A Security-By-Distribution Approach to Manage Big Data in a Federation of Untrustworthy Clouds

In recent years, Cloud Computing has drastically changed IT-Architectures in enterprises throughout various branches and countries. Dynamically scalable capabilities like CPUs, storage space, virtual networks, etc. promise cost savings, as huge initial infrastructure investments are not required anymore. This development shows that Cloud Computing is also a promising technology driver for Big Data, as the storage of unstructured data when no concrete and defined data schemes (variety) can be managed with upcoming NoSQL architectures. However, in order to fully exploit these advantages, the integration of a trustworthy 3rd party public cloud provider is necessary. Thus, challenging questions concerning security, compliance, anonymization, and privacy emerge and are still unsolved. To address these challenges, this work presents, implements and evaluates a security-by-distribution approach for NoSQL document stores that distributes data across various cloud providers such that every provider only gets a small data chunk which is worthless without the others. A Security-By-Distribution Approach to Manage Big Data in a Federation of Untrustworthy Clouds

[1]  Kiril Ivanov Simov,et al.  Analysis of the Join Performance in Vertically Distributed Cloud Databases , 2015, Int. J. Adapt. Resilient Auton. Syst..

[2]  Luca Benini,et al.  Collecting Datasets from Ambient Intelligence Environments , 2010, Int. J. Ambient Comput. Intell..

[3]  Ting Sang,et al.  A Log Based Approach to Make Digital Forensics Easier on Cloud Computing , 2013, 2013 Third International Conference on Intelligent System Design and Engineering Applications.

[4]  Arti Arun Mohanpurkar,et al.  A Traitor Identification Technique for Numeric Relational Databases with Distortion Minimization and Collusion Avoidance , 2016, Int. J. Ambient Comput. Intell..

[5]  Syed Akhter Hossain,et al.  NoSQL Database: New Era of Databases for Big data Analytics - Classification, Characteristics and Comparison , 2013, ArXiv.

[6]  Ali Awada,et al.  A Logical Model for Narcissistic Personality Disorder , 2016, Int. J. Synth. Emot..

[7]  Cong Wang,et al.  Dynamic Data Operations with Deduplication in Privacy-Preserving Public Auditing for Secure Cloud Storage , 2017, 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).

[8]  P. Mell,et al.  SP 800-145. The NIST Definition of Cloud Computing , 2011 .

[9]  E. F. Codd,et al.  A relational model of data for large shared data banks , 1970, CACM.

[10]  Vishal Bhatnagar,et al.  Movie Analytics for Effective Recommendation System using Pig with Hadoop , 2016, Int. J. Rough Sets Data Anal..

[11]  Vishal Bhatnagar,et al.  Olympics Big Data Prognostications , 2016, Int. J. Rough Sets Data Anal..

[12]  Ari Juels,et al.  New approaches to security and availability for cloud data , 2013, CACM.

[13]  Nilanjan Dey,et al.  Internet of Things and Big Data Technologies for Next Generation Healthcare , 2017 .

[14]  Anirban Kundu,et al.  A service based trust management classifier approach for cloud security , 2013, 2013 15th International Conference on Advanced Computing Technologies (ICACT).

[15]  Nilanjan Dey,et al.  Theoretical Analysis of Different Classifiers under Reduction Rough Data Set: A Brief Proposal , 2016, Int. J. Rough Sets Data Anal..

[16]  Jens Kohler,et al.  Performance Analysis of Vertically Partitioned Data in Clouds Through a Client-Based In-Memory Key-Value Store Cache , 2015, CISIS-ICEUTE.

[17]  Matthias Baumgarten,et al.  Keyword-Based Sentiment Mining using Twitter , 2013, Int. J. Ambient Comput. Intell..

[18]  Sandeep K. Sood,et al.  A combined approach to ensure data security in cloud computing , 2012, J. Netw. Comput. Appl..

[19]  Nilanjan Dey,et al.  Watermarking in Biomedical Signal Processing , 2017 .

[20]  Christoph Meinel,et al.  HPISecure: Towards Data Confidentiality in Cloud Applications , 2013, 2013 13th IEEE/ACM International Symposium on Cluster, Cloud, and Grid Computing.

[21]  Jens Kohler,et al.  Analysis of cache implementations in a vertically distributed cloud data store , 2015, 2015 Third World Conference on Complex Systems (WCCS).

[22]  Jemal H. Abawajy,et al.  A Layered Security Approach for Cloud Computing Infrastructure , 2009, 2009 10th International Symposium on Pervasive Systems, Algorithms, and Networks.

[23]  Houda Labiod,et al.  Vehicular Networks Security: Attacks, Requirements, Challenges and Current Contributions , 2009, Int. J. Ambient Comput. Intell..

[24]  Francesca Odella,et al.  Technology Studies and the Sociological Debate on Monitoring of Social Interactions , 2016, Int. J. Ambient Comput. Intell..

[25]  Ming Li,et al.  Storing Shared Data on the Cloud via Security-Mediator , 2013, 2013 IEEE 33rd International Conference on Distributed Computing Systems.

[26]  Cindy Mason,et al.  Engineering Kindness: Building a Machine with Compassionate Intelligence , 2015, Int. J. Synth. Emot..

[27]  Anghel Leonard Getting Started with Hibernate OGM , 2013 .

[28]  Nancy A. Lynch,et al.  Brewer's conjecture and the feasibility of consistent, available, partition-tolerant web services , 2002, SIGA.

[29]  Stefan Edlich,et al.  NoSQL: Einstieg in die Welt nichtrelationaler Web 2.0 Datenbanken , 2011 .

[30]  Kevin Waugh,et al.  A Classification of Object-Relational Impedance Mismatch , 2009, 2009 First International Confernce on Advances in Databases, Knowledge, and Data Applications.

[31]  Miguel Correia,et al.  DepSky: Dependable and Secure Storage in a Cloud-of-Clouds , 2013, TOS.

[32]  Prashant Malik,et al.  Cassandra: a decentralized structured storage system , 2010, OPSR.

[33]  Eric A. Brewer,et al.  Towards robust distributed systems (abstract) , 2000, PODC '00.