Privacy-Aware Adaptive Data Encryption Strategy of Big Data in Cloud Computing

Privacy issues have become a considerable issue while the applications of big data are growing dramatically fast in cloud computing. The benefits us implementing these emerging technologies have improved or changed service models and improve application performances in various perspectives. However, the remarkably growing volume of data sizes has also resulted in many challenges in practice. The time execution of encrypting data is one of the serious issues during the processes of data processing and transmissions. Many current applications abandon data encryptions in order to reach an adoptive performance level, companions with privacy concerns. In this paper, we concentrate on privacy issue and propose a novel data encryption approach, named as Dynamic Data Encryption Strategy (D2ES). Our proposed approach aims to selectively encrypt data using privacy classification methods under timing constraints. This approach is designed to maximize the privacy protection scope by using a selective encryption strategy within the required execution time requirements. The performance of D2ES has been evaluated in our experiments, which provides the proof of the privacy enhancement.

[1]  Keke Gai,et al.  Internet-Based Anti-Counterfeiting Pattern with Using Big Data in China , 2015, 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems.

[2]  Keke Gai,et al.  Phase-Change Memory Optimization for Green Cloud with Genetic Algorithm , 2015, IEEE Transactions on Computers.

[3]  Keke Gai,et al.  Efficiency-Aware Workload Optimizations of Heterogeneous Cloud Computing for Capacity Planning in Financial Industry , 2015, 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing.

[4]  Meikang Qiu,et al.  Selecting proper wireless network interfaces for user experience enhancement with guaranteed probability , 2012, J. Parallel Distributed Comput..

[5]  Min Chen,et al.  Energy Efficient Security Algorithm for Power Grid Wide Area Monitoring System , 2011, IEEE Transactions on Smart Grid.

[6]  Keke Gai,et al.  RuleSN: Research and Application of Social Network Access Control Model , 2016, 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS).

[7]  Meikang Qiu,et al.  Privacy Protection for Preventing Data Over-Collection in Smart City , 2016, IEEE Transactions on Computers.

[8]  Keke Gai,et al.  Intercrossed Access Controls for Secure Financial Services on Multimedia Big Data in Cloud Systems , 2016, ACM Trans. Multim. Comput. Commun. Appl..

[9]  Keke Gai,et al.  A Classification Algorithm Based on Ensemble Feature Selections for Imbalanced-Class Dataset , 2016, 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS).

[10]  Keke Gai,et al.  Towards Cloud Computing: A Literature Review on Cloud Computing and Its Development Trends , 2012, 2012 Fourth International Conference on Multimedia Information Networking and Security.

[11]  Keke Gai,et al.  Intrusion detection techniques for mobile cloud computing in heterogeneous 5G , 2016, Secur. Commun. Networks.

[12]  Keke Gai,et al.  Adaptive Resource Allocation Optimization in Heterogeneous Mobile Cloud Systems , 2015, 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing.

[13]  Keke Gai,et al.  Dynamic energy-aware cloudlet-based mobile cloud computing model for green computing , 2016, J. Netw. Comput. Appl..

[14]  Meikang Qiu,et al.  Resource allocation robustness in multi-core embedded systems with inaccurate information , 2011, J. Syst. Archit..

[15]  Keke Gai,et al.  Proactive Attribute-based Secure Data Schema for Mobile Cloud in Financial Industry , 2015, 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems.

[16]  Keke Gai,et al.  Security-Aware Efficient Mass Distributed Storage Approach for Cloud Systems in Big Data , 2016, 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS).

[17]  Keke Gai,et al.  A Feasibility Study of Platform-as-a-Service Using Cloud Computing for a Global Service Organization , 2014 .

[18]  Keke Gai,et al.  Electronic Health Record Error Prevention Approach Using Ontology in Big Data , 2015, 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems.

[19]  Mathukumalli Vidyasagar A Metric Between Probability Distributions on Finite Sets of Different Cardinalities and Applications to Order Reduction , 2012, IEEE Transactions on Automatic Control.

[20]  Keke Gai,et al.  Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry , 2018, Future Gener. Comput. Syst..

[21]  Keke Gai,et al.  An Empirical Study on Preprocessing High-Dimensional Class-Imbalanced Data for Classification , 2015, 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems.

[22]  Meikang Qiu,et al.  A decentralized approach for mining event correlations in distributed system monitoring , 2013, J. Parallel Distributed Comput..

[23]  Meikang Qiu,et al.  Meta Meta-Analytics for Risk Forecast Using Big Data Meta-Regression in Financial Industry , 2015, 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing.

[24]  Michele Monaci,et al.  Efficient Two-dimensional Data Allocation in IEEE 802.16 OFDMA , 2010, INFOCOM 2010.

[25]  David L. Lubkeman,et al.  A New Professional Science Master Program for Electric Power Systems Engineering , 2014, IEEE Transactions on Power Systems.