Efficient and secure BIG data delivery in Cloud Computing

Big Data (BD) is a new technology which rapidly growing in the telecommunications sectors, especially in the contemporary field of wireless telecommunications. Another technology that grows rapidly in the field of wireless telecommunications is Cloud Computing (CC). CC concerns an infrastructure where data storage and processing take place outside of the user’s device. Both of them face security and privacy issues in their function. In order to improve them and to optimize their privacy and security issues conducted the present survey. In this paper, we survey BD and CC technology and their basic characteristics, with a focus on the security and privacy issues of both technologies. Specifically, we try to combine the functionality of the two technologies (i.e BD and CC) with the aim to examine the frequent features, and also to discover the benefits related in security issues of their integration. Concluding, we present a new method of an algorithm that can be used for the purpose of improving Cloud Computing’s security through the use of algorithms that can provide more privacy in the data related to Big Data technology. At the end, there is a survey about the challenges of the integration of BD and CC related to their security level.

[1]  Gurpreet Singh,et al.  Integrating AES, DES, and 3-DES Encryption Algorithms for Enhanced Data Security , 2013 .

[2]  Byung-Gyu Kim,et al.  Performance analysis of inter-layer prediction in scalable extension of HEVC (SHVC) for adaptive media service , 2016, Displays.

[3]  Chonho Lee,et al.  A survey of mobile cloud computing: architecture, applications, and approaches , 2013, Wirel. Commun. Mob. Comput..

[4]  Axel Winkelmann,et al.  Cloud Computing Data Protection -- A Literature Review and Analysis , 2014, 2014 47th Hawaii International Conference on System Sciences.

[5]  Supriya Kinger,et al.  Analysis of Security Algorithms in Cloud Computing , 2014 .

[6]  George Mastorakis,et al.  Efficient entertainment services provision over a novel network architecture , 2016, IEEE Wireless Communications.

[7]  Mohit Bhansali,et al.  Enhancing Cloud Computing Security using AES Algorithm , 2013 .

[8]  Mohie M. Hadhoud,et al.  Performance Evaluation of Symmetric Encryption Algorithms , 2008 .

[9]  Andrzej Chydzinski,et al.  Adaptive Video Streaming: Rate and Buffer on the Track of Minimum Rebuffering , 2016, IEEE Journal on Selected Areas in Communications.

[10]  Mohie M. Hadhoud,et al.  Performance Evaluation of Symmetric Encryption Algorithms , 2008 .

[11]  Sachchidanand Singh,et al.  Big Data analytics , 2012 .

[12]  J. Wenny Rahayu,et al.  Mobile cloud computing: A survey , 2013, Future Gener. Comput. Syst..

[13]  Athanasios V. Vasilakos,et al.  Security in cloud computing: Opportunities and challenges , 2015, Inf. Sci..

[14]  Markus Jakobsson,et al.  Implicit Authentication through Learning User Behavior , 2010, ISC.

[15]  George Mastorakis,et al.  On cohabitating networking technologies with common wireless access for home automation system purposes , 2016, IEEE Wireless Communications.

[16]  Yaser Jararweh,et al.  Internet of surveillance: a cloud supported large-scale wireless surveillance system , 2016, The Journal of Supercomputing.

[17]  L. Nelson Data, data everywhere. , 1997, Critical care medicine.

[18]  Abdullah Gani,et al.  A Study on Strategic Provisioning of Cloud Computing Services , 2014, TheScientificWorldJournal.

[19]  Sukhwinder Singh,et al.  Mobile Cloud Computing , 2014 .

[20]  Joe Celko Big Data and Cloud Computing , 2014 .

[21]  Muttukrishnan Rajarajan,et al.  Privacy Preserving Text Analytics: Research Challenges and Strategies in Name Analysis , 2015 .

[22]  Gail-Joon Ahn,et al.  Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.

[23]  Narasimha Rao Vajjhala,et al.  Big Data using Cloud Computing - Opportunities for Small and Medium-sized Enterprises , 2016 .

[24]  Rajiv Munjal,et al.  Comparison of Symmetric and Asymmetric Cryptography with Existing Vulnerabilities and Countermeasures , 2011 .

[25]  Rajkumar Buyya,et al.  A framework for ranking of cloud computing services , 2013, Future Gener. Comput. Syst..

[26]  Hai Jin,et al.  Differentially Private Online Learning for Cloud-Based Video Recommendation With Multimedia Big Data in Social Networks , 2015, IEEE Transactions on Multimedia.

[27]  Sreekanth Rallapalli,et al.  Impact of Processing and Analyzing Healthcare Big Data on Cloud Computing Environment by Implementing Hadoop Cluster , 2016 .

[28]  Roman Beck,et al.  Does Cloud Computing Matter? An Analysis of the Cloud Model Software-as-a-Service and Its Impact on Operational Agility , 2013, 2013 46th Hawaii International Conference on System Sciences.

[29]  Daniel M. Batista,et al.  A Survey of Large Scale Data Management Approaches in Cloud Environments , 2011, IEEE Communications Surveys & Tutorials.

[30]  Kostas E. Psannis,et al.  Secure integration of IoT and Cloud Computing , 2018, Future Gener. Comput. Syst..

[31]  Kostas E. Psannis,et al.  Recent advances delivered by Mobile Cloud Computing and Internet of Things for Big Data applications: a survey , 2017, Int. J. Netw. Manag..

[32]  Sebastian Andersson,et al.  A study of the advantages & disadvantages of mobile cloud computing versus native environment , 2013 .

[33]  A. Alavi,et al.  Opportunities and Challenges , 1998, In Vitro Diagnostic Industry in China.

[34]  A A Izang,et al.  Big Data and Cloud Computing Issues , 2016 .

[35]  Shashank Gupta,et al.  Reviewing the Security Features in Contemporary Security Policies and Models for Multiple Platforms , 2016 .

[36]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[37]  Martin Hilbert,et al.  The World’s Technological Capacity to Store, Communicate, and Compute Information , 2011, Science.

[38]  George Mastorakis,et al.  An evaluation of cloud-based mobile services with limited capacity: a linear approach , 2016, Soft Computing.

[39]  Jong-Hyeok Lee,et al.  Fast algorithm for the High Efficiency Video Coding (HEVC) encoder using texture analysis , 2016, Inf. Sci..