Security Mechanisms in Cloud Computing-Based Big Data

Author(s):  
Addepalli V. N. Krishna ◽  
Balamurugan M.

In the existent system, data is encrypted and stored when passed to the cloud. During any operations on the data, it is decrypted and then the computation is done. This decrypted data is vulnerable and prone to be misused. After the computations are done, the data and the result are encrypted and stored back in the cloud. This creates an overhead to the system as well as increases time complexity. With this chapter, the authors aim to reduce the overhead of the systems to perform repeated encryptions and decryptions. This can be done by allowing the computations to happen directly on the encrypted text. The result obtained by performing computations on encrypted data will be the same as the ones done on the original plain text. This new security solution is fully fit for processing and retrieval of encrypted data, effectively leading to the broad applicable project, the security of data transmission, and the storage of data. The work is secured further with additional concepts like probabilistic and time stamp-based encryption processes.

Author(s):  
Addepalli V. N. Krishna ◽  
Balamurugan M.

In the existent system, data is encrypted and stored when passed to the cloud. During any operations on the data, it is decrypted and then the computation is done. This decrypted data is vulnerable and prone to be misused. After the computations are done, the data and the result are encrypted and stored back in the cloud. This creates an overhead to the system as well as increases time complexity. With this chapter, the authors aim to reduce the overhead of the systems to perform repeated encryptions and decryptions. This can be done by allowing the computations to happen directly on the encrypted text. The result obtained by performing computations on encrypted data will be the same as the ones done on the original plain text. This new security solution is fully fit for processing and retrieval of encrypted data, effectively leading to the broad applicable project, the security of data transmission, and the storage of data. The work is secured further with additional concepts like probabilistic and time stamp-based encryption processes.


Author(s):  
Addepalli V. N. Krishna ◽  
Balamurugan M.

In the existent system, data is encrypted and stored when passed to the cloud. During any operations on the data, it is decrypted and then the computation is done. This decrypted data is vulnerable and prone to be misused. After the computations are done, the data and the result are encrypted and stored back in the cloud. This creates an overhead to the system as well as increases time complexity. With this chapter, the authors aim to reduce the overhead of the systems to perform repeated encryptions and decryptions. This can be done by allowing the computations to happen directly on the encrypted text. The result obtained by performing computations on encrypted data will be the same as the ones done on the original plain text. This new security solution is fully fit for processing and retrieval of encrypted data, effectively leading to the broad applicable project, the security of data transmission, and the storage of data. The work is secured further with additional concepts like probabilistic and time stamp-based encryption processes.


2021 ◽  
Vol 11 (2) ◽  
pp. 396-405
Author(s):  
Dr.V. Vennila ◽  
L.I. Poomani ◽  
S. Thaaranya

In the field of computer networks, cryptography and steganography are the well-known features for best security purpose. The main idea is to transmit the data securely. So, providing acceptable level of security is essential for data transmission. Also it should reduce the time complexity of the security algorithm. Here we have employed the “Elliptic Curve Cryptography” scheme to encrypt the data and image. A “Least Significant Bit” steganography algorithm is used to insert the encrypted data to be hidden inside the image in order to send the data securely. The encrypted data from the image is then decrypted by the decryption algorithm. Finally the hidden data is taken from the decrypted data. Then the image is compressed before sending through the internet. MATLAB is utilized to mimic outcomes which show that it has great inserting limit and security.


Author(s):  
Y. Lei ◽  
L. H. Wang ◽  
Z. H. Wang

Abstract. “Multi-conformity” requires the unification of surveying and mapping coordinate system. The Ministry of Natural Resources calls for the unified use of CGCS2000 coordinates in natural resources systems. Therefore, “multi-conformity” can only be carried out in the CGCS2000 coordinate system. In Bijie Experimental Area, the projection deformation of CGCS2000 coordinate system is far greater than the requirement of 2.5cm/km stipulated in the urban surveying, so it can not be directly used in urban construction, and its own independent coordinate system must be established. In order to resolve this contradiction and meet the requirements of “multi-conformity”, Ministry of Natural Resources and urban construction, to explore the transformation of geographic information data under CGCS2000 coordinate system into urban independent coordinate system data in time by using the cloud computing function of big data under the condition of unification of basic data to meet the needs of engineering construction and to serve the economic construction of Bijie Experimental Area.


Author(s):  
Mahalakshmi M ◽  
Kalyanasundaran S.

The backbone of this research is to design and developed an effective cloud environment for pretending and protection of portable client device information put away in the cloud. Portable gadgets, for example, advanced mobile phones or tablets that are fundamentally more restricted than PCs as far as memory, processors, secured operating system, and accessible system data transmission bandwidth because of that all information migrate in to cloud environment. A portable client may go about as an information owner will demand key from the cloud administrator, scrambles the information and afterward it transfers the information in the cloud. In the cloud secured encryption is finished. Certificate Authority Based Encryption (CABE) approach is utilized for security and adaptability. Frequent monitoring is accomplished for Privacy, Security, trustworthiness and accessibility.


2019 ◽  
Vol 2 (3) ◽  
pp. e65 ◽  
Author(s):  
Abdellah Kaci ◽  
Thouraya Bouabana‐Tebibel ◽  
Abderrezak Rachedi ◽  
Chafia Yahiaoui

2021 ◽  
Vol 7 ◽  
pp. e727
Author(s):  
Eko Hadiyono Riyadi ◽  
Agfianto Eko Putra ◽  
Tri Kuntoro Priyambodo

Background Data transmissions using the DNP3 protocol over the internet in SCADA systems are vulnerable to interruption, interception, fabrication, and modification through man-in-the-middle (MITM) attacks. This research aims to improve the security of DNP3 data transmissions and protect them from MITM attacks. Methods This research describes a proposed new method of improving DNP3 security by introducing BRC4 encryption. This combines Beaufort encryption, in which plain text is encrypted by applying a poly-alphabetic substitution code based on the Beaufort table by subtracting keys in plain text, and RC4 encryption, a stream cipher with a variable-length key algorithm. This research contributes to improving the security of data transmission and accelerating key generation. Results Tests are carried out by key space analysis, correlation coefficient analysis, information entropy analysis, visual analysis, and time complexity analysis.The results show that to secure encryption processes from brute force attacks, a key of at least 16 characters is necessary. IL data correlation values were IL1 = −0.010, IL2 = 0.006, and IL3 = 0.001, respectively, indicating that the proposed method (BRC4) is better than the Beaufort or RC4 methods in isolation. Meanwhile, the information entropy values from IL data are IL1 = 7.84, IL2 = 7.98, and IL3 = 7.99, respectively, likewise indicating that the proposed method is better than the Beaufort or RC4 methods in isolation. Both results also show that the proposed method is secure from MITM attacks. Visual analysis, using a histogram, shows that ciphertext is more significantly distributed than plaintext, and thus secure from MITM attacks. The time complexity analysis results show that the proposed method algorithm is categorized as linear complexity.


2018 ◽  
Vol 10 (12) ◽  
pp. 168781401881495
Author(s):  
Chunyi Wu ◽  
Gaochao Xu ◽  
Jia Zhao ◽  
Yan Ding

Large-scale task processing for big data based on cloud computing has become a research hotspot nowadays. Many traditional task processing approaches in single domain based on cloud computing have been presented successively. Unfortunately, it is limited to some extent due to the type, price, and storage location of substrate resource. Based on this argument, a large-scale task processing approach for big data in multi-domain has been proposed in this work. While the serious problem of overheads in computation and data transmission still exists in task processing across multi-domain, to overcome this problem, a virtual network mapping algorithm based on multi-objective particle swarm optimization in multi-domain is proposed. Based on Pareto dominance theory, a fast non-dominated selection method for the optimal virtual network mapping scheme set is presented and crowding degree comparison method is employed for the final optimal mapping scheme, which contributes to the load balancing and minimization of bandwidth resource cost in data transmission. Cauchy mutation is introduced to accelerate convergence of the algorithm. Eventually, the large-scale tasks are processed efficiently. Experimental results show that the proposed approach can effectively reduce the additional consumption of computing and bandwidth resources, and greatly decrease the task processing time.


2017 ◽  
Vol 28 (06) ◽  
pp. 645-660 ◽  
Author(s):  
Chunguang Ma ◽  
Juyan Li ◽  
Weiping Ouyang

With the arrival of the era of big data, more and more users begin to adopt public cloud storage to store data and compute data. Sharing large amounts of sensitive data in the public cloud will arouse privacy concerns. Data encryption is a widely accepted method to prevent information leakage. How to achieve the cloud sharing and cloud computing of big data is a challenging problem. Conditional proxy re-encryption can solve cloud sharing, and homomorphic encryption can achieve cloud computing. In this paper, we combine conditional proxy re-encryption with homomorphic encryption to construct a lattice-based identity-based homomorphic conditional proxy re-encryption for secure big data computing in cloud environment. The scheme can not only realize the encrypted data sharing in the cloud, but also can realize the encrypted data computing in the cloud. That is, the homomorphic conditional proxy re-encryption scheme can homomorphically evaluate ciphertexts no matter ciphertexts are “fresh” or re-encrypted (re-encrypted ciphertexts can come from different identities). The constructed scheme modifies the homomorphic proxy re-encryption scheme of Ma et al. We also use the approximate eigenvector method to manage the noise level and decrease the decryption complexity without introducing additional assumptions. At last, we prove that the scheme is indistinguishable against chosen-plaintext attacks, key privacy secure and master secret secure.


2014 ◽  
Vol 687-691 ◽  
pp. 2764-2767
Author(s):  
Qiang Li ◽  
Kui Yang ◽  
Li Ma

With the popularity of the cloud computing, network technology obtains unprecedented development and revolution. Cloud computing is the direction of cyberspace storage in the computer and internet filed. Big data and multi-dimensional storage and calculation along with the cloud computing. Therefore, internet data security is the key point. For example, based on the cloud environment, the big data transmission and storage requires encryption technology. This article will research the data security of cloud computing, design the service model of data security encryption, and realize data transmission and storage security service of computer and internet cloud environment.


Sign in / Sign up

Export Citation Format

Share Document