PPS-ADS: A Framework for Privacy-Preserved and Secured Distributed System Architecture for Handling Big Data

The exponential expansion of Big Data in 7V’s (velocity, variety, veracity, value, variability and visualization) brings forth new challenges to security, reliability, availability and privacy of these data sets. Traditional security techniques and algorithms fail to complement this gigantic big data. This paper aims to improve the recently proposed Atrain Distributed System (ADS) by incorporating new features which will cater to the end-to-end availability and security aspects of the big data in the distributed system. The paper also integrates the concept of Software Defined Networking (SDN) in ADS to effectively control and manage the routing of the data item in the ADS. The storage of data items in the ADS is done on the basis of the type of data (structured or unstructured), the capacity of the distributed system (or coach) and the distance of coach from the pilot computer (PC). In order to maintain the consistency of data and to eradicate the possible loss of data, the concept of “ forward positive” and “ backward positive” acknowledgment is proposed. Furthermore, we have incorporated “ Twofish” cryptographic technique to encrypt the big data in the ADS. Issues like “data ownership”, “data security, “data privacy” and data reliability” are pivotal while handling the big data. The current paper presents a framework for a privacy-preserved architecture for handling the big data in an effective manner.

[1]  N. B. Anuar,et al.  The rise of "big data" on cloud computing: Review and open research issues , 2015, Inf. Syst..

[2]  Murtaza Haider,et al.  Beyond the hype: Big data concepts, methods, and analytics , 2015, Int. J. Inf. Manag..

[3]  Gang Li,et al.  Big data related technologies, challenges and future prospects , 2015, J. Inf. Technol. Tour..

[4]  Richard Kemp,et al.  Legal aspects of managing Big Data , 2014, Comput. Law Secur. Rev..

[5]  Bruce Schneier,et al.  The Twofish encryption algorithm: a 128-bit block cipher , 1999 .

[6]  Sanjoy Das,et al.  Security framework using Hadoop for big data , 2017, 2017 International Conference on Computing, Communication and Automation (ICCCA).

[7]  Keke Gai,et al.  Security-Aware Efficient Mass Distributed Storage Approach for Cloud Systems in Big Data , 2016, 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS).

[8]  Beniamino Di Martino,et al.  Resource Management for Big Data Platforms , 2016, Computer Communications and Networks.

[9]  Jinjun Chen,et al.  DLSeF , 2016, ACM Trans. Embed. Comput. Syst..

[10]  Remzi Seker,et al.  Big Data and virtualization for manufacturing cyber-physical systems: A survey of the current status and future outlook , 2016, Comput. Ind..

[11]  Colin Tankard,et al.  Big data security , 2012, Netw. Secur..

[12]  Bruce Schneier,et al.  The Twofish Encryption Algorithm , 1999 .

[13]  Keke Gai,et al.  Privacy-Aware Adaptive Data Encryption Strategy of Big Data in Cloud Computing , 2016, 2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud).

[14]  Dilpreet Singh,et al.  A survey on platforms for big data analytics , 2014, Journal of Big Data.

[15]  Wei Zhou,et al.  Improving big data storage performance in hybrid environment , 2017, J. Comput. Sci..

[16]  Jun Zhang,et al.  Visualization of big data security: a case study on the KDD99 cup data set , 2017 .

[17]  Tsuyoshi Murata,et al.  {m , 1934, ACML.

[18]  Madhusudhan Govindaraju,et al.  An Evaluation of Cassandra for Hadoop , 2013, 2013 IEEE Sixth International Conference on Cloud Computing.

[19]  Gunasekaran Manogaran,et al.  MetaCloudDataStorage Architecture for Big Data Security in Cloud Computing , 2016 .

[20]  Elisa Bertino,et al.  Big Data - Security and Privacy , 2015, 2015 IEEE International Congress on Big Data.

[21]  Angelo Spognardi,et al.  Security Flows in OAuth 2.0 Framework: A Case Study , 2017, SAFECOMP Workshops.

[22]  Ranjit Biswas Heterogeneous Data Structure “r-Atrain” , 2014 .

[23]  Jörg Daubert,et al.  Big Data Storage , 2021, New Horizons for a Data-Driven Economy.

[24]  Oliver Yu Data Communication , 2008, Wiley Encyclopedia of Computer Science and Engineering.

[25]  Guillermo Lafuente,et al.  The big data security challenge , 2015, Netw. Secur..

[26]  Hairong Kuang,et al.  The Hadoop Distributed File System , 2010, 2010 IEEE 26th Symposium on Mass Storage Systems and Technologies (MSST).

[27]  Shahriar Akter,et al.  How ‘Big Data’ Can Make Big Impact: Findings from a Systematic Review and a Longitudinal Case Study , 2015 .

[28]  Jung Kyu Park,et al.  Big data storage configuration and performance evaluation utilizing NDAS storage systems , 2018, AKCE Int. J. Graphs Comb..

[29]  Keke Gai,et al.  Intelligent cryptography approach for secure distributed big data storage in cloud computing , 2017, Inf. Sci..

[30]  Wolfgang Wahlster,et al.  New Horizons for a Data-Driven Economy , 2016, Springer International Publishing.

[31]  Michael Menth,et al.  Software-Defined Networking Using OpenFlow: Protocols, Applications and Architectural Design Choices , 2014, Future Internet.

[32]  Sriram Rao,et al.  A The Quantcast File System , 2013, Proc. VLDB Endow..

[33]  Danda B. Rawat,et al.  Software Defined Networking Architecture, Security and Energy Efficiency: A Survey , 2017, IEEE Communications Surveys & Tutorials.

[35]  Fernando M. V. Ramos,et al.  Software-Defined Networking: A Comprehensive Survey , 2014, Proceedings of the IEEE.

[36]  Gunasekaran Manogaran,et al.  Big Data Security Framework for Distributed Cloud Data Centers , 2017 .

[37]  Mohd Abdul Ahad,et al.  Comparing and Analyzing the Characteristics of Hadoop, Cassandra and Quantcast File Systems for Handling Big Data , 2017 .

[38]  Gunasekaran Manogaran,et al.  Big Data Security Intelligence for Healthcare Industry 4.0 , 2017 .