Skip to main content
Log in

Secured Data Storage and Retrieval Algorithm Using Map Reduce Techniques and Chaining Encryption in Cloud Databases

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Cloud databases provide facilities for large scale data storage and retrieval of distributed data. However, the current access control techniques provided in database systems for maintaining security are not sufficient to secure the private data stored in public cloud databases. In this paper, a new secured data storage algorithm for effective maintenance of confidential data is proposed. To perform storage and retrieval operations of data in the cloud data storage effectively, map reduce algorithms are developed in this work which performs data reduction and fast processing. In order to consider the temporal nature of documents to be retrieved, we propose a new algorithm called Temporal Secured Cloud Map Reduced Algorithm which integrates temporal constraints with map reduce algorithms and also the chaining Hill Cipher encryption algorithms which is proposed newly in this work. The main advantages of the proposed algorithm is that they reduce the processing time and maintains security effectively. The experimental results obtained from this work depict that the proposed model is optimizing cost and it ensures data security.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Wang, Q., Wang, C., Ren, K., Lou, W., Li, J., et al. (2011). Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Transactions on Parallel and Distributed Systems, 22, 847–859.

    Article  Google Scholar 

  2. Wang, C., Wang, Q., Ren, K., Cao, N., Lou, W., et al. (2012). Toward secure and dependable storage services in cloud computing. IEEE Transactions on Services Computing, 5, 220–232.

    Article  Google Scholar 

  3. Lin, H. Y., Tzeng, W. G., et al. (2012). A secure erasure code-based cloud storage system with secure data forwarding. IEEE Transactions on Parallel and Distributed Systems, 23, 995–1003.

    Article  Google Scholar 

  4. Bahga, A., Madisetti, V. K., et al. (2012). Analyzing massive machine maintenance data in a computing cloud. IEEE Transactions on Parallel and Distributed Systems, 23, 1831–1843.

    Article  Google Scholar 

  5. Wang, C., Chow, S. S. M., Wang, Q., Ren, K., Lou, W., et al. (2013). Privacy-preserving public auditing for secure cloud storage. IEEE Transactions on Computers, 62, 362–375.

    Article  MathSciNet  MATH  Google Scholar 

  6. Zhu, Y., Hu, H., Ahn, G. J., Yu, M., et al. (2012). Cooperative provable data possession for integrity verification in multicloud storage. IEEE Transactions on Parallel and Distributed Systems, 23, 2231–2244.

    Article  Google Scholar 

  7. Tang, Y., Lee, P. P. C., Lui, J. C. S., Perlman, R., et al. (2012). Secure overlay cloud storage with access control and assured deletion. IEEE Transactions on Dependable and Secure Computing, 9, 903–916.

    Article  Google Scholar 

  8. Yang, K., Jia, X., et al. (2013). An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Transactions on Parallel and Distributed Systems, 24, 1717–1726.

    Article  Google Scholar 

  9. Wang, H. (2013). Proxy provable data possession in public clouds. IEEE Transactions on Services Computing, 6, 551–559.

    Article  Google Scholar 

  10. Liu, X., Zhang, Y., Wang, B., Yan, J., et al. (2013). Secure multi-owner data sharing for dynamic groups in the cloud. IEEE Transactions on Parallel and Distributed Systems, 24, 1182–1191.

    Article  Google Scholar 

  11. Ren, K., Wang, C., Wang, K. Q., et al. (2012). Toward secure and effective data utilization in public cloud. IEEE Network, 26, 69–74.

    Article  Google Scholar 

  12. Barsoum, A., Hasan, A., et al. (2013). Enabling dynamic data and indirect mutual trust for cloud computing storage systems. IEEE Transactions on Parallel and Distributed Systems, 24, 2375–2385.

    Article  Google Scholar 

  13. Yuan, D., Yang, Y., Liu, X., Li, W., Cui, L., Xu, M., et al. (2013). A highly practical approach toward achieving minimum data sets storage cost in the cloud. IEEE Transactions on Parallel and Distributed Systems, 24, 1234–1244.

    Article  Google Scholar 

  14. Chu, C. K., Chow, S. S. M., Tzeng, W. G., Zhou, J., Deng, R. H., et al. (2014). Key-aggregate cryptosystem for scalable data sharing in cloud storage. IEEE Transactions on Parallel and Distributed Systems, 25, 468–477.

    Article  Google Scholar 

  15. Li, J., Li, B., et al. (2013). Erasure coding for cloud storage systems: A survey. Tsinghua Science and Technology, 18, 259–272.

    Article  Google Scholar 

  16. Chen, H. C. H., Lee, P. P. C., et al. (2014). Enabling data integrity protection in regenerating-coding-based cloud storage: Theory and implementation. IEEE Transactions on Parallel and Distributed Systems, 25, 407–416.

    Article  Google Scholar 

  17. Zhou, L., Varadharajan, V., Hitchens, M., et al. (2013). Achieving secure role-based access control on encrypted data in cloud storage. IEEE Transactions on Information Forensics and Security, 8, 1947–1960.

    Article  Google Scholar 

  18. Cao, J., Li, K., Stojmenovic, I., et al. (2014). Optimal power allocation and load distribution for multiple heterogeneous multicore server processors across clouds and data centers. IEEE Transactions on Computers, 63, 45–58.

    Article  MathSciNet  MATH  Google Scholar 

  19. Ren, S., Vander Schaar, M., et al. (2013). Efficient resource provisioning and rate selection for stream mining in a community cloud. IEEE Transactions on Multimedia, 5, 723–734.

    Article  Google Scholar 

  20. Yang, L., Cai, X., et al. (2014). A game-theoretic analysis to resolve the tussle in cloud storage services. An International Journal of Applied Mathematics and Information Sciences, 8, 1361–1367.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Muthurajkumar.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Muthurajkumar, S., Vijayalakshmi, M. & Kannan, A. Secured Data Storage and Retrieval Algorithm Using Map Reduce Techniques and Chaining Encryption in Cloud Databases. Wireless Pers Commun 96, 5621–5633 (2017). https://doi.org/10.1007/s11277-017-4437-3

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-017-4437-3

Keywords

Navigation