skip to main content
10.1145/3018896.3018913acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccConference Proceedingsconference-collections
research-article

A new secure model for the use of cloud computing in big data analytics

Published:22 March 2017Publication History

ABSTRACT

When Big data and cloud computing join forces together, several domains like: healthcare, disaster prediction and decision making become easier and much more beneficial to users in term of information gathering, although cloud computing will reduce time and cost of analyzing information for big data, it may harm the confidentiality and integrity of the sensitive data, for instance, in healthcare, when analyzing disease's spreading area, the name of the infected people must remain secure, hence the obligation to adopt a secure model that protect sensitive data from malicious users. Several case studies on the integration of big data in cloud computing, urge on how easier it would be to analyze and manage big data in this complex envronement. Companies must consider outsourcing their sensitive data to the cloud to take advantage of its beneficial resources such as huge storage, fast calculation, and availability, yet cloud computing might harm the security of data stored and computed in it (confidentiality, integrity). Therefore, strict paradigm must be adopted by organization to obviate their outsourced data from being stolen, damaged or lost. In this paper, we compare between the existing models to secure big data implementation in the cloud computing. Then, we propose our own model to secure Big Data on the cloud computing environement, considering the lifecycle of data from uploading, storage, calculation to its destruction.

References

  1. C. Barriers, "InfoSec Reading Room Enabling Big Data by Removing Security and Compliance Barriers."Google ScholarGoogle Scholar
  2. K. W. Nafi, T. S. Kar, S. A. Hoque, and M. M. A. Hashem, "A Newer User Authentication, File encryption and Distributed Server Based Cloud Computing security architecture," International J. Adv. Comput. Sci. Appl., vol. 3, no. 10, pp. 181--186, 2012.Google ScholarGoogle Scholar
  3. S. Yakoubov, V. Gadepally, N. Schear, E. Shen, and A. Yerukhimovich, "A survey of cryptographic approaches to securing big-data analytics in the cloud," 2014 IEEE High Perform. Extrem. Comput. Conf. HPEC 2014, 2014.Google ScholarGoogle Scholar
  4. .M. Tebaa and E. H. Said, "Secure Cloud Computing Through Homomorphic Encryption," Int. J. Adv. Comput. Technol., vol. 29 Volume, no. paragraph II, pp. 7--9, 2013.Google ScholarGoogle Scholar
  5. Thayananthan and A. Albeshri, "Big data security issues based on quantum cryptography and privacy with authentication for mobile data center," Procedia Comput. Sci., vol. 50, pp. 149--156, 2015.Google ScholarGoogle Scholar
  6. I. Kandrouch, N. Hmina, and H. Chaoui, "Confidentiality in big data : state of the art," Proceeding de 6ème edition de la journée Nationale de la sécurité, no. April, pp. 21--22, 2016.Google ScholarGoogle Scholar
  7. M. Babaeizadeh, M. Bakhtiari, and A. M. Mohammed, "Authentication methods in cloud computing: A survey," Res. J. Appl. Sci. Eng. Technol., vol. 9, no. 8, pp. 655--664, 2015.Google ScholarGoogle ScholarCross RefCross Ref
  8. J. Zhao, Y. Lin, J. Li, and C. Lei, "Kerberos Based Authentication for Multiple Clouds Related Work," vol. 11, no. 61472125, pp. 4065--4077, 2015.Google ScholarGoogle Scholar
  9. D. Boneh, A. Sahai, and B. Waters, "Functional encryption: Definitions and challenges," Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 6597 LNCS, no. subaward 641, pp. 253--273, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. N. Chakraborty, "Functional Encryption for Secured Big Data Analytics," vol. 107, no. 16, pp. 19--22, 2014.Google ScholarGoogle Scholar
  11. L. Xu and W. Shi, "Security Theories and Practices for Big Data," Big Data Concepts, Theor. Appl., pp. 157--192, 2016.Google ScholarGoogle Scholar
  12. I. B. M. Global, "Best practices for data migration.," DM Rev., no. June, p. 13, 2006.Google ScholarGoogle Scholar
  13. T. Yang, J. Li, and B. Yu, "A Secure Ciphertext Self-Destruction Scheme with Attribute-Based Encryption," Math. Probl. Eng., vol. 2015, 2.Google ScholarGoogle Scholar
  14. M. Naveed, S. Agrawal, M. Prabhakaran, X. Wang, E. Ayday, J. Hubaux, and C. A. Gunter, "Controlled Functional Encryption," 2014.Google ScholarGoogle Scholar
  15. D. Verma, E. K. Mahajan, and A. Prof, "To Enhance Data Security in Cloud Computing using Combination of Encryption Algorithms," vol. 2, no. 4, pp. 41--44, 2014.Google ScholarGoogle Scholar
  16. N. Aggarwal, A. Choudhary, M. Bachani, and R. Jain, "Framework For Secure Cloud Data Communication," vol. 4, no. 02, pp. 281--284, 2015.Google ScholarGoogle Scholar
  17. A. Kaur, "Secure Broker Cloud Computing Paradigm Using AES And Selective AES Algorithm," vol. 3, no. 3, pp. 79--83, 2013.Google ScholarGoogle Scholar

Index Terms

  1. A new secure model for the use of cloud computing in big data analytics

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        ICC '17: Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing
        March 2017
        1349 pages
        ISBN:9781450347747
        DOI:10.1145/3018896

        Copyright © 2017 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 22 March 2017

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader