Skip to main content

Towards Reliable Storage for Cloud Systems with Selective Data Encryption and Splitting Strategy

  • Conference paper
  • First Online:
Advances in Data Science (ICIIT 2018)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 941))

Included in the following conference series:

  • 647 Accesses

Abstract

Nowadays, reliability and security have become serious issues in Information and Communication Technology (ICT) since more and more data and services are accessed from computational cloud. Since cloud is an open platform and accessed through public networks like the Internet, user’s data become vulnerable for security attacks. Foul play of cloud operators to reach sensitive data of users is one of the serious issues that need wide consideration as it vividly reduces the adoptability of cloud computing. Many practical security challenges are arising due to the abundant volume of data. Time used up in data encryption heavily hinders the performance of cloud based systems since data transmission and data communication are slowed down due to the large amount of data to be encrypted and decrypted. To attain an adoptive performance altitude many applications reject data encryption. In this paper, we focus on privacy leakage issues, and promote security levels under predefined time and resource constraints. To this end, we propose a Selective Data Encryption and Splitting Strategy (SDE2S), a compact encrypting method to selectively encrypt data according to the privacy weight and execution time of data packages being sent. Also it randomly splits data into n parts and then performs XOR operations using different cipher keys in different cloud storage servers to protect users’ private information from possible untrusted cloud operators. Here, we put forward an overview of the problem and describe the algorithms used in the proposed solution. At the end, we present our simulation results, which reveal the advantages and improvements of our scheme over other schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Qiu, M., Zhong, M., Li, J., Gai, K., Zong, Z.: Phase-change memory optimization for green cloud with genetic algorithm. IEEE Trans. Comput. 64(12), 3528–3540 (2015)

    Article  MathSciNet  Google Scholar 

  2. Gai, K., Li, S.: Towards cloud computing: a literature review on cloud computing and its development trends. In: 2012 Fourth International Conference on Multimedia Information Networking and Security, Nanjing, China, pp. 142–146 (2012)

    Google Scholar 

  3. Li, J., Ming, Z., Qiu, M., Quan, G., Qin, X., Chen, T.: Resource allocation robustness in multi-core embedded systems with inaccurate information. J. Syst. Archit. 57(9), 840–849 (2011)

    Article  Google Scholar 

  4. Chen, L., Duan, Y., Qiu, M., Xiong, J., Gai, K.: Adaptive resource allocation optimization in heterogeneous mobile cloud systems. In: The 2nd IEEE International Conference on Cyber Security and Cloud Computing, New York, USA, pp. 19–24. IEEE (2015)

    Google Scholar 

  5. Niu, J., Gao, Y., Qiu, M., Ming, Z.: Selecting proper wireless network interfaces for user experience enhancement with guaranteed probability. J. Parallel Distrib. Comput. 72(12), 1565–1575 (2012)

    Article  Google Scholar 

  6. Gai, K., Du, Z., Qiu, M., Zhao, H.: Efficiency-aware workload optimizations of heterogenous cloud computing for capacity planning in financial industry. In: The 2nd IEEE International Conference on Cyber Security and Cloud Computing, New York, USA, pp. 1–6. IEEE (2015)

    Google Scholar 

  7. Gai, K., Qiu, M., Zhao, H., Tao, L., Zong, Z.: Dynamic energy-aware cloudlet-based mobile cloud computing model for green computing. J. Network Comput. Appl. 59, 46–54 (2015)

    Article  Google Scholar 

  8. Gai, K., Qiu, M., Zhao, H.: Security-aware efficient mass distributed storage approach for cloud systems in big data. In: The 2nd IEEE International Conference on Big Data Security on Cloud, New York, USA, pp. 140–145 (2016)

    Google Scholar 

  9. Gai, K., Qiu, M., Tao, L., Zhu, Y.: Intrusion detection techniques for mobile cloud computing in heterogeneous 5G. In: Security and Communication Networks, pp. 1–10 (2015)

    Article  Google Scholar 

  10. Wu, G., Zhang, H., Qiu, M., Ming, Z., Li, J., Qin, X.: A decentralized approach for mining event correlations in distributed system monitoring. J. Parallel Distrib. Comput. 73(3), 330–340 (2013)

    Article  Google Scholar 

  11. Yin, H., Gai, K.: An empirical study on preprocessing high dimensional class-imbalanced data for classification. In: The IEEE International Symposium on Big Data Security on Cloud, New York, USA, pp. 1314–1319 (2015)

    Google Scholar 

  12. Liang, H., Gai, K.: Internet based anti-counterfeiting pattern with using big data in china. In: The IEEE International Symposium on Big Data Security on Cloud, New York, USA, pp. 1387–1392. IEEE (2015)

    Google Scholar 

  13. Jean-Baptiste, H., Qiu, M., Gai, K., Tao, L.: Meta meta-analytics for risk forecast using big data meta-regression in financial industry. In: The 2nd IEEE International Conference on Cyber Security and Cloud Computing, New York, USA, pp. 272–277. IEEE (2015)

    Google Scholar 

  14. Li, Y., Gai, K., Ming, Z., Zhao, H., Qiu, M.: Intercrossed access control for secure financial services on multimedia big data in cloud systems. ACM Trans. Multimedia Comput. Commun. Appl. PP(99), 1 (2016)

    Google Scholar 

  15. Yin, H., Gai, K., Wang, Z.: A classification algorithm based on ensemble feature selections for imbalanced class dataset. In: The 2nd IEEE International Conference on High Performance and Smart Computing, New York, USA, pp. 245–249 (2016)

    Google Scholar 

  16. Li, Y., Dai, W., Ming, Z., Qiu, M.: Privacy protection for preventing data over-collection in smart city. IEEE Trans. Comput. PP, 1 (2015)

    Google Scholar 

  17. Gai, K., Qiu, M., Chen, L., Liu, M.: Electronic health record error prevention approach using ontology in big data. In: 17th IEEE International Conference on High Performance Computing and Communications, New York, USA, pp. 752–757 (2015)

    Google Scholar 

  18. Qiu, M., Gai, K., Thuraisingham, B., Tao, L., Zhao, H.: Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry. Future Gener. Comput. Syst. PP, 1 (2016)

    Google Scholar 

  19. Gai, K., Qiu, M., Thuraisingham, B., Tao, L.: Proactive attribute-based secure data schema for mobile cloud in financial industry. In: The IEEE International Symposium on Big Data Security on Cloud, 17th IEEE International Conference on High Performance Computing and Communications, New York, USA, pp. 1332–1337 (2015)

    Google Scholar 

  20. Ma, L., Tao, L., Zhong, Y., Gai, K.: RuleSN: research and application of social network access control model. In: IEEE International Conference on Intelligent Data and Security, New York, USA, pp. 418–423 (2016)

    Google Scholar 

  21. Chang, F., et al.: Bigtable: a distributed storage system for structured data. ACM Trans. on Computer Systems 26(2), 4 (2008)

    Article  Google Scholar 

  22. Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9(1), 1–30 (2006)

    Article  Google Scholar 

  23. He, X., Wang, C., Liu, T., Gai, K., Chen, D., Bai, L.: Research on campus mobile model based on periodic purpose for opportunistic network. In: 2015 IEEE 17th International Conference on High Performance Computing and Communications, New York, USA, pp. 782–785. IEEE (2015)

    Google Scholar 

  24. Gai, K., Steenkamp, A.: Feasibility of a Platform-as-a-Service implementation using cloud computing for a global service organization. In: Proceedings of the Conference for Information Systems Applied Research ISSN, vol. 2167, p. 1508 (2013)

    Google Scholar 

  25. Qiu, M., Sha, E.: Cost minimization while satisfying hard/soft timing constraints for heterogeneous embedded systems. ACM Trans. Des. Autom. Electron. Syst. 14(2), 25 (2009)

    Article  Google Scholar 

  26. Qiu, M., Cao, D., Su, H., Gai, K.: Data transfer minimization for financial derivative pricing using Monte Carlo simulation with GPU in 5G. Int. J. Commun. Syst. (2015)

    Google Scholar 

  27. Wu, G., Zhang, H., Qiu, M., Ming, Z., Li, J., Qin, X.: A decentralized approach for mining event correlations in distributed system monitoring. J. Parallel Distrib. Comput. 73(3), 330–340 (2013)

    Article  Google Scholar 

  28. Li, J., Qiu, M., Ming, Z., Quan, G., Qin, X., Gu, Z.: Online optimization for scheduling preemptable tasks on IaaS cloud systems. J. Parallel Distrib. Comput. 72(5), 666–677 (2012)

    Article  Google Scholar 

  29. Gai, K., Qiu, M., Tao, L., Zhu, Y.: Intrusion detection techniques for mobile cloud computing in heterogeneous 5G. Secur. Commun. Networks, 1–10 (2015)

    Google Scholar 

  30. Qiu, M., Gao, W., Chen, M., Niu, J., Zhang, L.: Energy efficient security algorithm for power grid wide area monitoring system. IEEE Trans. Smart Grid 2(4), 715–723 (2011)

    Article  Google Scholar 

  31. Zhao, H., Chen, M., Qiu, M., Gai, K., Liu, M.: A novel pre-cache schema for high performance Android system. Future Gener. Comput. Syst. (2015)

    Google Scholar 

  32. Li, Y., Chen, M., Dai, W., Qiu, M.: Energy optimization with dynamic task scheduling mobile cloud computing. IEEE Syst. J., 1–10, June 2015

    Google Scholar 

  33. Yu, X., Pei, T., Gai, K., Guo, L.: Analysis on urban collective call behavior to earthquake. In: The IEEE International Symposium on Big Data Security on Cloud, pp. 1302–1307, New York, USA. IEEE (2015)

    Google Scholar 

  34. Gai, K.: A review of leveraging private cloud computing in financial service institutions: value propositions and current performances. Int. J. Comput. Appl. 95(3), 40–44 (2014)

    Google Scholar 

  35. Zhang, Y., Xu, C., Yu, S., Li, H., Zhang, X.: SCLPV: Secure certificateless public verification for cloud-based cyber-physical-social systems against malicious auditors. IEEE Trans. Comput. Soc. Syst. 2(4), 159–170 (2015)

    Article  Google Scholar 

  36. Wang, C., Chow, S., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362–375 (2013)

    Article  MathSciNet  Google Scholar 

  37. Tang, L., et al.: A framework of mining trajectories from untrustworthy data in cyber-physical system. ACM Trans. Knowl. Discov. Data 9(3), 16 (2015)

    Article  Google Scholar 

  38. Schuster, F., Costa, M., Fournet, C., Gkantsidis, C., Peinado, M., Mainar Ruiz, G., Russinovich, M.: VC3: trustworthy data analytics in the cloud using SGX. In: IEEE Symposium on Security and Privacy, pp. 38–54, San Jose, CA, USA. IEEE (2015)

    Google Scholar 

  39. Maffei, M., Malavolta, G., Reinert, M., Schroder, D.: Privacy and access control for outsourced personal records. In: IEEE Symposium on Security and Privacy, San Jose, CA, USA, pp. 341–358. IEEE (2015)

    Google Scholar 

  40. Li, Y., Gai, K., Ming, Z., Zhao, H., Qiu, M.: Intercrossed access control for secure financial services on multimedia big data in cloud systems. ACM Trans. Multimedia Comput. Commun. Appl. 12(4s), 67 (2016)

    Google Scholar 

  41. Mulliner, C., Robertson, W., Kirda, E.: Hidden GEMs: automated discovery of access control vulnerabilities in graphical user interfaces. In: IEEE Symposium on Security and Privacy, San Jose, CA, USA, pp. 149–162. IEEE (2014)

    Google Scholar 

  42. Sen, S., Guha, S., Datta, A., Rajamani, S., Tsai, J., Wing, J.: Bootstrapping privacy compliance in big data systems. In: IEEE Symposium on Security and Privacy, San Jose, CA, USA, pp. 327–342. IEEE (2014)

    Google Scholar 

  43. Vilk, J., Molnar, D., Livshits, B., Ofek, E., Rossbach, C., Moshchuk, A., Wang, H.J., Gal, R.: SurroundWeb: mitigating privacy concerns in a 3D web browser. In: IEEE Symposium on Security and Privacy, San Jose, CA, USA, pp. 431–446. IEEE (2015)

    Google Scholar 

  44. Zhu, L., Hu, Z., Heidemann, J., Wessels, D., Mankin, A., Somaiya, N.: Connection-oriented DNS to improve privacy and security. In: IEEE Symposium on Security and Privacy, San Jose, CA, USA, pp. 171–186. IEEE (2015)

    Google Scholar 

  45. Mehmood, A., et al.: Protection of big data privacy. IEEE Access 4, 1821–1834 (2016)

    Article  Google Scholar 

  46. Chen, C., et al.: An efficient privacy-preserving ranked keyword search method. IEEE Trans. Parallel Distrib. Syst. 27(4), 951–963 (2016)

    Article  Google Scholar 

  47. Samuel, A., et al.: A framework for composition and enforcement of privacy-aware and context-driven authorization mechanism for multimedia big data. IEEE Trans. Multimedia 17(9), 1484–1494 (2015)

    Article  Google Scholar 

  48. Gai, K., Qiu, M., Zhao, H.: Privacy-Preserving Data Encryption Strategy for Big Data in Mobile Cloud Computing. IEEE Transactions on Big Data. IEEE (2016)

    Google Scholar 

  49. Li, H., Wang, K., Liu, X., Sun, Y., Guo, S.: A Selective Privacy-Preserving Approach for Multimedia Data. Cyber Security. IEEE (2017)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Z. Asmathunnisa .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Asmathunnisa, Z., Yogesh, P. (2019). Towards Reliable Storage for Cloud Systems with Selective Data Encryption and Splitting Strategy. In: Akoglu, L., Ferrara, E., Deivamani, M., Baeza-Yates, R., Yogesh, P. (eds) Advances in Data Science. ICIIT 2018. Communications in Computer and Information Science, vol 941. Springer, Singapore. https://doi.org/10.1007/978-981-13-3582-2_5

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-3582-2_5

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-3581-5

  • Online ISBN: 978-981-13-3582-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics