Skip to main content
Log in

Efficient and secure BIG data delivery in Cloud Computing

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Big Data (BD) is a new technology which rapidly growing in the telecommunications sectors, especially in the contemporary field of wireless telecommunications. Another technology that grows rapidly in the field of wireless telecommunications is Cloud Computing (CC). CC concerns an infrastructure where data storage and processing take place outside of the user’s device. Both of them face security and privacy issues in their function. In order to improve them and to optimize their privacy and security issues conducted the present survey. In this paper, we survey BD and CC technology and their basic characteristics, with a focus on the security and privacy issues of both technologies. Specifically, we try to combine the functionality of the two technologies (i.e BD and CC) with the aim to examine the frequent features, and also to discover the benefits related in security issues of their integration. Concluding, we present a new method of an algorithm that can be used for the purpose of improving Cloud Computing’s security through the use of algorithms that can provide more privacy in the data related to Big Data technology. At the end, there is a survey about the challenges of the integration of BD and CC related to their security level.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. (2010) Cloud data storage services. IEEE Netw 24(4):19–24

  2. Abdul Elminaam DS, Abdul Kader HM, Hadhoud MM (2009) Performance evaluation of symmetric encryption algorithms. Communications of the IBIMA Volume 8

  3. Ali M et al (2015) Security in cloud computing: opportunities and challenges. Inf Sci 305:357–383

    Article  MathSciNet  Google Scholar 

  4. Alsmirat MA, Jararweh Y, Obidat I, Gupta BB Internet of surveillance: a cloud supported large scale wireless surveillance system. J Supercomputing, Springer (IF=1.08)

  5. Andersson S et al (2013) A study of the advantages & disadvantages of mobile cloud computing versus native environment. Blekinge Institute of Technology, Karlskrona

    Google Scholar 

  6. Awodele O et al (2016) Big data and cloud computing issues. Int J Comput Appl 12(133):14–19

    Google Scholar 

  7. Badve OP, Gupta BB, Gupta S (2016) Reviewing the security features in contemporary security policies and models for multiple platforms, handbook of research on modern cryptographic solutions for computer and cyber security. IGI-Global's advances in information security, privacy, and ethics (AISPE) series, USA

  8. Bhavani S et al (2015) Study on cloud computing and different load balancing algorithms in cloud computing. Int J Emerg Res Manag Technol 5(4):331–336

    Google Scholar 

  9. Blog: follow what’s happening at get cloud services, mobile cloud computing – pros and cons, getcloud services, 23/12/2014. [Online]. Available: https://www.getcloudservices.com/blog/mobile-cloud-computing-prosand-cons/. Accessed 24 Jan 2015

  10. Cloud news daily, guide to big data analytics: platforms, software, companies tools, solutions and hadoop, cloud news daily, 12/12/2015. [Online]. Available: http://cloudnewsdaily.com/big-data-analytics/. Accessed 21 May 2016

  11. Dinh HT et al (2011) A survey of mobile cloud computing: architecture, applications, and approaches. Wirel Commun Mob Comput 13:1587–1611

    Article  Google Scholar 

  12. Elaine Shi RC et al (2011) Implicit authentication through learning user behavior. Inf Secur 6531:99–113

    Google Scholar 

  13. Fernando N et al (2012) Mobile cloud computing: a survey. Futur Gener Comput Syst 29:84–106

    Article  Google Scholar 

  14. Fremdt S et al (2013) Does cloud computing matter? an analysis of the cloud model software-as-a-service and its impact on operational agility. 46th Hawaii Intern Conference Syst Sci, pp 1025–1034

  15. Garg SK, Versteeg S, Buyya R (2013) A framework for ranking of cloud computing services. Futur Gener Comput Syst 29(4):1012–1023

    Article  Google Scholar 

  16. Goswami K, Lee J-H, Kim B-G (2016) Fast algorithm for the high efficiency video coding (HEVC) encoder using texture analysis. Inf Sci 364–365(10):72–90

    Article  Google Scholar 

  17. Hilbert M, López P (2011) The world’s technological capacity to store, communicate, and compute information. Science 332(6025):60–65. doi:10.1126/science.1200970

    Article  Google Scholar 

  18. Huang D (2011) Mobile cloud computing. IEEE COMSOC Multimedia Communications Technical Committee (MMTC) E-Letter 6(10):27–31

    Google Scholar 

  19. Iqbal R et al (2016) Big data analytics: computational intelligence techniques and application areas. Int J Inf Manag 1–11

  20. Kaur R, Kinger S (2014) Analysis of security algorithms in cloud computing. Int J Appl Innov Eng Manag (IJAIEM) 3(3):171–176

    Google Scholar 

  21. Kryftis Y, Mastorakis G, Mavromoustakis C, Mongay Batalla J, Pallis E, Kormentzas G (2016) Efficient entertainment services provision over a novel network architecture. IEEE Wirel Commun. doi:10.1109/MWC.2016.7422401

    Google Scholar 

  22. Kumar Y, Munjal R, Sharma H (2011) Comparison of symmetric and asymmetric cryptography with existing vulnerabilities and countermeasures. IJCSMS Int J Comput Sci Manag Stud 11(03)

  23. Md Whaiduzzaman G et al (2014) A study on strategic provision of cloud computing services. Sci World J 1–8

  24. Mongay Batalla J, Krawiec P, Bęben A, Wiśniewski P, Chydziński A (2016) Adaptive video streaming: rate and buffer on the track of minimum re-buffering. IEEE J Sel Areas Commun. doi:10.1109/JSAC.2016.2577360

    Google Scholar 

  25. Mongay Batalla J, Mastorakis G, Mavromoustakis C (2016) On cohabitating networking technologies with common wireless access for home automation systems purposes. To be published in IEEE Wireless Communications Magazine

  26. Park C-S, Kim B-G (2016) Performance analysis of inter-layer prediction for scalable extension of the HEVC standard for adaptive media. Service Displays J 44:27–36

    Article  Google Scholar 

  27. Pfarr F et al (2014) Cloud computing data protection – a literature review and analysis. 47th Hawaii International Conference on System Science, pp 5018–5027

  28. Rallapalli S, Gondkar RR, Ketavarapu UPK (2015) Impact of processing and analyzing healthcare big data on cloud computing environment by implementing hadoop cluster. International Conference on Computational Modeling and Security (CMS2016). Procedia Comput Sci 85(2016):16–22

    Google Scholar 

  29. Russom P (2011) Big data analytics. TDWI - The Data Warehousing Institute, USA

    Google Scholar 

  30. Sachdev A, Bhansali M (2013) Enhancing cloud computing security using AES algorithm. Int J Comput Appl 9(67):19–23

    Google Scholar 

  31. Sakr S, Liu A, Batista DM, Alomari M (2011) A survey of large scale data management approaches in cloud environments. IEEE Commun Surv Tutorials 13(3):311–336

    Article  Google Scholar 

  32. Sathya S, Avinash R (2015) Big data and cloud computing. In: Rathinam college National Conference, Echanari

  33. Singh G, Supriya Kinger Integrating AES (2013) DES, and 3-DES encryption algorithms for enhanced data security. Int J Sci Eng Res 4(7)

  34. Skourletopoulos G, Mavromoustakis CX, Mastorakis G, Mongay BJ, Sahalos JN (2016) An evaluation of cloud-based mobile services with limited capacity: a linear approach. Soft Comput J. doi:10.1007/s00500-016-2083-4

    Google Scholar 

  35. Stergiou C, Psannis KE (2016) Recent advances delivered by mobile cloud computing and internet of things for big data applications: a survey. Int J Net Manag 1–12

  36. Stergiou C, Psannis KE, Kim B-G, Gupta B (2016) Secure integration of IoT and cloud computing. Elsevier, Future Generation Computer Systems

  37. Takabi H et al (2010) Security and privacy challenges in cloud computing environments. IEEE Comput Reliab Soc 24–31

  38. The Economist (2010) Data, data everywhere. Retrieved 26 September 2015

  39. The NIST definition of cloud computing. National Institute of Standards and Technology, Retrieved 24 July 2011

  40. Vajjhala NR, Ramollari E (2016) Big data using cloud computing - opportunities for small and medium-sized enterprises. Eur J Econ Bus Stud 1(4):129–137

    Article  Google Scholar 

  41. Veluru S, Rahulamathavan Y, Gupta BB, Rajarajan M (2014) Privacy preserving text analytics: research challenges and strategies in name analysis, book on securing cloud-based databases with biometric applications. IGI-Global's advances in information security, privacy, and ethics (AISPE) series.

  42. Villars L et al (2012) The critical role of the network in big data applications, IDC analyze th future, 1–12

  43. Viswanathan P (2012) Cloud computing – is it really all that beneficial? abouttech. [Online]. Available: http://mobiledevices.about.com/od/additionalresources/a/Cloud-Computing-Is-It-Really-All-That-Beneficial.htm. Accessed 24 Jan 2015

  44. Zhou P et al (2016) Differentially private online learning for cloud-based video recommendation with multimedia big data in social networks. IEEE Trans Multimedia 6(18):1217–1229

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kostas E. Psannis.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Stergiou, C., Psannis, K.E. Efficient and secure BIG data delivery in Cloud Computing. Multimed Tools Appl 76, 22803–22822 (2017). https://doi.org/10.1007/s11042-017-4590-4

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-017-4590-4

Keywords

Navigation