Achieving big data privacy via hybrid cloud

Nowadays the amount of data is being produced exponentially with the rapid development of electronic technology and communication, which makes it hard to cost-effectively store and manage these big data. Cloud computing, a new business model, is considered as one of most attractive solutions for big data, and provides the advantage of reduced cost through sharing of computing and storage resources. However, the growing concerns in term of the privacy of data stored in public cloud have slowed down the adoption of cloud computing for big data because sensitive information may be contained among the big data or the data owner themselves do not want any other people to scan their data. Since the data volume is huge and mobile devices are widely used, the traditional cryptographic approach are not suitable for big data. In this paper, we propose an efficient scheme for image data, which has much more volume than text data. We evaluate our scheme in real networks (including Amazon EC2), and our experimental results on image show that: (1) our scheme achieves privacy but only use 1/585.8~1/398.6 the time of the AES algorithm; (2) the delay of our hybrid-cloud-based scheme is only 3%~5% more than that of the traditional public-cloud-only approach.

[1]  Hong Zhao,et al.  Data Security and Privacy Protection Issues in Cloud Computing , 2012, 2012 International Conference on Computer Science and Electronics Engineering.

[2]  Xing-yuan Wang,et al.  An image blocks encryption algorithm based on spatiotemporal chaos , 2012 .

[3]  Xingyuan Wang,et al.  Cryptanalysis on a novel image encryption method based on total shuffling scheme , 2011 .

[4]  William T. Freeman,et al.  A probabilistic image jigsaw puzzle solver , 2010, 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition.

[5]  Cong Wang,et al.  Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.

[6]  Erik D. Demaine,et al.  Jigsaw Puzzles, Edge Matching, and Polyomino Packing: Connections and Complexity , 2007, Graphs Comb..

[7]  Minghua Chen,et al.  Moving Big Data to The Cloud: An Online Cost-Minimizing Approach , 2013, IEEE Journal on Selected Areas in Communications.

[8]  Xiang-Yang Li,et al.  Privacy preserving cloud data access with multi-authorities , 2012, 2013 Proceedings IEEE INFOCOM.

[9]  Man Ho Au,et al.  Security and privacy in big data , 2016, Concurr. Comput. Pract. Exp..

[10]  Qing Liu,et al.  An Improved Image Encryption Method Based on Total Shuffling Scheme , 2011 .

[11]  Jin Li,et al.  A Novel Framework for Outsourcing and Sharing Searchable Encrypted Data on Hybrid Cloud , 2012, 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems.

[12]  Jiankun Hu,et al.  A chaos-based encryption technique to protect ECG packets for time critical telecardiology applications , 2011, Secur. Commun. Networks.

[13]  Yong Wang,et al.  A new chaos-based fast image encryption algorithm , 2011, Appl. Soft Comput..