Abstract
Big data is a large volume of data that demands effective cost and novel forms of data to process for enhanced security imminent innovation, assessment creation, and optimization process. Cloud computing provides a consistent, fault lenient, and extensible background to the big data disseminated managing systems. Cloud computing is emerged that has a popular computing model of system of servers hosted over the Internet for the store, manage, and process the data. It includes several advantageous characteristics of cloud storage are easy to access, scalability, resilience, cost efficiency, and reliability of the data. Since every organization is moving its data to the cloud and uses the storage services provided by the cloud. However, threats to cloud security such as data loss, data breaches, insecure application programming interface, account or service traffic hijacking, denial of service, malicious insiders, shared technologies and dangers, insufficient diligence are moving the security of the data. So, it is essential to protect the information against denial of services, unauthorized access or modification of data. The proposed method provides the vital security for different environment to store and access the information file in big data cloud. A numerous levels of security services such as authorization, authentication, data integrity, and confidentiality are ensure by applying the proposed method; therefore, only the genuine users are allowable to store and access the data through this method. The proposed method has multiple levels of security such as authorization by the Cloud Service Provider, encryption of the data using different cryptographic algorithms though uploading the data to the cloud, and usage of one time password for decrypting the data while downloading it from the big data cloud.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Soumyashree, & Nithyashree, K. (2007). A survey on security and privacy methods of bigdata in cloud computing environment. International Journal of Advance Research, Ideas and Innovations in Technology, 3(6), 1499–1504.
Yu, Y., Au, M. H., Ateniese, G., Huang, X., Susilo, W., Dai, Y., et al. (2017). Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Transactions on IF&S, 12(4), 767–778.
Zhang, X., Tang, Y., Wang, H., et al. (2019). Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage. Information Sciences, 494, 193–207.
Chase, J., Niyato, D., Wang, P., Chaisiri, S. & Ko, R. (2017). A scalable approach to joint cyber insurance and security-as-a-service provisioning in cloud computing. IEEE Transactions on Dependable and Secure Computing.
Nahar, A. K., Mongia, K., & Kumari, K. (2018). Cloud Computing and Cloud Security. IJRAE&T, 4(1), 1–8.
Dai, X., Dai, H., Yang, G., et al. (2019). An efficient and dynamic semantic-aware multi-keyword ranked searchscheme over encrypted cloud data. IEEE Access, 7, 142855–142865.
Shrihari, M. R., Archana, R. A., Manjunath, T. N., & Hegadi, R. S. (2018). A Review on Different Methods to Protect Big Data Sets”, 2018, issue-12 & page-4.
Fu, Z., Xia, L., Sun, X., Liu, A. X., & Xie, G. (2018). Semanticaware searching over encrypted data for cloud computing. IEEE Transactions on Information Forensics and Security, 99, 1.
Yao, J., Zheng, Y., Wang, C., & Gui, X. (2018). Enabling search over encrypted cloud data with concealed searchpattern. IEEE Access.
Uma, G., & Jayasimman, L. (2018). Enhanced convergent encryption key generation for secured data deduplication in cloud storage. Journal of Physics: Conference Series Conference Series, 1142, 012006.
Raviteja Kanakala, V., Chanda Shekhar, K., & Vijay Kumar, G. (2017). Security issues in cloud computing. International Journal of Advanced Research in Computer Engineering & Technology, 6(13, 4), 504–509.
Zhang, Y., Chen, X., Li, J., Wong, D. S., Li, H., & You, I. (2017). Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing. Information Sciences, 379, 42–61.
Ghanbarpour, A., & Naderi, H. (2020). An attribute-specific ranking method based on language models for keywordsearch over graphs. IEEE Transactions on Knowledge and Data Engineering, 32(1), 12–25.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Shrihari, M.R., Manjunath, T.N., Archana, R.A., Hegadi, R.S. (2021). Development of Security Clustering Process for Big Data in Cloud. In: Fong, S., Dey, N., Joshi, A. (eds) ICT Analysis and Applications. Lecture Notes in Networks and Systems, vol 154. Springer, Singapore. https://doi.org/10.1007/978-981-15-8354-4_29
Download citation
DOI: https://doi.org/10.1007/978-981-15-8354-4_29
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-8353-7
Online ISBN: 978-981-15-8354-4
eBook Packages: EngineeringEngineering (R0)