Skip to main content

Development of Security Clustering Process for Big Data in Cloud

  • Conference paper
  • First Online:
ICT Analysis and Applications

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 154))

  • 916 Accesses

Abstract

Big data is a large volume of data that demands effective cost and novel forms of data to process for enhanced security imminent innovation, assessment creation, and optimization process. Cloud computing provides a consistent, fault lenient, and extensible background to the big data disseminated managing systems. Cloud computing is emerged that has a popular computing model of system of servers hosted over the Internet for the store, manage, and process the data. It includes several advantageous characteristics of cloud storage are easy to access, scalability, resilience, cost efficiency, and reliability of the data. Since every organization is moving its data to the cloud and uses the storage services provided by the cloud. However, threats to cloud security such as data loss, data breaches, insecure application programming interface, account or service traffic hijacking, denial of service, malicious insiders, shared technologies and dangers, insufficient diligence are moving the security of the data. So, it is essential to protect the information against denial of services, unauthorized access or modification of data. The proposed method provides the vital security for different environment to store and access the information file in big data cloud. A numerous levels of security services such as authorization, authentication, data integrity, and confidentiality are ensure by applying the proposed method; therefore, only the genuine users are allowable to store and access the data through this method. The proposed method has multiple levels of security such as authorization by the Cloud Service Provider, encryption of the data using different cryptographic algorithms though uploading the data to the cloud, and usage of one time password for decrypting the data while downloading it from the big data cloud.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Soumyashree, & Nithyashree, K. (2007). A survey on security and privacy methods of bigdata in cloud computing environment. International Journal of Advance Research, Ideas and Innovations in Technology, 3(6), 1499–1504.

    Google Scholar 

  2. Yu, Y., Au, M. H., Ateniese, G., Huang, X., Susilo, W., Dai, Y., et al. (2017). Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Transactions on IF&S, 12(4), 767–778.

    Google Scholar 

  3. Zhang, X., Tang, Y., Wang, H., et al. (2019). Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage. Information Sciences, 494, 193–207.

    Article  MathSciNet  Google Scholar 

  4. Chase, J., Niyato, D., Wang, P., Chaisiri, S. & Ko, R. (2017). A scalable approach to joint cyber insurance and security-as-a-service provisioning in cloud computing. IEEE Transactions on Dependable and Secure Computing.

    Google Scholar 

  5. Nahar, A. K., Mongia, K., & Kumari, K. (2018). Cloud Computing and Cloud Security. IJRAE&T, 4(1), 1–8.

    Google Scholar 

  6. Dai, X., Dai, H., Yang, G., et al. (2019). An efficient and dynamic semantic-aware multi-keyword ranked searchscheme over encrypted cloud data. IEEE Access, 7, 142855–142865.

    Article  Google Scholar 

  7. Shrihari, M. R., Archana, R. A., Manjunath, T. N., & Hegadi, R. S. (2018). A Review on Different Methods to Protect Big Data Sets”, 2018, issue-12 & page-4.

    Google Scholar 

  8. Fu, Z., Xia, L., Sun, X., Liu, A. X., & Xie, G. (2018). Semanticaware searching over encrypted data for cloud computing. IEEE Transactions on Information Forensics and Security, 99, 1.

    Google Scholar 

  9. Yao, J., Zheng, Y., Wang, C., & Gui, X. (2018). Enabling search over encrypted cloud data with concealed searchpattern. IEEE Access.

    Google Scholar 

  10. Uma, G., & Jayasimman, L. (2018). Enhanced convergent encryption key generation for secured data deduplication in cloud storage. Journal of Physics: Conference Series Conference Series, 1142, 012006.

    Google Scholar 

  11. Raviteja Kanakala, V., Chanda Shekhar, K., & Vijay Kumar, G. (2017). Security issues in cloud computing. International Journal of Advanced Research in Computer Engineering & Technology, 6(13, 4), 504–509.

    Google Scholar 

  12. Zhang, Y., Chen, X., Li, J., Wong, D. S., Li, H., & You, I. (2017). Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing. Information Sciences, 379, 42–61.

    Article  Google Scholar 

  13. Ghanbarpour, A., & Naderi, H. (2020). An attribute-specific ranking method based on language models for keywordsearch over graphs. IEEE Transactions on Knowledge and Data Engineering, 32(1), 12–25.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. R. Shrihari .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Shrihari, M.R., Manjunath, T.N., Archana, R.A., Hegadi, R.S. (2021). Development of Security Clustering Process for Big Data in Cloud. In: Fong, S., Dey, N., Joshi, A. (eds) ICT Analysis and Applications. Lecture Notes in Networks and Systems, vol 154. Springer, Singapore. https://doi.org/10.1007/978-981-15-8354-4_29

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-8354-4_29

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-8353-7

  • Online ISBN: 978-981-15-8354-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics