in the internet of things era. IT Prof 17:32–39

    Article  Google Scholar 

  14. Ramachandran M (2016) Software security requirements management as an emerging cloud computing service. Int J Inf Manage 4:580–590

    Article  Google Scholar 

  15. Shanmugapriya E, Kavitha R (2019) Medical big data analysis: preserving security and privacy with hybrid cloud technology. Soft Comput. https://doi.org/10.1007/s00500-019-03857-z

  16. Shen J, Wang C, Wang A, Ji S, Zhang Y (2018) A searchable and verifiable data protection scheme for scholarly big data. IEEE Emerg Top Com 14:8

    Google Scholar 

  17. Singh S, Jeong YS, Park JH (2016) A survey on cloud computing security: issues, threats, and solutions. J Netw Comput Appl 75:200–222

    Article  Google Scholar 

  18. Tan Z, Nagar UT, He X, Nanda P, Liu RP, Wang S, Hu J (2014) Enhancing big data security with collaborative intrusion detection. IEEE Cloud Comput 3:27–33

    Article  Google Scholar 

  19. Thiyagarajan VS, Ayyasamy A (2017) Privacy preserving over big data through VSSFA and MapReduce framework in cloud environment. Wirel Pers Commun 4:6239–6263

    Article  Google Scholar 

  20. Wang Z, Cao C, Yang N, Chang V (2017) ABE with improved auxiliary input for big data security. J Comput Syst Sci 89:41–50

    Article  MathSciNet  Google Scholar 

  21. Xiong H, Choo KK, Vasilakos AV (2017) Revocable identity-based access control for big data with verifiable outsourced computing. IEEE Trans Big Data 6:1

    Article  Google Scholar 

  22. Yan Z, Ding W, Yu X, Zhu H, Deng RH (2016) Deduplication on encrypted big data in cloud. IEEE Trans Big Data 2:138–150

    Article  Google Scholar 

  23. Yan Z, Deng RH, Varadharajan V (2017) Cryptography and data security in cloud computing. Inf Syst 387:53–55

    MATH  Google Scholar 

  24. Yang LT, Huang G, Feng J, Xu L (2017) Parallel GNFS algorithm integrated with parallel block Wiedemann algorithm for RSA security in cloud computing. Inf Sci 387:254–265

    Article  Google Scholar 

  25. Yang K, Han Q, Li H, Zheng K, Su Z, Shen X (2017) An efficient and fine-grained big data access control scheme with privacy-preserving policy. IEEE Internet Things J 2:563–571

    Article  Google Scholar 

  26. Yang Y, Zheng X, Guo W, Liu X, Chang V (2018) Privacy-preserving smart IoT-based healthcare big data storage and self-adaptive access control system. Inf Sci:1–26

  27. Zhou W, Feng D, Tan Z, Zheng Y (2018) Improving big data storage performance in hybrid environment. J Comput Sci 26:409–418

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nitin Jain.

Ethics declarations

Conflict of interest

we as authors declares that there is no conflict of interest.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Verma, O.P., Jain, N. & Pal, S.K. Design and analysis of an optimal ECC algorithm with effective access control mechanism for big data. Multimed Tools Appl 79, 9757–9783 (2020). https://doi.org/10.1007/s11042-019-7677-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-7677-2

Keywords

Navigation