Abstract
Cloud databases provide facilities for large scale data storage and retrieval of distributed data. However, the current access control techniques provided in database systems for maintaining security are not sufficient to secure the private data stored in public cloud databases. In this paper, a new secured data storage algorithm for effective maintenance of confidential data is proposed. To perform storage and retrieval operations of data in the cloud data storage effectively, map reduce algorithms are developed in this work which performs data reduction and fast processing. In order to consider the temporal nature of documents to be retrieved, we propose a new algorithm called Temporal Secured Cloud Map Reduced Algorithm which integrates temporal constraints with map reduce algorithms and also the chaining Hill Cipher encryption algorithms which is proposed newly in this work. The main advantages of the proposed algorithm is that they reduce the processing time and maintains security effectively. The experimental results obtained from this work depict that the proposed model is optimizing cost and it ensures data security.





Similar content being viewed by others
References
Wang, Q., Wang, C., Ren, K., Lou, W., Li, J., et al. (2011). Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Transactions on Parallel and Distributed Systems, 22, 847–859.
Wang, C., Wang, Q., Ren, K., Cao, N., Lou, W., et al. (2012). Toward secure and dependable storage services in cloud computing. IEEE Transactions on Services Computing, 5, 220–232.
Lin, H. Y., Tzeng, W. G., et al. (2012). A secure erasure code-based cloud storage system with secure data forwarding. IEEE Transactions on Parallel and Distributed Systems, 23, 995–1003.
Bahga, A., Madisetti, V. K., et al. (2012). Analyzing massive machine maintenance data in a computing cloud. IEEE Transactions on Parallel and Distributed Systems, 23, 1831–1843.
Wang, C., Chow, S. S. M., Wang, Q., Ren, K., Lou, W., et al. (2013). Privacy-preserving public auditing for secure cloud storage. IEEE Transactions on Computers, 62, 362–375.
Zhu, Y., Hu, H., Ahn, G. J., Yu, M., et al. (2012). Cooperative provable data possession for integrity verification in multicloud storage. IEEE Transactions on Parallel and Distributed Systems, 23, 2231–2244.
Tang, Y., Lee, P. P. C., Lui, J. C. S., Perlman, R., et al. (2012). Secure overlay cloud storage with access control and assured deletion. IEEE Transactions on Dependable and Secure Computing, 9, 903–916.
Yang, K., Jia, X., et al. (2013). An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Transactions on Parallel and Distributed Systems, 24, 1717–1726.
Wang, H. (2013). Proxy provable data possession in public clouds. IEEE Transactions on Services Computing, 6, 551–559.
Liu, X., Zhang, Y., Wang, B., Yan, J., et al. (2013). Secure multi-owner data sharing for dynamic groups in the cloud. IEEE Transactions on Parallel and Distributed Systems, 24, 1182–1191.
Ren, K., Wang, C., Wang, K. Q., et al. (2012). Toward secure and effective data utilization in public cloud. IEEE Network, 26, 69–74.
Barsoum, A., Hasan, A., et al. (2013). Enabling dynamic data and indirect mutual trust for cloud computing storage systems. IEEE Transactions on Parallel and Distributed Systems, 24, 2375–2385.
Yuan, D., Yang, Y., Liu, X., Li, W., Cui, L., Xu, M., et al. (2013). A highly practical approach toward achieving minimum data sets storage cost in the cloud. IEEE Transactions on Parallel and Distributed Systems, 24, 1234–1244.
Chu, C. K., Chow, S. S. M., Tzeng, W. G., Zhou, J., Deng, R. H., et al. (2014). Key-aggregate cryptosystem for scalable data sharing in cloud storage. IEEE Transactions on Parallel and Distributed Systems, 25, 468–477.
Li, J., Li, B., et al. (2013). Erasure coding for cloud storage systems: A survey. Tsinghua Science and Technology, 18, 259–272.
Chen, H. C. H., Lee, P. P. C., et al. (2014). Enabling data integrity protection in regenerating-coding-based cloud storage: Theory and implementation. IEEE Transactions on Parallel and Distributed Systems, 25, 407–416.
Zhou, L., Varadharajan, V., Hitchens, M., et al. (2013). Achieving secure role-based access control on encrypted data in cloud storage. IEEE Transactions on Information Forensics and Security, 8, 1947–1960.
Cao, J., Li, K., Stojmenovic, I., et al. (2014). Optimal power allocation and load distribution for multiple heterogeneous multicore server processors across clouds and data centers. IEEE Transactions on Computers, 63, 45–58.
Ren, S., Vander Schaar, M., et al. (2013). Efficient resource provisioning and rate selection for stream mining in a community cloud. IEEE Transactions on Multimedia, 5, 723–734.
Yang, L., Cai, X., et al. (2014). A game-theoretic analysis to resolve the tussle in cloud storage services. An International Journal of Applied Mathematics and Information Sciences, 8, 1361–1367.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Muthurajkumar, S., Vijayalakshmi, M. & Kannan, A. Secured Data Storage and Retrieval Algorithm Using Map Reduce Techniques and Chaining Encryption in Cloud Databases. Wireless Pers Commun 96, 5621–5633 (2017). https://doi.org/10.1007/s11277-017-4437-3
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-017-4437-3