Skip to main content
Log in

An Efficient Authentication Scheme to Protect User Privacy in Seamless Big Data Services

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Recently, due to the increase in the volume and types of data processed in cloud environments, methods that allow easy access to Big Data stored in heterogeneous devices in different network environments are in demand. This study proposes a security management scheme that allows users to easily access Big Data from different network environments by assigning a key shared among users and servers, and linking Big Data and user’s attribute information in order to protect the privacy of users using Big Data in cloud environments and the data itself. The proposed scheme possesses a high level of safety even when the user-generated random-bit signal is interrupted or modulated by a third party. It is also used in sharing users’ security awareness information since it passes sufficient random bits. In addition, users’ anonymity is guaranteed because the scheme passes hash-chained bit sequence values so the bit sequence that generates security awareness information is not exposed unnecessarily to a third party.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Zheng, Z, Zhu, J, Lyu, M. R. (2013) Service-generated big data and big data-as-a-service: An overview. In 2013 IEEE international congress on Big Data, pp. 403–410.

  2. Katal, A, Wazid, M., Goudar, R. H. (2013). Big data: Issues, challenges, tools and good practices. In 2013 Sixth international conference on contemporary computing (IC3), pp. 404–409.

  3. Weigang, L., Sandes, E. F. O., Zheng, J., de Melo, A. C. M. A., & Uden, L. (2014). Querying dynamic communities in online social netowrks. Journal of Zhejiang University Science C, 15(2), 81–90.

    Article  Google Scholar 

  4. Wu, X., Zhu, X., Wu, G. Q., & Ding, W. (2014). Data mining with big data. IEEE Transactions on Knowledge and Data Engineering, 1126(1), 97–107.

    Google Scholar 

  5. Kim, H. S., & Park, C. S. (2010). Cloud computing and personal authentication service. Journal of the Korea Institute of Information Security and Cryptology, 1120(2), 11–19.

    Google Scholar 

  6. Lee, K. H., Choi, H. S., & Chung, Y. D. (2011). Massive data processing and management in cloud computing : A survey. Journal of KISS : Databases, 1138(2), 104–125.

    Google Scholar 

  7. Yi, X., Liu, F., Liu, J., & Jin, H. (2014). Building a network highway for big data: Architecture and challenges. IEEE Journal and Managines, 28(4), 5–13.

    Google Scholar 

  8. Priyadharshini, B, & Parvathi, P. (2012). Data integrity in cloud storage. In IEEE-international conference on advances in engineering, science and management (ICAESM-2012), pp. 261–264.

  9. Michael, K., & Miller, K. W. (2013). Big Data: New opportunities and new challenges. IEEE Journals and Manazines, 15(2), 81–90.

    Google Scholar 

  10. Cheng, Y., Wang, Z. Y., Ma, J., Wu, J. J., Mei, S. Z., & Ren, J. C. (2013). Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage. Journal of Zhejiang University SCIENCE C, 14(2), 85–97.

    Article  Google Scholar 

  11. Xu, Y. H., Chow, C. O., Tham, M. L., & Ishii, H. (2014). An enhanced framework for providing multimedia broadcast/multicast service over heterogeneous networks. Journal of Zhejiang University Science C, 15(1), 63–80.

    Article  Google Scholar 

  12. Sobe, F., Josep, D. F., Antoni, M. B., Deswarte, Y., & Quisquater, J. J. (2008). Efficient remote data possession checking in critical information infrastructures. IEEE Transactions on Knowledge and Data Engineering, 11(20), 1034–1038.

    Article  Google Scholar 

  13. Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., & Song, D. (2007). Provable data possession at untrusted sotres. In CCS, pp. 598–609.

  14. Wang, C., Wang, Q., Ren, K., Lou, W. (2010) Privacy-preserving public auditing for data storage security in cloud computing. In Proceedings of the 29th conference on information communications, San Diego, CA, pp. 525–533.

  15. Erway, C., Kupcu, A., Papamanthou, C., & Tamassia, R. (2009). Dynamic provable data possession. In Proceedings of 16th ACM conference computer and communications security (CCS’09), pp. 213–222.

  16. Ateniese, G., Pietro, R. D., Mancini, L. V., & Tsudik, G. (2008) Scalable and efficient provable data possession. In Secure Communications, pp. 1–10.

  17. Wang, Q., Wang, C., Li, J., Ren, K., Lou, W. (2009). Enalbing public verifiability and data dynamics for storage security in cloud computing. In 14th European symposium on research in computer security (ESORICS 2009), Saint Malo, France, pp. 355–370.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yoon-Su Jeong.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jeong, YS., Shin, SS. An Efficient Authentication Scheme to Protect User Privacy in Seamless Big Data Services. Wireless Pers Commun 86, 7–19 (2016). https://doi.org/10.1007/s11277-015-2990-1

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-015-2990-1

Keywords