Skip to main content

Design and Development of an Algorithm to Secure Big Data on Cloud Computing

  • Conference paper
  • First Online:
ICT with Intelligent Applications

Abstract

In any organization, data is coming from various online sources and various offline sources. It is very difficult to equipment huge amount of data. Big data is one of the technologies who tackle huge amount of data easily. Cloud computing is a platform for big data. Although there are vast number of advantages for big data and cloud computing, they failed to make their place in people heart as people are anxious about security of their data. They are huge number of advantages we gain if we move big data on cloud computing like on-demand service availability, availability of data and information on Internet, resources grouping, easy to manage, easy to analyze large volume of big data, and most important is cost effective. Although there are numerous advantages to moving big data on cloud computing, we cannot avoid challenges to big data and cloud computing. The various challenges to big data are cost, data quality, rapid change, skilled man power requirement, infrastructure need, moving data onto big data platform, need for synchronization across data sources, and most important is security of data. These all challenges are not going to be easily solved; various researches are going on to solve all these problems. In this paper, we provide review about various research done in the area of security of big data on cloud computing, and finally, we provide research plan for our project regarding security of big data on cloud computing.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 299.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 299.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Teng, L., Li, H., Yin, S., Sun, Y.: A Modified Advance Encryption Standard for Data Security. Int. J. Netw. Secur. 1–6 (2019)

    Google Scholar 

  2. https://www.geeksforgeeks.org/world-big-data/. Last Accessed on 11 Oct 2020

  3. https://www.sqlshack.com/azure-data-explorer-for-beginners/. Last Accessed on 11 Oct 2020

  4. Shah, A., Jay D.: Classification and security enforcement of the semi-structured health records on MongoDB leveraging hybridization of Modified AES algorithm with Apriory algorithm. Juni Khyat 10(10), 91–95 (2020)

    Google Scholar 

  5. Jay, D.: An optimised robust model for big data security on the cloud environment: the numerous user-level data compaction, pp. 209–216. Springer (2020)

    Google Scholar 

  6. Golani, S., Sahal, S. Sonika, Vaishali: Technical survey on cloud computing and its security issues. IJERnD 2(3), 11-14 (2019)

    Google Scholar 

  7. Dave, J., Vyas, D.: Multi-level data security model for big data on public cloud: a new model. IJANA 09(06), 3654–3657 (2018)

    Google Scholar 

  8. Han, S., Han, K., Zhang, S.: A data sharing protocol to minimize security and privacy risks of cloud storage in big data era, pp. 60290–60298. IEEE (2019).

    Google Scholar 

  9. Kavitha, M., Kowsalya, K.: Development of big data security in frequent itemset using FP-Growth algorithm, pp. 120–123. IJERT (2019)

    Google Scholar 

  10. Kumar, S., Mohbey, K.K.: A review on big data based parallel and distributed approaches of pattern mining. Elsevier (2019)

    Google Scholar 

  11. Talha, M., Abou El Kalam, A., Elmarzoqui, N.: Big data: trade-off between data quality and data security, pp. 916–922. Elsevier (2019)

    Google Scholar 

  12. Hababeh, I., Gharaibeh, A., Nofal, S., Khalil, I.: An integrated methodology for big data classification and security for improving cloud systems data mobility, pp. 9153–9163. IEEE (2019)

    Google Scholar 

  13. Ahmed, M.: Intelligent big data summarization for rare anomaly detection, pp. 68669–68677. IEEE (2019)

    Google Scholar 

  14. Kumar, R., Goyal, R.: On cloud security requirements, threats, vulnerabilities and countermeasures: a survey, pp. 1–48. Elsevier (2019)

    Google Scholar 

  15. Azizi, Y., Azizi, M., Elboukhari, M.: Log files analysis using map reduce to improve security, pp. 37–44. Elsevier (2019)

    Google Scholar 

  16. Huang, K., Zhou, D., Xu, W., Cong, Y., Wang, W., Que, Z.: Distributed apriori on cloud plateform without exposing individual transaction data, pp. 397–401. IEEE (2018)

    Google Scholar 

  17. Reddy, Y.: Big data security in cloud environment, pp. 100–106. IEEE (2018)

    Google Scholar 

  18. Subramanian, N., Jeyaraj, A.: Recent security challenges in cloud computing, pp. 28–42. Elsevier (2018)

    Google Scholar 

  19. Aditham, S., Ranganathan, N.: A system architecture for the detection of insider attacks in big data systems, pp. 1–14. IEEE (2017)

    Google Scholar 

  20. Win, T.Y., Tianfield, H., Mair, Q.: Big data based security analytics for protecting virtualized infrastructures in cloud computing, pp. 1–15. IEEE (2016)

    Google Scholar 

  21. Hu, C., Li, W., Cheng, X., Yu, J., Wang, S., Bie, R.: A secure and verifiable access control scheme for big data storage in clouds, pp. 1–14. IEEE (2016)

    Google Scholar 

  22. Hanguang, L., Yu, N.: Intrusion detection technology research based on apriori algorithm, pp. 1615–1620. Elsevier (2012)

    Google Scholar 

  23. https://www.comparitech.com/blog/information-security/what-is-aes-encryption/. Last Accessed on 11 Oct 2020

  24. Shehadeh, H., Obeidat, Q.Y., Darwish, D.: Comprehensive study on data security in cloud data store. ICSRS 07(04), 53–66 (2014)

    Google Scholar 

  25. Anand, K., Sekar, A.C., Nagappan, G.: Enhanced AES algorithm using 512 bit key implementation. AIJSH 7(2), 353–366 (2017)

    Google Scholar 

  26. Gamido, H.V., Sison, A.M., Medina, R.P.: Implementation of modified AES as image encryption scheme. IJEEI 6(3), 301–308 (2018)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Shah, A.N., Dave, J.A. (2022). Design and Development of an Algorithm to Secure Big Data on Cloud Computing. In: Senjyu, T., Mahalle, P.N., Perumal, T., Joshi, A. (eds) ICT with Intelligent Applications. Smart Innovation, Systems and Technologies, vol 248. Springer, Singapore. https://doi.org/10.1007/978-981-16-4177-0_13

Download citation

Publish with us

Policies and ethics