Abstract
In the present scenario, big data is facing many challenges regarding the data storage, data theft and unauthorized access. Many researchers are concentrated on developing the security mechanism for big data storage. To overcome the above issue, this paper concentrated on developing the encryption algorithm for storing big data in the multi cloud storage. The multi cloud storage environment permits the user to store the data in to different cloud storage services. This paper aims to develop the secure framework which restricts the insider attacks. The proposed framework contains data uploading, slicing, indexing, encryption, distribution, decryption, retrieval and merging process. The hybrid encryption algorithm was developed to provide the security to the big data before storing it in to the multi cloud. The Simulation analysis is carried with real time cloud storage environments. The proposed algorithm recorded around 2630 KB/S for the encryption process. The results prove the superiority of the proposed algorithm compared to the bench mark algorithms.
Similar content being viewed by others
References
Canalys 2018. https://www.canalys.com/newsroom/cloud-market-share-q4-2018-and-full-year-2018. Accessed 11 Jan 2019
Hashem IAT, Yaqoob I, Anuar NB, Mokhtar S, Gani A, Khan SU (2015) The rise of “big data” on cloud computing: review and open research issues. Inf Syst 47:98–115
AlZain, MA., Eric P, Ben S, James AT (2012) Cloud computing security: from single to multi-clouds. In: 2012 45th Hawaii international conference on system sciences. IEEE, pp 5490–5499
Fu Z, Sun X, Liu Q, Zhou L, Shu J (2015) Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans Commun 98(1):190–200
Li R, Xu Z, Kang W, Yow KC, Xu CZ (2014) Efficient multi-keyword ranked query over encrypted data in cloud computing. Future Gener Comput Syst 30:179–190
Xia Z, Wang X, Sun X, Wang Q (2015) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 27(2):340–352
Somani U, Kanika L, Manish M (2010) Implementing digital signature with RSA encryption algorithm to enhance the Data Security of cloud in Cloud Computing. In: 2010 First international conference on parallel, distributed and grid computing (PDGC 2010). IEEE, pp. 211–216
Li P, Li J, Huang Z, Gao C-Z, Chen W-B, Chen K (2018) Privacy-preserving outsourced classification in cloud computing. Cluster Comput 21(1):277–286
Yang K, Jia X, Ren K, Zhang Bo, Xie R (2013) DAC-MACS: effective data access control for multiauthority cloud storage systems. IEEE Trans Inf Forensics Secur 8(11):1790–1801
Li M, Shucheng Yu, Zheng Y, Ren K, Lou W (2012) Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans Parallel Distrib Syst 24(1):131–143
Yang J-J, Li J-Q, Niu Yu (2015) A hybrid solution for privacy preserving medical data sharing in the cloud environment. Future Gener Comput Syst 43:74–86
Akioka S, Muraoka Y (2010) HPC benchmarks on Amazon EC2, IEEE, pp 1029–1034
O’Reilly Media: https://www.oreilly.com/ideas/what-is-big-data
Wang F, Mickens J, Zeldovich N, Vaikuntanathan V (2016) Sieve: cryptographically enforced access control for user data in untrusted clouds. NSDI 16:611–626
Singh AP, Pasupuleti SK (2016) Optimized public auditing and data dynamics for data storage security in cloud computing. Proc Comput Sci 93:751–759
Matallah H, Belalem G, Bouamrane K (2017) Towards a new model of storage and access to data in big data and cloud computing. Int J Ambient Comput Intell 8(4):31–44
Manogaran G, Thota C, Lopez D, Sundarasekar R (2017) Big data security intelligence for healthcare industry 4.0. In: Cybersecurity for Industry 4.0. Springer, Cham, pp 103–126
Jakóbik A, Grzonka D, Palmieri F (2017) Non-deterministic security driven meta scheduler for distributed cloud organizations. Simul Model Pract Theory 76:67–81
Cai H, Boyi Xu, Jiang L, Vasilakos AV (2017) IoT-based big data storage systems in cloud computing: perspectives and challenges. IEEE Internet Things J 4(1):75–87
Althamary IA, Alkharobi TM (2016) Secure file sharing in multi-cloud using shamir’s secret sharing scheme. Trans Netw Commun 4(6):53–67
Jouini M, Rabai LBA (2019) A security framework for secure cloud computing environments. In: Cloud security: concepts, methodologies, tools, and applications. IGI Global, pp. 249–263
Du M, Wang Q, He M, Weng J (2018) Privacy-preserving indexing and query processing for secure dynamic cloud storage. IEEE Trans Inf Forensics Secur 13(9):2320–2332
Kuwakado H, Morii M (2010) Quantum distinguisher between the 3-round Feistel cipher and the random permutation. In: IEEE international symposium on information theory. IEEE, pp 2682–2685
Mahajan P, Sachdeva A (2013) A study of encryption algorithms AES, DES and RSA for security. Glob J Comput Sci Technol 13(15):15–22
Devi G, Kumar MP (2012) Cloud computing: a CRM service based on a separate encryption and decryption using Blowfish Algorithm. Int J Comput Trends Technol 3(4):592–596
Lu CC, Tseng SY (2002) Integrated design of AES (Advanced Encryption Standard) encrypter and decrypter. In: Proceedings. The IEEE international conference on application-specific systems, architectures and processors. IEEE, pp 277–285
Rivest RL, Robshaw MJ, Sidney R, Yin YL (1998) The RC6 block cipher. In: First advanced encryption standard (AES) conference
Health Data: https://healthdata.gov/search/type/dataset. Accessed on 12 Apr 2019
Elminaam DS, Abdual-Kader HM, Hadhoud MM (2010) Evaluating the performance of symmetric encryption algorithms. IJ Netw Secur 10:216–222
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Viswanath, G., Krishna, P.V. Hybrid encryption framework for securing big data storage in multi-cloud environment. Evol. Intel. 14, 691–698 (2021). https://doi.org/10.1007/s12065-020-00404-w
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12065-020-00404-w