Abstract
Recently, due to the increase in the volume and types of data processed in cloud environments, methods that allow easy access to Big Data stored in heterogeneous devices in different network environments are in demand. This study proposes a security management scheme that allows users to easily access Big Data from different network environments by assigning a key shared among users and servers, and linking Big Data and user’s attribute information in order to protect the privacy of users using Big Data in cloud environments and the data itself. The proposed scheme possesses a high level of safety even when the user-generated random-bit signal is interrupted or modulated by a third party. It is also used in sharing users’ security awareness information since it passes sufficient random bits. In addition, users’ anonymity is guaranteed because the scheme passes hash-chained bit sequence values so the bit sequence that generates security awareness information is not exposed unnecessarily to a third party.



Similar content being viewed by others
References
Zheng, Z, Zhu, J, Lyu, M. R. (2013) Service-generated big data and big data-as-a-service: An overview. In 2013 IEEE international congress on Big Data, pp. 403–410.
Katal, A, Wazid, M., Goudar, R. H. (2013). Big data: Issues, challenges, tools and good practices. In 2013 Sixth international conference on contemporary computing (IC3), pp. 404–409.
Weigang, L., Sandes, E. F. O., Zheng, J., de Melo, A. C. M. A., & Uden, L. (2014). Querying dynamic communities in online social netowrks. Journal of Zhejiang University Science C, 15(2), 81–90.
Wu, X., Zhu, X., Wu, G. Q., & Ding, W. (2014). Data mining with big data. IEEE Transactions on Knowledge and Data Engineering, 1126(1), 97–107.
Kim, H. S., & Park, C. S. (2010). Cloud computing and personal authentication service. Journal of the Korea Institute of Information Security and Cryptology, 1120(2), 11–19.
Lee, K. H., Choi, H. S., & Chung, Y. D. (2011). Massive data processing and management in cloud computing : A survey. Journal of KISS : Databases, 1138(2), 104–125.
Yi, X., Liu, F., Liu, J., & Jin, H. (2014). Building a network highway for big data: Architecture and challenges. IEEE Journal and Managines, 28(4), 5–13.
Priyadharshini, B, & Parvathi, P. (2012). Data integrity in cloud storage. In IEEE-international conference on advances in engineering, science and management (ICAESM-2012), pp. 261–264.
Michael, K., & Miller, K. W. (2013). Big Data: New opportunities and new challenges. IEEE Journals and Manazines, 15(2), 81–90.
Cheng, Y., Wang, Z. Y., Ma, J., Wu, J. J., Mei, S. Z., & Ren, J. C. (2013). Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage. Journal of Zhejiang University SCIENCE C, 14(2), 85–97.
Xu, Y. H., Chow, C. O., Tham, M. L., & Ishii, H. (2014). An enhanced framework for providing multimedia broadcast/multicast service over heterogeneous networks. Journal of Zhejiang University Science C, 15(1), 63–80.
Sobe, F., Josep, D. F., Antoni, M. B., Deswarte, Y., & Quisquater, J. J. (2008). Efficient remote data possession checking in critical information infrastructures. IEEE Transactions on Knowledge and Data Engineering, 11(20), 1034–1038.
Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., & Song, D. (2007). Provable data possession at untrusted sotres. In CCS, pp. 598–609.
Wang, C., Wang, Q., Ren, K., Lou, W. (2010) Privacy-preserving public auditing for data storage security in cloud computing. In Proceedings of the 29th conference on information communications, San Diego, CA, pp. 525–533.
Erway, C., Kupcu, A., Papamanthou, C., & Tamassia, R. (2009). Dynamic provable data possession. In Proceedings of 16th ACM conference computer and communications security (CCS’09), pp. 213–222.
Ateniese, G., Pietro, R. D., Mancini, L. V., & Tsudik, G. (2008) Scalable and efficient provable data possession. In Secure Communications, pp. 1–10.
Wang, Q., Wang, C., Li, J., Ren, K., Lou, W. (2009). Enalbing public verifiability and data dynamics for storage security in cloud computing. In 14th European symposium on research in computer security (ESORICS 2009), Saint Malo, France, pp. 355–370.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Jeong, YS., Shin, SS. An Efficient Authentication Scheme to Protect User Privacy in Seamless Big Data Services. Wireless Pers Commun 86, 7–19 (2016). https://doi.org/10.1007/s11277-015-2990-1
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-015-2990-1