Layers Based Optimal Privacy Preservation of the On-premise Data Supported by the Dual Authentication and Lightweight on Fly Encryption in Cloud Ecosystem

The Big Data stored in the cloud-based clusters of nodes requires an efficient mechanism to protect its privacy information. The traditional anonymization approach for privacy preservation is not applicable for Big Data due to overheads induced as the data storage mechanism follows a distributed file system in the cloud eco-store. This paper presents a dual-layer security model that mitigates the attackers' effect on access to private information. The model architecture consists of a strong authentication mechanism where the key generation to get the access control adopts a high random and customization policy so that at first hand the intruder's probability of entering into the cloud system is nullified and effectively handles the anonymity attack, in the second part of the security model the privacy information part of the data is encrypted with a very lightweight encryption method, and it gets synchronized with the data-deduplication template of the data nodes in the cloud so that the proposed model provides higher security of the privacy information in less time complexities of the cryptographic algorithm which makes the models more reliable as well as flexible to adopt it in the real-time scenario. The behavioral analysis of the proposed Auth-PP for the file-token generation system becomes stable with the incremental file size and exhibits a consistency measure (Ct) = 0.56, which is a mean orient pattern that shows strong stability against the file size so quite adaptable for the big data. The computational performance analysis for cost assessment of encryption and decryption process shows 72% performance improvement for running time for variable file sizes and also exhibits the superior outcome of overall 69.9% for file chunking into the data node on the respective cloud. For the decryption process also, it is observed that the formulated approach attains superior performance in terms of time complexity.

[1]  Alptekin Küpçü,et al.  Single password authentication , 2013, Comput. Networks.

[2]  Weizhong Qiang,et al.  Cloud Authentication Based on Anonymous One-Time Password , 2013 .

[3]  Wolfgang Kastner,et al.  Manufacturing process data analysis pipelines: a requirements analysis and survey , 2019, Journal of Big Data.

[4]  Qiang Ye,et al.  A light-weight authentication scheme based on message digest and location for mobile cloud computing , 2014, 2014 IEEE 33rd International Performance Computing and Communications Conference (IPCCC).

[5]  V. K. Agrawal,et al.  Multi-level authentication technique for accessing cloud services , 2012, 2012 International Conference on Computing, Communication and Applications.

[6]  Cheng Yang,et al.  Research on anonymous protection technology for big data publishing , 2016, 2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS).

[7]  Yan Wang,et al.  An optimized cluster storage method for real-time big data in Internet of Things , 2019, The Journal of Supercomputing.

[8]  J. Karthikeyan,et al.  Privacy Preserving Big Data Publication On Cloud Using Mondrian Anonymization Techniques and Deep Neural Networks , 2019, 2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS).

[9]  Apoorva S. Shastri,et al.  A Review of Big Data and Its Applications in Healthcare and Public Sector , 2019, Studies in Big Data.

[10]  A. P. Siva Kumar,et al.  Privacy preservation techniques in big data analytics: a survey , 2018, Journal of Big Data.

[11]  J. Priyadarshini,et al.  Scalable Privacy Preservation in Big Data a Survey , 2015 .

[12]  V. S. Ananthanarayana,et al.  Fine-grained data-locality aware MapReduce job scheduler in a virtualized environment , 2020, J. Ambient Intell. Humaniz. Comput..

[13]  Iehab Al Rassan,et al.  Securing Mobile Cloud Computing Using Biometric Authentication (SMCBA) , 2014, 2014 International Conference on Computational Science and Computational Intelligence.

[14]  Zhiqiang Lin,et al.  Why Does Your Data Leak? Uncovering the Data Leakage in Cloud from Mobile Apps , 2019, 2019 IEEE Symposium on Security and Privacy (SP).

[15]  Abderrahim Abdellaoui,et al.  A Novel Strong Password Generator for Improving Cloud Authentication , 2016 .

[16]  William Riggs,et al.  Mitigating Bias in Big Data for Transportation , 2020 .

[17]  Suman Madan,et al.  A Privacy Preserving Scheme for Big data Publishing in the Cloud using k-Anonymization and Hybridized Optimization Algorithm , 2018, 2018 International Conference on Circuits and Systems in Digital Enterprise Technology (ICCSDET).

[18]  W. Price,et al.  Privacy in the age of medical big data , 2019, Nature Medicine.

[19]  Ankur Agarwal,et al.  HPCC based framework for COPD readmission risk analysis , 2019, Journal of Big Data.

[20]  Udai Pratap Rao,et al.  Privacy Preserving Unstructured Big Data Analytics , 2016 .

[21]  Rakesh Prasad Sarang Algorithms for Anonymity Preservation in Cloud Computing , 2018, 2018 8th International Conference on Communication Systems and Network Technologies (CSNT).

[22]  Nilay Khare,et al.  Enhanced Secured Map Reduce layer for Big Data privacy and security , 2019, J. Big Data.

[23]  S. Satyanarayana,et al.  Privacy preserving data publishing based on sensitivity in context of Big Data using Hive , 2018, Journal of Big Data.

[24]  Qianchen Gu,et al.  Breaking Two Remote User Authentication Systems for Mobile Devices , 2017, BigDataSecurity 2017.

[25]  Pascal Bouvry,et al.  Privacy and Security of Big Data in AI Systems: A Research and Standards Perspective , 2019, 2019 IEEE International Conference on Big Data (Big Data).

[26]  Seref Sagiroglu,et al.  Big data: A review , 2013, 2013 International Conference on Collaboration Technologies and Systems (CTS).

[27]  Mojtaba Alizadeh,et al.  Feasibility of Implementing Multi-factor Authentication Schemes in Mobile Cloud Computing , 2014, 2014 5th International Conference on Intelligent Systems, Modelling and Simulation.