Skip to main content
Log in

Hybrid encryption framework for securing big data storage in multi-cloud environment

  • Special Issue
  • Published:
Evolutionary Intelligence Aims and scope Submit manuscript

Abstract

In the present scenario, big data is facing many challenges regarding the data storage, data theft and unauthorized access. Many researchers are concentrated on developing the security mechanism for big data storage. To overcome the above issue, this paper concentrated on developing the encryption algorithm for storing big data in the multi cloud storage. The multi cloud storage environment permits the user to store the data in to different cloud storage services. This paper aims to develop the secure framework which restricts the insider attacks. The proposed framework contains data uploading, slicing, indexing, encryption, distribution, decryption, retrieval and merging process. The hybrid encryption algorithm was developed to provide the security to the big data before storing it in to the multi cloud. The Simulation analysis is carried with real time cloud storage environments. The proposed algorithm recorded around 2630 KB/S for the encryption process. The results prove the superiority of the proposed algorithm compared to the bench mark algorithms.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Canalys 2018. https://www.canalys.com/newsroom/cloud-market-share-q4-2018-and-full-year-2018. Accessed 11 Jan 2019

  2. Hashem IAT, Yaqoob I, Anuar NB, Mokhtar S, Gani A, Khan SU (2015) The rise of “big data” on cloud computing: review and open research issues. Inf Syst 47:98–115

    Article  Google Scholar 

  3. AlZain, MA., Eric P, Ben S, James AT (2012) Cloud computing security: from single to multi-clouds. In: 2012 45th Hawaii international conference on system sciences. IEEE, pp 5490–5499

  4. Fu Z, Sun X, Liu Q, Zhou L, Shu J (2015) Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans Commun 98(1):190–200

    Article  Google Scholar 

  5. Li R, Xu Z, Kang W, Yow KC, Xu CZ (2014) Efficient multi-keyword ranked query over encrypted data in cloud computing. Future Gener Comput Syst 30:179–190

    Article  Google Scholar 

  6. Xia Z, Wang X, Sun X, Wang Q (2015) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 27(2):340–352

    Article  Google Scholar 

  7. Somani U, Kanika L, Manish M (2010) Implementing digital signature with RSA encryption algorithm to enhance the Data Security of cloud in Cloud Computing. In: 2010 First international conference on parallel, distributed and grid computing (PDGC 2010). IEEE, pp. 211–216

  8. Li P, Li J, Huang Z, Gao C-Z, Chen W-B, Chen K (2018) Privacy-preserving outsourced classification in cloud computing. Cluster Comput 21(1):277–286

    Article  Google Scholar 

  9. Yang K, Jia X, Ren K, Zhang Bo, Xie R (2013) DAC-MACS: effective data access control for multiauthority cloud storage systems. IEEE Trans Inf Forensics Secur 8(11):1790–1801

    Article  Google Scholar 

  10. Li M, Shucheng Yu, Zheng Y, Ren K, Lou W (2012) Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans Parallel Distrib Syst 24(1):131–143

    Article  Google Scholar 

  11. Yang J-J, Li J-Q, Niu Yu (2015) A hybrid solution for privacy preserving medical data sharing in the cloud environment. Future Gener Comput Syst 43:74–86

    Article  Google Scholar 

  12. Akioka S, Muraoka Y (2010) HPC benchmarks on Amazon EC2, IEEE, pp 1029–1034

  13. O’Reilly Media: https://www.oreilly.com/ideas/what-is-big-data

  14. Wang F, Mickens J, Zeldovich N, Vaikuntanathan V (2016) Sieve: cryptographically enforced access control for user data in untrusted clouds. NSDI 16:611–626

    Google Scholar 

  15. Singh AP, Pasupuleti SK (2016) Optimized public auditing and data dynamics for data storage security in cloud computing. Proc Comput Sci 93:751–759

    Article  Google Scholar 

  16. Matallah H, Belalem G, Bouamrane K (2017) Towards a new model of storage and access to data in big data and cloud computing. Int J Ambient Comput Intell 8(4):31–44

    Article  Google Scholar 

  17. Manogaran G, Thota C, Lopez D, Sundarasekar R (2017) Big data security intelligence for healthcare industry 4.0. In: Cybersecurity for Industry 4.0. Springer, Cham, pp 103–126

  18. Jakóbik A, Grzonka D, Palmieri F (2017) Non-deterministic security driven meta scheduler for distributed cloud organizations. Simul Model Pract Theory 76:67–81

    Article  Google Scholar 

  19. Cai H, Boyi Xu, Jiang L, Vasilakos AV (2017) IoT-based big data storage systems in cloud computing: perspectives and challenges. IEEE Internet Things J 4(1):75–87

    Article  Google Scholar 

  20. Althamary IA, Alkharobi TM (2016) Secure file sharing in multi-cloud using shamir’s secret sharing scheme. Trans Netw Commun 4(6):53–67

    Google Scholar 

  21. Jouini M, Rabai LBA (2019) A security framework for secure cloud computing environments. In: Cloud security: concepts, methodologies, tools, and applications. IGI Global, pp. 249–263

  22. Du M, Wang Q, He M, Weng J (2018) Privacy-preserving indexing and query processing for secure dynamic cloud storage. IEEE Trans Inf Forensics Secur 13(9):2320–2332

    Article  Google Scholar 

  23. Kuwakado H, Morii M (2010) Quantum distinguisher between the 3-round Feistel cipher and the random permutation. In: IEEE international symposium on information theory. IEEE, pp 2682–2685

  24. Mahajan P, Sachdeva A (2013) A study of encryption algorithms AES, DES and RSA for security. Glob J Comput Sci Technol 13(15):15–22

    Google Scholar 

  25. Devi G, Kumar MP (2012) Cloud computing: a CRM service based on a separate encryption and decryption using Blowfish Algorithm. Int J Comput Trends Technol 3(4):592–596

    Google Scholar 

  26. Lu CC, Tseng SY (2002) Integrated design of AES (Advanced Encryption Standard) encrypter and decrypter. In: Proceedings. The IEEE international conference on application-specific systems, architectures and processors. IEEE, pp 277–285

  27. Rivest RL, Robshaw MJ, Sidney R, Yin YL (1998) The RC6 block cipher. In: First advanced encryption standard (AES) conference

  28. Health Data: https://healthdata.gov/search/type/dataset. Accessed on 12 Apr 2019

  29. Elminaam DS, Abdual-Kader HM, Hadhoud MM (2010) Evaluating the performance of symmetric encryption algorithms. IJ Netw Secur 10:216–222

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to P. Venkata Krishna.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Viswanath, G., Krishna, P.V. Hybrid encryption framework for securing big data storage in multi-cloud environment. Evol. Intel. 14, 691–698 (2021). https://doi.org/10.1007/s12065-020-00404-w

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12065-020-00404-w

Keywords

Navigation