Advertisement

Wireless Personal Communications

, Volume 96, Issue 4, pp 5621–5633 | Cite as

Secured Data Storage and Retrieval Algorithm Using Map Reduce Techniques and Chaining Encryption in Cloud Databases

  • S. Muthurajkumar
  • M. Vijayalakshmi
  • A. Kannan
Article
  • 234 Downloads

Abstract

Cloud databases provide facilities for large scale data storage and retrieval of distributed data. However, the current access control techniques provided in database systems for maintaining security are not sufficient to secure the private data stored in public cloud databases. In this paper, a new secured data storage algorithm for effective maintenance of confidential data is proposed. To perform storage and retrieval operations of data in the cloud data storage effectively, map reduce algorithms are developed in this work which performs data reduction and fast processing. In order to consider the temporal nature of documents to be retrieved, we propose a new algorithm called Temporal Secured Cloud Map Reduced Algorithm which integrates temporal constraints with map reduce algorithms and also the chaining Hill Cipher encryption algorithms which is proposed newly in this work. The main advantages of the proposed algorithm is that they reduce the processing time and maintains security effectively. The experimental results obtained from this work depict that the proposed model is optimizing cost and it ensures data security.

Keywords

Data storage Cloud computing Temporal secured Map reduce Hill ciper 

References

  1. 1.
    Wang, Q., Wang, C., Ren, K., Lou, W., Li, J., et al. (2011). Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Transactions on Parallel and Distributed Systems, 22, 847–859.CrossRefGoogle Scholar
  2. 2.
    Wang, C., Wang, Q., Ren, K., Cao, N., Lou, W., et al. (2012). Toward secure and dependable storage services in cloud computing. IEEE Transactions on Services Computing, 5, 220–232.CrossRefGoogle Scholar
  3. 3.
    Lin, H. Y., Tzeng, W. G., et al. (2012). A secure erasure code-based cloud storage system with secure data forwarding. IEEE Transactions on Parallel and Distributed Systems, 23, 995–1003.CrossRefGoogle Scholar
  4. 4.
    Bahga, A., Madisetti, V. K., et al. (2012). Analyzing massive machine maintenance data in a computing cloud. IEEE Transactions on Parallel and Distributed Systems, 23, 1831–1843.CrossRefGoogle Scholar
  5. 5.
    Wang, C., Chow, S. S. M., Wang, Q., Ren, K., Lou, W., et al. (2013). Privacy-preserving public auditing for secure cloud storage. IEEE Transactions on Computers, 62, 362–375.MathSciNetCrossRefzbMATHGoogle Scholar
  6. 6.
    Zhu, Y., Hu, H., Ahn, G. J., Yu, M., et al. (2012). Cooperative provable data possession for integrity verification in multicloud storage. IEEE Transactions on Parallel and Distributed Systems, 23, 2231–2244.CrossRefGoogle Scholar
  7. 7.
    Tang, Y., Lee, P. P. C., Lui, J. C. S., Perlman, R., et al. (2012). Secure overlay cloud storage with access control and assured deletion. IEEE Transactions on Dependable and Secure Computing, 9, 903–916.CrossRefGoogle Scholar
  8. 8.
    Yang, K., Jia, X., et al. (2013). An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Transactions on Parallel and Distributed Systems, 24, 1717–1726.CrossRefGoogle Scholar
  9. 9.
    Wang, H. (2013). Proxy provable data possession in public clouds. IEEE Transactions on Services Computing, 6, 551–559.CrossRefGoogle Scholar
  10. 10.
    Liu, X., Zhang, Y., Wang, B., Yan, J., et al. (2013). Secure multi-owner data sharing for dynamic groups in the cloud. IEEE Transactions on Parallel and Distributed Systems, 24, 1182–1191.CrossRefGoogle Scholar
  11. 11.
    Ren, K., Wang, C., Wang, K. Q., et al. (2012). Toward secure and effective data utilization in public cloud. IEEE Network, 26, 69–74.CrossRefGoogle Scholar
  12. 12.
    Barsoum, A., Hasan, A., et al. (2013). Enabling dynamic data and indirect mutual trust for cloud computing storage systems. IEEE Transactions on Parallel and Distributed Systems, 24, 2375–2385.CrossRefGoogle Scholar
  13. 13.
    Yuan, D., Yang, Y., Liu, X., Li, W., Cui, L., Xu, M., et al. (2013). A highly practical approach toward achieving minimum data sets storage cost in the cloud. IEEE Transactions on Parallel and Distributed Systems, 24, 1234–1244.CrossRefGoogle Scholar
  14. 14.
    Chu, C. K., Chow, S. S. M., Tzeng, W. G., Zhou, J., Deng, R. H., et al. (2014). Key-aggregate cryptosystem for scalable data sharing in cloud storage. IEEE Transactions on Parallel and Distributed Systems, 25, 468–477.CrossRefGoogle Scholar
  15. 15.
    Li, J., Li, B., et al. (2013). Erasure coding for cloud storage systems: A survey. Tsinghua Science and Technology, 18, 259–272.CrossRefGoogle Scholar
  16. 16.
    Chen, H. C. H., Lee, P. P. C., et al. (2014). Enabling data integrity protection in regenerating-coding-based cloud storage: Theory and implementation. IEEE Transactions on Parallel and Distributed Systems, 25, 407–416.CrossRefGoogle Scholar
  17. 17.
    Zhou, L., Varadharajan, V., Hitchens, M., et al. (2013). Achieving secure role-based access control on encrypted data in cloud storage. IEEE Transactions on Information Forensics and Security, 8, 1947–1960.CrossRefGoogle Scholar
  18. 18.
    Cao, J., Li, K., Stojmenovic, I., et al. (2014). Optimal power allocation and load distribution for multiple heterogeneous multicore server processors across clouds and data centers. IEEE Transactions on Computers, 63, 45–58.MathSciNetCrossRefzbMATHGoogle Scholar
  19. 19.
    Ren, S., Vander Schaar, M., et al. (2013). Efficient resource provisioning and rate selection for stream mining in a community cloud. IEEE Transactions on Multimedia, 5, 723–734.CrossRefGoogle Scholar
  20. 20.
    Yang, L., Cai, X., et al. (2014). A game-theoretic analysis to resolve the tussle in cloud storage services. An International Journal of Applied Mathematics and Information Sciences, 8, 1361–1367.CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2017

Authors and Affiliations

  1. 1.Department of Information Science and Technology, College of Engineering GuindyAnna UniversityChennaiIndia

Personalised recommendations