Skip to main content
Log in

2PBDC: privacy-preserving bigdata collection in cloud environment

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

The combination of two overlapping technologies (bigdata and cloud computing) helps easy access to the evolving applications. In this context, there is a serious requirement of ensuring the transmission of data securely in order to improve the productivity over the public channel. Since the data collected by various sources are strictly private and confidential, there is also a great requirement to deal with the privacy preservation of the bigdata. To handle this issue, a new privacy-preserving bigdata collection technique in cloud computing environment, called 2PBDC, has been designed, which allows secure communication between the bigdata gateway nodes and the cloud servers. 2PBDC is shown to be secure against various known attacks against an active/passive adversary through the formal security verification as well as informal security analysis. A detailed comparative study among 2PBDC and other existing schemes has been conducted. This study shows that 2PBDC offers a better trade-off among the security and functionality features and communication and computation overheads while these are compared with other schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. John Walker S (2014) Big data: a revolution that will transform how we live, work, and think. Taylor & Francis, London

    Google Scholar 

  2. Chen X, Li J, Weng J, Ma J, Lou W (2016) Verifiable computation over large database with incremental updates. IEEE Trans Comput 65(10):3184–3195

    Article  MathSciNet  Google Scholar 

  3. Cox M, Ellsworth D (1997) Application-controlled demand paging for out-of-core visualization. In: Proceedings of IEEE 8th Conference on Visualization (VIS’97), Phoenix, AZ, USA, pp 235–244

  4. Fact sheet: big data across the federal government, 2012. http://www.whitehouse.gov/sites/default/files/microsites/ ostp/big_data_fact_sheet_3_29_2012.pdf. Accessed Jan 2018

  5. Cukier K (2010) Data, data everywhere: a special report on managing information. Economist newspaper

  6. Drowning in numbers—digital data will flood the planet- and help us understand it better, 2011. http://www.economist.com/blogs/dailychart/2011/11/bigdata-0. Accessed Jan 2018

  7. Lohr S (2012) The age of big data. New York Times, p 11

  8. Yuki N (2011) The search for analysts to make sense of big data. http://www.npr.org/2011/11/30/142893065/the-searchforanalyststo-make-sense-o f-big-data. Accessed Jan 2018

  9. Manyika J, Byers AH, Chui M, Brown B, Bughin J, Dobbs R, Mckinsey Global Institute et al (2011) Big data: the next frontier for innovation, competition, and productivity, 2016

  10. Chen M, Mao S, Liu Y (2014) Big data: a survey. Mob Netw Appl 19(2):171–209

    Article  Google Scholar 

  11. Gartner (2013) Gartner says cloud computing will become the bulk of new IT spend by 2016. http://www.gartner.com/newsroom/id/2613015. Accessed Jan 2018

  12. Dolev D, Yao A (1983) On the security of public key protocols. IEEE Tran Inf Theory 29(2):198–208

    Article  MathSciNet  Google Scholar 

  13. Canetti R, Krawczyk H (2001) Analysis of key-exchange protocols and their use for building secure channels. In: International Conference on the Theory and Applications of Cryptographic Techniques—Advances in Cryptology (EUROCRYPT 2001), Innsbruck (Tyrol), Austria, pp 453–474. Springer

  14. Canetti R, Krawczyk H (2002) Universally composable notions of key exchange and secure channels. In: International Conference on the Theory and Applications of Cryptographic Techniques—Advances in Cryptology (EUROCRYPT 2002), Amsterdam, The Netherlands, pp 337–351

  15. AVISPA. Automated validation of internet security protocols and applications. http://www.avispa-project.org/. Accessed Mar 2018

  16. Chen CLP, Zhang CY (2014) Data-intensive applications, challenges, techniques and technologies: a survey on big data. Inf Sci 275:314–347

    Article  Google Scholar 

  17. Oussous A, Benjelloun FZ, Lahcen AA, Belfkih S (2017) Big Data technologies: a survey. J King Saud Univ Comput Inf Sci. https://doi.org/10.1016/j.jksuci.2017.06.001

    Article  Google Scholar 

  18. Aujla GS, Chaudhary R, Kumar N, Das AK, Rodrigues JJPC (2018) SecSVA: secure storage, verification, and auditing of big data in the cloud environment. IEEE Commun Mag 56(1):78–85

    Article  Google Scholar 

  19. Tsai JL, Lo NW (2015) A privacy-aware authentication scheme for distributed mobile cloud computing services. IEEE Syst J 9(3):805–815

    Article  Google Scholar 

  20. Odelu V, Das AK, Kumari S, Huang X, Wazid M (2017) Provably secure authenticated key agreement scheme for distributed mobile cloud computing services. Future Gener Comput Syst 68:74–88

    Article  Google Scholar 

  21. Amin R, Islam SKH, Biswas GP, Giri D, Khan MK, Kumar N (2016) A more secure and privacy-aware anonymous user authentication scheme for distributed mobile cloud computing environments. Secur Commun Netw 9(17):4650–4666

    Article  Google Scholar 

  22. Jannati H, Bahrak B (2017) An improved authentication protocol for distributed mobile cloud computing services. Int J Crit Infrastruct Prot 19:59–67

    Article  Google Scholar 

  23. Kumari S, Li X, Wu F, Das AK, Choo KKR, Shen J (2017) Design of a provably secure biometrics-based multi-cloud-server authentication scheme. Future Gener Comput Syst 68:320–330

    Article  Google Scholar 

  24. Li X, Kumari S, Shen J, Wu F, Chen C, Islam SKH (2017) Secure data access and sharing scheme for cloud storage. Wirel Pers Commun 96(4):5295–5314

    Article  Google Scholar 

  25. Wazid M, Das AK, Kumari S, Li X, Wu F (2016) Provably secure biometric-based user authentication and key agreement scheme in cloud computing. Secur Commun Netw 9(17):4103–4119

    Article  Google Scholar 

  26. Srinivas J, Das AK, Kumar N, Rodrigues JJPC (2018) Cloud centric authentication for wearable healthcare monitoring system. IEEE Trans Dependable Secure Comput. https://doi.org/10.1109/TDSC.2018.2828306

  27. Odelu V, Das AK, Goswami A (2015) A secure biometricsbased multi-server authentication protocol using smart cards. IEEE Trans Inf Forensics Secur 10(9):1953–1966

    Article  Google Scholar 

  28. Roy S, Chatterjee S, Das AK, Chattopadhyay S, Kumari S, Jo M (2017) Chaotic map-based anonymous user authentication scheme with user biometrics and fuzzy extractor for crowdsourcing internet of things. IEEE Internet Things J. https://doi.org/10.1109/JIOT.2017.2714179

    Article  Google Scholar 

  29. Wazid M, Das AK, Kumar N, Rodrigues JPC (2017) Secure three-factor user authentication scheme for renewable energy based smart grid environment. IEEE Trans Ind Inform 13(6):3144–3153

    Article  Google Scholar 

  30. Wazid M, Das AK, Kumar N, Conti M, Vasilakos AV (2018) A novel authentication and key agreement scheme for implantable medical devices deployment. IEEE J Biomed Health Inform 22(4):1299–1309

    Article  Google Scholar 

  31. Chatterjee S, Roy S, Das AK, Chattopadhyay S, Kumar N, Vasilakos AV (2016) Secure biometric-based authentication scheme using chebyshev chaotic map for multi-server environment. IEEE Trans Dependable Secure Comput. https://doi.org/10.1109/TDSC.2016.2616876

    Article  Google Scholar 

  32. Challa S, Das AK, Kumari S, Odelu V, Wu F, Li X (2016) Provably secure three-factor authentication and key agreement scheme for session initiation protocol. Secur Commun Netw 9(18):5412–5431

    Article  Google Scholar 

  33. Secure Hash Standard. FIPS PUB 180-1, National Institute of Standards and Technology (NIST), U.S. Department of Commerce, April 1995. http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf. Accessed on Apr 2017

  34. Vigano L (2006) Automated security protocol analysis with the AVISPA tool. Electron Notes Theor Comput Sci 155:61–86

    Article  Google Scholar 

  35. AVISPA. SPAN, the Security Protocol ANimator for AVISPA. http://www.avispa-project.org. Accessed on Jan 2018

  36. Jo HJ, Paik JH, Lee DH (2014) Efficient privacy-preserving authentication in wireless mobile networks. IEEE Trans Mob Comput 13(7):1469–1481

    Article  Google Scholar 

  37. Barker E. Recommendation for key management. Special publication 800-57 Part 1 Rev. 4, NIST, 01/2016. Accessed May 2018

Download references

Acknowledgements

This work has been supported by National Funding from the FCT – Fundação para a Ciência e a Tecnologia through the UID/EEA/50008/2013 Project; by the Government of Russian Federation, Grant 08-08; by Finep, with resources from Funttel, Grant No. 01.14.0231.00, under the Centro de Referência em Radiocomunicações – CRR project of the Instituto Nacional de Telecomunicações (Inatel), Brazil; and by Brazilian National Council for Scientific and Technological Development (CNPq) via Grant No. 309335/2017-5. This work was also supported by the Information Security Education and Awareness (ISEA) Phase II Project, Department of Electronics and Information Technology (DeitY), India.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ashok Kumar Das.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Srinivas, J., Das, A.K. & Rodrigues, J.J.P.C. 2PBDC: privacy-preserving bigdata collection in cloud environment. J Supercomput 76, 4772–4801 (2020). https://doi.org/10.1007/s11227-018-2605-1

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-018-2605-1

Keywords

Navigation