Protection of Big Data Privacy on Multiple Cloud Providers by Asymmetric Security Scheme

Big data is the name that defines data which has enormous size and unstructured. Due to the file size is pretty huge. It is impracticable to store a large file in one storage volume. However, cloud computing is a solution to this impossible. Data owner can store the file in a cloud storage provider (CSP). Nevertheless, the new dilemma has arisen. Relying on single cloud storage may generate trouble for the customer. A CSP may stop its service anytime. Moreover, the CSP is the third party that user have to trust without verification. In that case, the privacy or unauthorized accessing of data may be violated without notice. To overcome this risk, we propose secure data storage scheme for big data storing on multiple CSPs. The one big data file is split into chunks and distributed to multiple cloud storage provider. After splitting the file, metadata is generated. Metadata is a place to keep chunks information, includes; chunk locations, access paths, username and password of the data owner, methods to connect each CSP. The metadata is encrypted and transferred to the user who requests to access the file. The user utilizes the metadata and chunks of the file to compose the original file. This method will minimize the risk of privacy. The goal of this paper is to provide the method to protect the privacy of data stored on multiple cloud storage providers. Furthermore, we discuss and analyze how this data storage scheme promote the protection of big data privacy.

[1]  Yiming Yang,et al.  Secure Fragment Allocation in a Distributed Storage System with Heterogeneous Vulnerabilities , 2011, 2011 IEEE Sixth International Conference on Networking, Architecture, and Storage.

[2]  Nikunj Joshi,et al.  Big data security and privacy issues — A survey , 2017, 2017 Innovations in Power and Advanced Computing Technologies (i-PACT).

[3]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[4]  Lei Sun,et al.  Practical searchable CP-ABE in cloud storage , 2016, 2016 2nd IEEE International Conference on Computer and Communications (ICCC).

[5]  M. Kanchana,et al.  Secure Dynamic Fragment and Replica Allocation in Large-Scale Distributed File Systems , 2015 .

[6]  Miguel Correia,et al.  DepSky: Dependable and Secure Storage in a Cloud-of-Clouds , 2013, TOS.

[7]  Yun Tian,et al.  Secure replica allocation in cloud storage systems with heterogeneous vulnerabilities , 2015, 2015 IEEE International Conference on Networking, Architecture and Storage (NAS).

[8]  Devesh C. Jinwala,et al.  A Novel Approach for Searchable CP-ABE with Hidden Ciphertext-Policy , 2014, ICISS.

[9]  Hakim Weatherspoon,et al.  RACS: a case for cloud storage diversity , 2010, SoCC '10.

[10]  Song Guo,et al.  Privacy-Preserving Access to Big Data in the Cloud , 2016, IEEE Cloud Computing.

[11]  Mark Smiley An Introduction to Big Data , 2016 .

[12]  Nesrine Kaaniche,et al.  Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms , 2017, Comput. Commun..

[13]  Keqin Li,et al.  Systematic Data Placement Optimization in Multi-Cloud Storage for Complex Requirements , 2016, IEEE Transactions on Computers.

[14]  Seref Sagiroglu,et al.  Big data: A review , 2013, 2013 International Conference on Collaboration Technologies and Systems (CTS).

[15]  Ari Juels,et al.  HAIL: a high-availability and integrity layer for cloud storage , 2009, CCS.