A novel system architecture for secure authentication and data sharing in cloud enabled Big Data Environment

Abstract With the rapid growth of data sources, Big data security in Cloud is a big challenge. Different issues have ascended in the area of Big data security such as infrastructure security, data privacy, data management and data integrity. Currently, Big data processing, analytics and storage is secured using cryptography algorithms, which are not appropriate for Big data protection over Cloud. In this paper, we present a solution for addressing the main issues in Big data security over Cloud. We propose a novel system architecture called the Secure Authentication and Data Sharing in Cloud (SADS-Cloud). There are three processes involved in this paper including (i). Big Data Outsourcing, (ii). Big Data Sharing and (iii). Big Data Management. In Big data outsourcing, the data owners are registered to a Trust Center using SHA-3 hashing algorithm. The MapReduce model is used to split the input file into fixed-size of blocks of data and SALSA20 encryption algorithm is applied over each block. In Big data sharing, data users participate in a secure file retrieval. For this purpose, user's credentials (ID, password, secure ID, and current timestamp, email id) are hashed and compared with that stored in a database. In Big data management, there are three important processes implemented to organize data. They are as follows: Compression using Lemperl Ziv Markow Algorithm (LZMA), Clustering using Density-based Clustering of Applications with Noise (DBSCAN), and Indexing using Fractal Index Tree. The proposed scheme for these processes are implemented using Java Programming and performance tested for the following metrics: Information Loss, Compression Ratio, Throughput, Encryption Time and Decryption Time.

[1]  Shelbi Joseph,et al.  A light weight encryption over big data in information stockpiling on cloud , 2020 .

[2]  Alfredo De Santis,et al.  Cloud-based adaptive compression and secure management services for 3D healthcare data , 2015, Future Gener. Comput. Syst..

[3]  V. Kavitha,et al.  Enhancement of data confidentiality and secure data transaction in cloud storage environment , 2017, Cluster Computing.

[4]  Kim-Kwang Raymond Choo,et al.  Achieving high performance and privacy-preserving query over encrypted multidimensional big metering data , 2018, Future Gener. Comput. Syst..

[5]  Issa M. Khalil,et al.  An Integrated Methodology for Big Data Classification and Security for Improving Cloud Systems Data Mobility , 2019, IEEE Access.

[6]  Keke Gai,et al.  Dynamic energy-aware cloudlet-based mobile cloud computing model for green computing , 2016, J. Netw. Comput. Appl..

[7]  Jian Shen,et al.  Secure Authentication in Cloud Big Data with Hierarchical Attribute Authorization Structure , 2017, IEEE Transactions on Big Data.

[8]  Kuo-Hui Yeh,et al.  A Provably Secure Multi-server Based Authentication Scheme , 2014, Wirel. Pers. Commun..

[9]  Kostas E. Psannis,et al.  Efficient and secure BIG data delivery in Cloud Computing , 2017, Multimedia Tools and Applications.

[10]  Jian Ma,et al.  An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards , 2012, J. Netw. Comput. Appl..

[11]  R. Ramya Devi,et al.  Triple DES: Privacy Preserving in Big Data Healthcare , 2020, Int. J. Parallel Program..

[12]  Giovanni Luca Masala,et al.  Big Data Security on Cloud Servers Using Data Fragmentation Technique and NoSQL Database , 2018, IIMSS.

[13]  David Bholat,et al.  Big Data and central banks , 2015, Big Data & Society.

[14]  Ali Daud,et al.  Towards Smart Healthcare: Patient Data Privacy and Security in Sensor-Cloud Infrastructure , 2018, Wirel. Commun. Mob. Comput..

[15]  Minh-Triet Tran,et al.  Provable Identity Based User Authentication Scheme on ECC in Multi-server Environment , 2017, Wirel. Pers. Commun..

[16]  Cheng-Chi Lee,et al.  An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment , 2019, Soft Comput..

[17]  Vikas Goyal,et al.  An Effective Hybrid Encryption Algorithm for Ensuring Cloud Data Security , 2018 .

[18]  Kelly Bronson,et al.  Big Data in food and agriculture , 2016 .

[19]  Santosh Aditham,et al.  A System Architecture for the Detection of Insider Attacks in Big Data Systems , 2018, IEEE Transactions on Dependable and Secure Computing.

[20]  Sushil Kumar Saroj,et al.  A New Security Framework for Cloud Data , 2018 .

[21]  Big Data and historical social science , 2015 .

[22]  Keke Gai,et al.  Intelligent cryptography approach for secure distributed big data storage in cloud computing , 2017, Inf. Sci..

[23]  Huaglory Tianfield,et al.  Big Data Based Security Analytics for Protecting Virtualized Infrastructures in Cloud Computing , 2018, IEEE Transactions on Big Data.

[24]  Keke Gai,et al.  Blend Arithmetic Operations on Tensor-Based Fully Homomorphic Encryption Over Real Numbers , 2018, IEEE Transactions on Industrial Informatics.

[25]  Li Xu,et al.  Cost-Effective Authentic and Anonymous Data Sharing with Forward Security , 2015, IEEE Transactions on Computers.

[26]  Xudong Fan,et al.  TPTVer: A trusted third party based trusted verifier for multi-layered outsourced big data system in cloud environment , 2018, China Communications.

[27]  Liehui Jiang,et al.  Secure and Efficient User Authentication Scheme Based on Password and Smart Card for Multiserver Environment , 2018, Secur. Commun. Networks.

[28]  Keke Gai,et al.  Energy-aware task assignment for mobile cyber-enabled applications in heterogeneous cloud computing , 2018, J. Parallel Distributed Comput..

[29]  Shashikala Tapaswi,et al.  Robust Smart Card Authentication Scheme for Multi-server Architecture , 2013, Wireless Personal Communications.

[30]  Md Tabrez Nafis,et al.  A secure technique for unstructured big data using clustering method , 2019, International Journal of Information Technology.

[31]  Jianhua Li,et al.  Big Data Analysis-Based Security Situational Awareness for Smart Grid , 2018, IEEE Transactions on Big Data.

[32]  Kai Fan,et al.  Secure and private key management scheme in big data networking , 2018, Peer-to-Peer Netw. Appl..

[33]  Wenfen Liu,et al.  Forward and backward secure fuzzy encryption for data sharing in cloud computing , 2019, Soft Comput..

[34]  Jiguo Yu,et al.  A Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds , 2018, IEEE Transactions on Big Data.

[35]  Suriyani Ariffin,et al.  Big Data Security in the Web-Based Cloud Storage System Using 3D-AES Block Cipher Cryptography Algorithm , 2018 .

[36]  Yenumula Reddy Big Data Processing and Access Controls in Cloud Environment , 2018, 2018 IEEE 4th International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing, (HPSC) and IEEE International Conference on Intelligent Data and Security (IDS).

[37]  Seung-Soo Shin,et al.  An Efficient Authentication Scheme to Protect User Privacy in Seamless Big Data Services , 2015, Wireless Personal Communications.

[38]  Joel J. P. C. Rodrigues,et al.  HEAP: An Efficient and Fault-Tolerant Authentication and Key Exchange Protocol for Hadoop-Assisted Big Data Platform , 2018, IEEE Access.

[39]  Ahmed Khoumsi,et al.  Validation and Correction of Large Security Policies: A Clustering and Access Log Based Approach , 2018, 2018 IEEE International Conference on Big Data (Big Data).