scholarly journals A Single-Label Model to Ensure Data Consistency in Information Security

2021 ◽  
Vol 2021 ◽  
pp. 1-8
Author(s):  
Cigdem Bakir

Information security is defined as preventing actions such as unauthorized access and use, modification, and removal of information. It consists of certain basic elements of confidentiality, integrity, and accessibility. There are numerous studies in published literature which have been conducted to ensure information security. However, there is no previous study that covers these three basic elements together. In the present study, a model that includes these three key elements of information security together for big data was proposed and implemented. With this proposed “single-label model,” a more practical and flexible structure was established for all operations (read, write, update, and delete) performed on a database on real data. In previous studies conducted with a label model, separate labels were used for read-only or write-only operations, and there was no structure that could ensure both confidentiality and integrity at the same time. The present study, however, shows what type of authorization and access control could be established between which processes and which users by looking at a single label for all the operations performed on the data. Thus, in contrast to the previous studies seen in published literature, data confidentiality, data integrity, and data consistency were all guaranteed for all transactions. The results of the proposed single-label model were also shown comparatively by conducting an experimental study of its application. The results obtained are promising for further studies.

Author(s):  
Abdul Razaque ◽  
Shaldanbayeva Nazerke ◽  
Bandar Alotaibi ◽  
Munif Alotaibi ◽  
Akhmetov Murat ◽  
...  

Nowadays, cloud computing is one of the important and rapidly growing paradigms that extend its capabilities and applications in various areas of life. The cloud computing system challenges many security issues, such as scalability, integrity, confidentiality, and unauthorized access, etc. An illegitimate intruder may gain access to the sensitive cloud computing system and use the data for inappropriate purposes that may lead to losses in business or system damage. This paper proposes a hybrid unauthorized data handling (HUDH) scheme for Big data in cloud computing. The HUDU aims to restrict illegitimate users from accessing the cloud and data security provision. The proposed HUDH consists of three steps: data encryption, data access, and intrusion detection. HUDH involves three algorithms; Advanced Encryption Standards (AES) for encryption, Attribute-Based Access Control (ABAC) for data access control, and Hybrid Intrusion Detection (HID) for unauthorized access detection. The proposed scheme is implemented using Python and Java language. Testing results demonstrate that the HUDH can delegate computation overhead to powerful cloud servers. User confidentiality, access privilege, and user secret key accountability can be attained with more than 97% high accuracy.


Author(s):  
I. Chochliouros ◽  
G. Lalopoulos ◽  
S. Chochliouros ◽  
A. Spiliopoulou

From today’s perspective, network and information security (European Commission, 2001) is about ensuring the availability of services and data; preventing the disruption and unauthorized interception of communications; confirming that data sent, received, or stored is complete and unchanged; securing data confidentiality; protecting information systems against unauthorized access; and protecting against attacks (involving malicious software and securing dependable authentication—that is, the confirming of an asserted identity of entities or users). Specific security measures therefore should be taken in order to establish an appropriate environment.


2018 ◽  
Vol 1 (1) ◽  
pp. 11-15
Author(s):  
Ferdy Riza ◽  
Nurmala Sridewi ◽  
Amir Mahmud Husein ◽  
Muhammad Khoiruddin Harahap

The ease of sending data with the development of internet technology technology is now a concern, especially the problem of data confidentiality, integrity and information security. Cryptography is one of the techniques used to maintain data confidentiality and information security, the application of cryptographic techniques for information security and data integrity is highly dependent on the formation of keys. In this study proposed a frequency analysis approach to measure the level of information security of blowfish encryption results to determine the distribution form of each character used in the text and find out the exact frequency of each character used in the test text data. The encryption algorithm and description of blowfish method against plaintext are proven to be accurate, but the longer the key character used will greatly affect the level of information security that came  from encryption process, this is based on the results of the frequency analysis conducted.


Electronics ◽  
2022 ◽  
Vol 11 (1) ◽  
pp. 137
Author(s):  
Abdul Razaque ◽  
Nazerke Shaldanbayeva ◽  
Bandar Alotaibi ◽  
Munif Alotaibi ◽  
Akhmetov Murat ◽  
...  

Nowadays, cloud computing is one of the important and rapidly growing services; its capabilities and applications have been extended to various areas of life. Cloud computing systems face many security issues, such as scalability, integrity, confidentiality, unauthorized access, etc. An illegitimate intruder may gain access to a sensitive cloud computing system and use the data for inappropriate purposes, which may lead to losses in business or system damage. This paper proposes a hybrid unauthorized data handling (HUDH) scheme for big data in cloud computing. The HUDH scheme aims to restrict illegitimate users from accessing the cloud and to provide data security provisions. The proposed HUDH consists of three steps: data encryption, data access, and intrusion detection. The HUDH scheme involves three algorithms: advanced encryption standards (AES) for encryption, attribute-based access control (ABAC) for data access control, and hybrid intrusion detection (HID) for unauthorized access detection. The proposed scheme is implemented using the Python and Java languages. The testing results demonstrated that the HUDH scheme can delegate computation overhead to powerful cloud servers. User confidentiality, access privilege, and user secret key accountability can be attained with more than 97% accuracy.


2018 ◽  
Vol 17 (02) ◽  
pp. 527-545 ◽  
Author(s):  
Aiiad Albeshri ◽  
Vijey Thayananthan

In the big data processes, management and analytics are primary areas where we can introduce the decision making on information security to mitigate the big data breaches. According to the growing number of online systems and big data handling, mitigating the big data breaches is the serious problem during the processing period which needs to be monitored using appropriate technique. The goal of this research is to prevent the big data breaches using correct decision making based on information security concepts such as access control with authentication which depend on the management policies. The analytical approach of information security solution can also be useful for securing the big data infrastructure and key management that improve the big data breaches. As an analytical method, information security which focuses on detecting and securing the big data breaches is considered with access control. Here, we have introduced the multi-priority model influenced with the network calculus and access control which monitors the breaches during the big data processing. In the results and analysis, we can provide a graph which shows the monitoring improvement for decision making during the mitigation of big data breaches.


2018 ◽  
Vol 7 (1.9) ◽  
pp. 200
Author(s):  
T A.Mohanaprakash ◽  
J Andrews

Cloud computing is associate inclusive new approach on however computing services square measure made and utilized. Cloud computing is associate accomplishment of assorted styles of services that has attracted several users in today’s state of affairs. The foremost enticing service of cloud computing is information outsourcing, because of this the information homeowners will host any size of information on the cloud server and users will access the information from cloud server once needed. A dynamic outsourced auditing theme that cannot solely defend against any dishonest entity and collision, however conjointly support verifiable dynamic updates to outsourced information. The new epitome of information outsourcing conjointly faces the new security challenges. However, users might not totally trust the cloud service suppliers (CSPs) as a result of typically they may be dishonest. It's tough to work out whether or not the CSPs meet the customer’s expectations for information security. Therefore, to with success maintain the integrity of cloud information, several auditing schemes are projected. Some existing integrity ways will solely serve for statically archived information and a few auditing techniques is used for the dynamically updated information. The analyzed numerous existing information integrity auditing schemes together with their consequences.


2021 ◽  
Vol 1955 (1) ◽  
pp. 012021
Author(s):  
Nianzu Liu ◽  
Weichen Ma ◽  
Danjie Shen ◽  
Bing Guo

Sign in / Sign up

Export Citation Format

Share Document