Abstract
Nowadays, reliability and security have become serious issues in Information and Communication Technology (ICT) since more and more data and services are accessed from computational cloud. Since cloud is an open platform and accessed through public networks like the Internet, user’s data become vulnerable for security attacks. Foul play of cloud operators to reach sensitive data of users is one of the serious issues that need wide consideration as it vividly reduces the adoptability of cloud computing. Many practical security challenges are arising due to the abundant volume of data. Time used up in data encryption heavily hinders the performance of cloud based systems since data transmission and data communication are slowed down due to the large amount of data to be encrypted and decrypted. To attain an adoptive performance altitude many applications reject data encryption. In this paper, we focus on privacy leakage issues, and promote security levels under predefined time and resource constraints. To this end, we propose a Selective Data Encryption and Splitting Strategy (SDE2S), a compact encrypting method to selectively encrypt data according to the privacy weight and execution time of data packages being sent. Also it randomly splits data into n parts and then performs XOR operations using different cipher keys in different cloud storage servers to protect users’ private information from possible untrusted cloud operators. Here, we put forward an overview of the problem and describe the algorithms used in the proposed solution. At the end, we present our simulation results, which reveal the advantages and improvements of our scheme over other schemes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Qiu, M., Zhong, M., Li, J., Gai, K., Zong, Z.: Phase-change memory optimization for green cloud with genetic algorithm. IEEE Trans. Comput. 64(12), 3528–3540 (2015)
Gai, K., Li, S.: Towards cloud computing: a literature review on cloud computing and its development trends. In: 2012 Fourth International Conference on Multimedia Information Networking and Security, Nanjing, China, pp. 142–146 (2012)
Li, J., Ming, Z., Qiu, M., Quan, G., Qin, X., Chen, T.: Resource allocation robustness in multi-core embedded systems with inaccurate information. J. Syst. Archit. 57(9), 840–849 (2011)
Chen, L., Duan, Y., Qiu, M., Xiong, J., Gai, K.: Adaptive resource allocation optimization in heterogeneous mobile cloud systems. In: The 2nd IEEE International Conference on Cyber Security and Cloud Computing, New York, USA, pp. 19–24. IEEE (2015)
Niu, J., Gao, Y., Qiu, M., Ming, Z.: Selecting proper wireless network interfaces for user experience enhancement with guaranteed probability. J. Parallel Distrib. Comput. 72(12), 1565–1575 (2012)
Gai, K., Du, Z., Qiu, M., Zhao, H.: Efficiency-aware workload optimizations of heterogenous cloud computing for capacity planning in financial industry. In: The 2nd IEEE International Conference on Cyber Security and Cloud Computing, New York, USA, pp. 1–6. IEEE (2015)
Gai, K., Qiu, M., Zhao, H., Tao, L., Zong, Z.: Dynamic energy-aware cloudlet-based mobile cloud computing model for green computing. J. Network Comput. Appl. 59, 46–54 (2015)
Gai, K., Qiu, M., Zhao, H.: Security-aware efficient mass distributed storage approach for cloud systems in big data. In: The 2nd IEEE International Conference on Big Data Security on Cloud, New York, USA, pp. 140–145 (2016)
Gai, K., Qiu, M., Tao, L., Zhu, Y.: Intrusion detection techniques for mobile cloud computing in heterogeneous 5G. In: Security and Communication Networks, pp. 1–10 (2015)
Wu, G., Zhang, H., Qiu, M., Ming, Z., Li, J., Qin, X.: A decentralized approach for mining event correlations in distributed system monitoring. J. Parallel Distrib. Comput. 73(3), 330–340 (2013)
Yin, H., Gai, K.: An empirical study on preprocessing high dimensional class-imbalanced data for classification. In: The IEEE International Symposium on Big Data Security on Cloud, New York, USA, pp. 1314–1319 (2015)
Liang, H., Gai, K.: Internet based anti-counterfeiting pattern with using big data in china. In: The IEEE International Symposium on Big Data Security on Cloud, New York, USA, pp. 1387–1392. IEEE (2015)
Jean-Baptiste, H., Qiu, M., Gai, K., Tao, L.: Meta meta-analytics for risk forecast using big data meta-regression in financial industry. In: The 2nd IEEE International Conference on Cyber Security and Cloud Computing, New York, USA, pp. 272–277. IEEE (2015)
Li, Y., Gai, K., Ming, Z., Zhao, H., Qiu, M.: Intercrossed access control for secure financial services on multimedia big data in cloud systems. ACM Trans. Multimedia Comput. Commun. Appl. PP(99), 1 (2016)
Yin, H., Gai, K., Wang, Z.: A classification algorithm based on ensemble feature selections for imbalanced class dataset. In: The 2nd IEEE International Conference on High Performance and Smart Computing, New York, USA, pp. 245–249 (2016)
Li, Y., Dai, W., Ming, Z., Qiu, M.: Privacy protection for preventing data over-collection in smart city. IEEE Trans. Comput. PP, 1 (2015)
Gai, K., Qiu, M., Chen, L., Liu, M.: Electronic health record error prevention approach using ontology in big data. In: 17th IEEE International Conference on High Performance Computing and Communications, New York, USA, pp. 752–757 (2015)
Qiu, M., Gai, K., Thuraisingham, B., Tao, L., Zhao, H.: Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry. Future Gener. Comput. Syst. PP, 1 (2016)
Gai, K., Qiu, M., Thuraisingham, B., Tao, L.: Proactive attribute-based secure data schema for mobile cloud in financial industry. In: The IEEE International Symposium on Big Data Security on Cloud, 17th IEEE International Conference on High Performance Computing and Communications, New York, USA, pp. 1332–1337 (2015)
Ma, L., Tao, L., Zhong, Y., Gai, K.: RuleSN: research and application of social network access control model. In: IEEE International Conference on Intelligent Data and Security, New York, USA, pp. 418–423 (2016)
Chang, F., et al.: Bigtable: a distributed storage system for structured data. ACM Trans. on Computer Systems 26(2), 4 (2008)
Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9(1), 1–30 (2006)
He, X., Wang, C., Liu, T., Gai, K., Chen, D., Bai, L.: Research on campus mobile model based on periodic purpose for opportunistic network. In: 2015 IEEE 17th International Conference on High Performance Computing and Communications, New York, USA, pp. 782–785. IEEE (2015)
Gai, K., Steenkamp, A.: Feasibility of a Platform-as-a-Service implementation using cloud computing for a global service organization. In: Proceedings of the Conference for Information Systems Applied Research ISSN, vol. 2167, p. 1508 (2013)
Qiu, M., Sha, E.: Cost minimization while satisfying hard/soft timing constraints for heterogeneous embedded systems. ACM Trans. Des. Autom. Electron. Syst. 14(2), 25 (2009)
Qiu, M., Cao, D., Su, H., Gai, K.: Data transfer minimization for financial derivative pricing using Monte Carlo simulation with GPU in 5G. Int. J. Commun. Syst. (2015)
Wu, G., Zhang, H., Qiu, M., Ming, Z., Li, J., Qin, X.: A decentralized approach for mining event correlations in distributed system monitoring. J. Parallel Distrib. Comput. 73(3), 330–340 (2013)
Li, J., Qiu, M., Ming, Z., Quan, G., Qin, X., Gu, Z.: Online optimization for scheduling preemptable tasks on IaaS cloud systems. J. Parallel Distrib. Comput. 72(5), 666–677 (2012)
Gai, K., Qiu, M., Tao, L., Zhu, Y.: Intrusion detection techniques for mobile cloud computing in heterogeneous 5G. Secur. Commun. Networks, 1–10 (2015)
Qiu, M., Gao, W., Chen, M., Niu, J., Zhang, L.: Energy efficient security algorithm for power grid wide area monitoring system. IEEE Trans. Smart Grid 2(4), 715–723 (2011)
Zhao, H., Chen, M., Qiu, M., Gai, K., Liu, M.: A novel pre-cache schema for high performance Android system. Future Gener. Comput. Syst. (2015)
Li, Y., Chen, M., Dai, W., Qiu, M.: Energy optimization with dynamic task scheduling mobile cloud computing. IEEE Syst. J., 1–10, June 2015
Yu, X., Pei, T., Gai, K., Guo, L.: Analysis on urban collective call behavior to earthquake. In: The IEEE International Symposium on Big Data Security on Cloud, pp. 1302–1307, New York, USA. IEEE (2015)
Gai, K.: A review of leveraging private cloud computing in financial service institutions: value propositions and current performances. Int. J. Comput. Appl. 95(3), 40–44 (2014)
Zhang, Y., Xu, C., Yu, S., Li, H., Zhang, X.: SCLPV: Secure certificateless public verification for cloud-based cyber-physical-social systems against malicious auditors. IEEE Trans. Comput. Soc. Syst. 2(4), 159–170 (2015)
Wang, C., Chow, S., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362–375 (2013)
Tang, L., et al.: A framework of mining trajectories from untrustworthy data in cyber-physical system. ACM Trans. Knowl. Discov. Data 9(3), 16 (2015)
Schuster, F., Costa, M., Fournet, C., Gkantsidis, C., Peinado, M., Mainar Ruiz, G., Russinovich, M.: VC3: trustworthy data analytics in the cloud using SGX. In: IEEE Symposium on Security and Privacy, pp. 38–54, San Jose, CA, USA. IEEE (2015)
Maffei, M., Malavolta, G., Reinert, M., Schroder, D.: Privacy and access control for outsourced personal records. In: IEEE Symposium on Security and Privacy, San Jose, CA, USA, pp. 341–358. IEEE (2015)
Li, Y., Gai, K., Ming, Z., Zhao, H., Qiu, M.: Intercrossed access control for secure financial services on multimedia big data in cloud systems. ACM Trans. Multimedia Comput. Commun. Appl. 12(4s), 67 (2016)
Mulliner, C., Robertson, W., Kirda, E.: Hidden GEMs: automated discovery of access control vulnerabilities in graphical user interfaces. In: IEEE Symposium on Security and Privacy, San Jose, CA, USA, pp. 149–162. IEEE (2014)
Sen, S., Guha, S., Datta, A., Rajamani, S., Tsai, J., Wing, J.: Bootstrapping privacy compliance in big data systems. In: IEEE Symposium on Security and Privacy, San Jose, CA, USA, pp. 327–342. IEEE (2014)
Vilk, J., Molnar, D., Livshits, B., Ofek, E., Rossbach, C., Moshchuk, A., Wang, H.J., Gal, R.: SurroundWeb: mitigating privacy concerns in a 3D web browser. In: IEEE Symposium on Security and Privacy, San Jose, CA, USA, pp. 431–446. IEEE (2015)
Zhu, L., Hu, Z., Heidemann, J., Wessels, D., Mankin, A., Somaiya, N.: Connection-oriented DNS to improve privacy and security. In: IEEE Symposium on Security and Privacy, San Jose, CA, USA, pp. 171–186. IEEE (2015)
Mehmood, A., et al.: Protection of big data privacy. IEEE Access 4, 1821–1834 (2016)
Chen, C., et al.: An efficient privacy-preserving ranked keyword search method. IEEE Trans. Parallel Distrib. Syst. 27(4), 951–963 (2016)
Samuel, A., et al.: A framework for composition and enforcement of privacy-aware and context-driven authorization mechanism for multimedia big data. IEEE Trans. Multimedia 17(9), 1484–1494 (2015)
Gai, K., Qiu, M., Zhao, H.: Privacy-Preserving Data Encryption Strategy for Big Data in Mobile Cloud Computing. IEEE Transactions on Big Data. IEEE (2016)
Li, H., Wang, K., Liu, X., Sun, Y., Guo, S.: A Selective Privacy-Preserving Approach for Multimedia Data. Cyber Security. IEEE (2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Asmathunnisa, Z., Yogesh, P. (2019). Towards Reliable Storage for Cloud Systems with Selective Data Encryption and Splitting Strategy. In: Akoglu, L., Ferrara, E., Deivamani, M., Baeza-Yates, R., Yogesh, P. (eds) Advances in Data Science. ICIIT 2018. Communications in Computer and Information Science, vol 941. Springer, Singapore. https://doi.org/10.1007/978-981-13-3582-2_5
Download citation
DOI: https://doi.org/10.1007/978-981-13-3582-2_5
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-3581-5
Online ISBN: 978-981-13-3582-2
eBook Packages: Computer ScienceComputer Science (R0)