ABSTRACT
When Big data and cloud computing join forces together, several domains like: healthcare, disaster prediction and decision making become easier and much more beneficial to users in term of information gathering, although cloud computing will reduce time and cost of analyzing information for big data, it may harm the confidentiality and integrity of the sensitive data, for instance, in healthcare, when analyzing disease's spreading area, the name of the infected people must remain secure, hence the obligation to adopt a secure model that protect sensitive data from malicious users. Several case studies on the integration of big data in cloud computing, urge on how easier it would be to analyze and manage big data in this complex envronement. Companies must consider outsourcing their sensitive data to the cloud to take advantage of its beneficial resources such as huge storage, fast calculation, and availability, yet cloud computing might harm the security of data stored and computed in it (confidentiality, integrity). Therefore, strict paradigm must be adopted by organization to obviate their outsourced data from being stolen, damaged or lost. In this paper, we compare between the existing models to secure big data implementation in the cloud computing. Then, we propose our own model to secure Big Data on the cloud computing environement, considering the lifecycle of data from uploading, storage, calculation to its destruction.
- C. Barriers, "InfoSec Reading Room Enabling Big Data by Removing Security and Compliance Barriers."Google Scholar
- K. W. Nafi, T. S. Kar, S. A. Hoque, and M. M. A. Hashem, "A Newer User Authentication, File encryption and Distributed Server Based Cloud Computing security architecture," International J. Adv. Comput. Sci. Appl., vol. 3, no. 10, pp. 181--186, 2012.Google Scholar
- S. Yakoubov, V. Gadepally, N. Schear, E. Shen, and A. Yerukhimovich, "A survey of cryptographic approaches to securing big-data analytics in the cloud," 2014 IEEE High Perform. Extrem. Comput. Conf. HPEC 2014, 2014.Google Scholar
- .M. Tebaa and E. H. Said, "Secure Cloud Computing Through Homomorphic Encryption," Int. J. Adv. Comput. Technol., vol. 29 Volume, no. paragraph II, pp. 7--9, 2013.Google Scholar
- Thayananthan and A. Albeshri, "Big data security issues based on quantum cryptography and privacy with authentication for mobile data center," Procedia Comput. Sci., vol. 50, pp. 149--156, 2015.Google Scholar
- I. Kandrouch, N. Hmina, and H. Chaoui, "Confidentiality in big data : state of the art," Proceeding de 6ème edition de la journée Nationale de la sécurité, no. April, pp. 21--22, 2016.Google Scholar
- M. Babaeizadeh, M. Bakhtiari, and A. M. Mohammed, "Authentication methods in cloud computing: A survey," Res. J. Appl. Sci. Eng. Technol., vol. 9, no. 8, pp. 655--664, 2015.Google ScholarCross Ref
- J. Zhao, Y. Lin, J. Li, and C. Lei, "Kerberos Based Authentication for Multiple Clouds Related Work," vol. 11, no. 61472125, pp. 4065--4077, 2015.Google Scholar
- D. Boneh, A. Sahai, and B. Waters, "Functional encryption: Definitions and challenges," Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 6597 LNCS, no. subaward 641, pp. 253--273, 2011. Google ScholarDigital Library
- N. Chakraborty, "Functional Encryption for Secured Big Data Analytics," vol. 107, no. 16, pp. 19--22, 2014.Google Scholar
- L. Xu and W. Shi, "Security Theories and Practices for Big Data," Big Data Concepts, Theor. Appl., pp. 157--192, 2016.Google Scholar
- I. B. M. Global, "Best practices for data migration.," DM Rev., no. June, p. 13, 2006.Google Scholar
- T. Yang, J. Li, and B. Yu, "A Secure Ciphertext Self-Destruction Scheme with Attribute-Based Encryption," Math. Probl. Eng., vol. 2015, 2.Google Scholar
- M. Naveed, S. Agrawal, M. Prabhakaran, X. Wang, E. Ayday, J. Hubaux, and C. A. Gunter, "Controlled Functional Encryption," 2014.Google Scholar
- D. Verma, E. K. Mahajan, and A. Prof, "To Enhance Data Security in Cloud Computing using Combination of Encryption Algorithms," vol. 2, no. 4, pp. 41--44, 2014.Google Scholar
- N. Aggarwal, A. Choudhary, M. Bachani, and R. Jain, "Framework For Secure Cloud Data Communication," vol. 4, no. 02, pp. 281--284, 2015.Google Scholar
- A. Kaur, "Secure Broker Cloud Computing Paradigm Using AES And Selective AES Algorithm," vol. 3, no. 3, pp. 79--83, 2013.Google Scholar
Index Terms
A new secure model for the use of cloud computing in big data analytics
Recommendations
Big data analytics in Cloud computing: an overview
AbstractBig Data and Cloud Computing as two mainstream technologies, are at the center of concern in the IT field. Every day a huge amount of data is produced from different sources. This data is so big in size that traditional processing tools are unable ...
The rise of "big data" on cloud computing
Cloud computing is a powerful technology to perform massive-scale and complex computing. It eliminates the need to maintain expensive computing hardware, dedicated space, and software. Massive growth in the scale of data or big data generated through ...
Machine learning with big data analytics for cloud security
Highlights- Machine Learning-assisted cloud computing model (ML-CCM) with big data analytics has been proposed to increase security and improve data transmission.
AbstractThe amount of data generated and transmitted more quickly, particularly with the demand for action in real-time, has greatly increased with the growing number of internet-connected devices. With the rising diversity of data and need ...
Graphical abstractDisplay Omitted
Comments