×

Intelligent cryptography approach for secure distributed big data storage in cloud computing. (English) Zbl 1429.68017

Summary: Implementing cloud computing empowers numerous paths for Web-based service offerings to meet diverse needs. However, the data security and privacy has become a critical issue that restricts many cloud applications. One of the major concerns in security and privacy is caused by the fact that cloud operators have chances to reach the sensitive data. This concern dramatically increases users’ anxiety and reduces the adoptability of cloud computing in many fields, such as the financial industry and governmental agencies. This paper focuses on this issue and proposes an intelligent cryptography approach, by which the cloud service operators cannot directly reach partial data. The proposed approach divides the file and separately stores the data in the distributed cloud servers. An alternative approach is designed to determine whether the data packets need a split in order to shorten the operation time. The proposed scheme is entitled Security-Aware Efficient Distributed Storage (SA-EDS) model, which is mainly supported by our proposed algorithms, including Alternative Data Distribution (AD2) Algorithm, Secure Efficient Data Distributions (SED2) Algorithm and Efficient Data Conflation (EDCon) Algorithm. Our experimental evaluations have assessed both security and efficiency performances and the experimental results depict that our approach can effectively defend main threats from clouds and requires with an acceptable computation time.

MSC:

68M11 Internet topics
68M14 Distributed systems
68P20 Information storage and retrieval of data
94A60 Cryptography
Full Text: DOI

References:

[1] Alahmadi, A.; Abdelhakim, M.; Ren, J.; Li, T., Defense against primary user emulation attacks in cognitive radio networks using advanced encryption standard, IEEE Trans. Inf. Forensics Secur., 9, 5, 772-781 (2014)
[2] Ali, M.; Khan, S.; Vasilakos, A., Security in cloud computing: Opportunities and challenges, Inf. Sci., 305, 357-383 (2015)
[3] Aliev, R.; Pedrycz, W.; Fazlollahi, B.; Huseynov, O.; Alizadeh, A.; Guirimov, B., Fuzzy logic-based generalized decision theory with imperfect information, Inf. Sci., 189, 18-42 (2012) · Zbl 1247.91042
[4] Ateniese, G.; Fu, K.; Green, M.; Hohenberger, S., Improved proxy re-encryption schemes with applications to secure distributed storage, ACM Trans. Inf. Syst. Secur., 9, 1, 1-30 (2006) · Zbl 1281.94070
[5] Baek, J.; Vu, Q.; Liu, K.; Huang, X.; Xiang, Y., A secure cloud computing based framework for big data information management of smart grid, IEEE Trans. Cloud Comput., 3, 2, 233-244 (2015)
[6] Brakerski, Z.; Gentry, C.; Vaikuntanathan, V., (Leveled) fully homomorphic encryption without bootstrapping, ACM Trans. Comput. Theory, 6, 3, 13 (2014) · Zbl 1347.68121
[7] Cao, N.; Wang, C.; Li, M.; Ren, K.; Lou, W., Privacy-preserving multi-keyword ranked search over encrypted cloud data, IEEE Trans. Parallel Distrib. Syst., 25, 1, 222-233 (2014)
[8] Chadwick, D.; Fatema, K., A privacy preserving authorisation system for the cloud, J. Comput. Syst. Sci., 78, 5, 1359-1373 (2012)
[9] Chang, V.; Ramachandran, M., Towards achieving data security with the cloud computing adoption framework, IEEE Trans. Serv. Comput., 9, 1, 138-151 (2016)
[10] Chen, C.; Won, M.; Stoleru, R.; Xie, G., Energy-efficient fault-tolerant data storage and processing in mobile cloud, IEEE Trans. cloud comput., 3, 1, 28-41 (2015)
[11] Chen, C.; Zhang, C., Data-intensive applications, challenges, techniques and technologies: A survey on big data, Inf. Sci., 275, 314-347 (2014)
[12] Cimino, M.; Marcelloni, F., Autonomic tracing of production processes with mobile and agent-based computing, Inf. Sci., 181, 5, 935-953 (2011)
[13] Costa, K.; Pereira, L.; Nakamura, R.; Pereira, C.; Papa, J.; Falcão, A., A nature-inspired approach to speed up optimum-path forest clustering and its application to intrusion detection in computer networks, Inf. Sci., 294, 95-108 (2015) · Zbl 1360.62323
[15] Ding, Y.; Hu, Y.; Hao, K.; Cheng, L., MPSICA: An intelligent routing recovery scheme for heterogeneous wireless sensor networks, Inf. Sci., 308, 49-60 (2015)
[16] Gai, K.; Du, Z.; Qiu, M.; Zhao, H., Efficiency-aware workload optimizations of heterogenous cloud computing for capacity planning in financial industry, The 2nd IEEE International Conference on Cyber Security and Cloud Computing, 1-6 (2015), IEEE: IEEE New York, USA
[17] Gai, K.; Li, S., Towards cloud computing: a literature review on cloud computing and its development trends, 4th International Conference on Multimedia Information Networking and Security, Nanjing, China, 142-146 (2012)
[18] Gai, K.; Qiu, L.; Chen, M.; Zhao, H.; Qiu, M., SA-EAST: Security-aware efficient data transmission for ITS in mobile heterogeneous cloud computing, ACM Trans. Embedded Comput. Syst., 1, 99 (2016)
[19] Gai, K.; Qiu, L.; Zhao, H.; Qiu, M., Cost-aware multimedia data allocation for heterogeneous memory using genetic algorithm in cloud computing, IEEE Trans. Cloud Comput., 1, 99 (2016)
[20] Gai, K.; Qiu, M.; Chen, L.; Liu, M., Electronic health record error prevention approach using ontology in big data, 17th IEEE International Conference on High Performance Computing and Communications, New York, USA, 752-757 (2015)
[21] Gai, K.; Qiu, M.; Tao, L.; Zhu, Y., Intrusion detection techniques for mobile cloud computing in heterogeneous 5G, Secur. Commun. Netw., 1-10 (2015)
[22] Gai, K.; Qiu, M.; Thuraisingham, B.; Tao, L., Proactive attribute-based secure data schema for mobile cloud in financial industry, The IEEE International Symposium on Big Data Security on Cloud, IEEE 17th International Conference on High Performance Computing and Communications, New York, USA, 1332-1337 (2015)
[23] Gai, K.; Qiu, M.; Zhao, H., Security-aware efficient mass distributed storage approach for cloud systems in big data, 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS), 140-145 (2016), IEEE: IEEE New York, USA
[24] Gai, K.; Qiu, M.; Zhao, H.; Dai, W., Anti-counterfeit schema using monte carlo simulation for e-commerce in cloud systems, The 2nd IEEE International Conference on Cyber Security and Cloud Computing, 74-79 (2015), IEEE: IEEE New York, USA
[25] Gai, K.; Qiu, M.; Zhao, H.; Tao, L.; Zong, Z., Dynamic energy-aware cloudlet-based mobile cloud computing model for green computing, J. Netw. Comput. Appl., 59, 46-54 (2015)
[26] Gai, K.; Qiu, M.; Zhao, H.; Xiong, J., Privacy-aware adaptive data encryption strategy of big data in cloud computing, The 3rd IEEE International Conference on Cyber Security and Cloud Computing, The 2nd IEEE International Conference of Scalable and Smart Cloud, 273-278 (2016), IEEE: IEEE Beijing, China
[27] Herrera-Viedma, E.; Cabrerizo, F.; Kacprzyk, J.; Pedrycz, W., A review of soft consensus models in a fuzzy environment, Inf. Fusion, 17, 4-13 (2014)
[29] Li, H.; Liu, D.; Dai, Y.; Luan, T., Engineering searchable encryption of mobile cloud networks: When qoe meets qop, IEEE Wireless Commun., 22, 4, 74-80 (2015)
[30] Li, J.; Qiu, M.; Ming, Z.; Quan, G.; Qin, X.; Gu, Z., Online optimization for scheduling preemptable tasks on iaas cloud systems, J. Parallel Distrib. Comput., 72, 5, 666-677 (2012)
[31] Li, M.; Yu, S.; Zheng, Y.; Ren, K.; Lou, W., Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption, IEEE Trans. Parallel Distrib. Syst., 24, 1, 131-143 (2013)
[32] Li, Y.; Dai, W.; Ming, Z.; Qiu, M., Privacy protection for preventing data over-collection in smart city, IEEE Trans. Comput., 65, 5, 1339-1350 (2016)
[33] Li, Y.; Gai, K.; Ming, Z.; Zhao, H.; Qiu, M., Intercrossed access control for secure financial services on multimedia big data in cloud systems, ACM Transactions on Multimedia Computing Communications and Applications, 1 (2016)
[34] Liu, Q.; Wang, G.; Wu, J., Time-based proxy re-encryption scheme for secure data sharing in a cloud environment, Inf. Sci., 258, 355-370 (2014)
[35] Liu, S.; Qu, Q.; Chen, L.; Ni, L., SMC: A practical schema for privacy-preserved data sharing over distributed data streams, IEEE Trans. Big Data, 1, 2, 68-81 (2015)
[36] Modi, C.; Patel, D.; Borisaniya, B.; Patel, A.; Rajarajan, M., A survey on security issues and solutions at different layers of cloud computing, J. Supercomput., 63, 2, 561-592 (2013)
[37] Mozaffari-Kermani, M.; Reyhani-Masoleh, A., A lightweight high-performance fault detection scheme for the advanced encryption standard using composite fields, IEEE Trans. Very Large Scale Integr. Syst., 19, 1, 85-91 (2011)
[38] Parakh, A.; Kak, S., Online data storage using implicit security, Inf. Sci., 179, 19, 3323-3331 (2009) · Zbl 1193.68103
[39] Pedrycz, W., Allocation of information granularity in optimization and decision-making models: Towards building the foundations of granular computing, Eur. J. Oper. Res., 232, 1, 137-145 (2014)
[40] Pedrycz, W.; Song, M., A granulation of linguistic information in AHP decision-making problems, Inf. Fusion, 17, 93-101 (2014)
[41] Plantard, T.; Susilo, W.; Zhang, Z., Fully homomorphic encryption using hidden ideal lattice, IEEE Trans. Inf. Forensics Secur., 8, 12, 2127-2137 (2013)
[42] Qiu, M.; Gai, K.; Thuraisingham, B.; Tao, L.; Zhao, H., Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry, Future Gener. Comput. Syst., 1 (2016)
[43] Qiu, M.; Zhang, L.; Ming, Z.; Chen, Z.; Qin, X.; Yang, L., Security-aware optimization for ubiquitous computing systems with SEAT graph approach, J. Comput. Syst. Sci., 79, 5, 518-529 (2013) · Zbl 1268.68078
[44] Qiu, M.; Zhong, M.; Li, J.; Gai, K.; Zong, Z., Phase-change memory optimization for green cloud with genetic algorithm, IEEE Trans. Comput., 64, 12, 3528-3540 (2015) · Zbl 1360.68094
[45] Song, T.; Pan, L.; Păun, G., Asynchronous spiking neural P systems with local synchronization, Inf. Sci., 219, 197-207 (2013) · Zbl 1293.68122
[46] Wang, C.; Chow, S.; Wang, Q.; Ren, K.; Lou, W., Privacy-preserving public auditing for secure cloud storage, IEEE Trans. Comput., 62, 2, 362-375 (2013) · Zbl 1365.68235
[47] Wang, H.; Xu, Z.; Fujita, H.; Liu, S., Towards felicitous decision making: An overview on challenges and trends of big data, Inf. Sci., 367, 747-765 (2016)
[48] Wei, L.; Zhu, H.; Cao, Z.; Dong, X.; Jia, W.; Chen, Y.; Vasilakos, A., Security and privacy for storage and computation in cloud computing, Inf. Sci., 258, 371-386 (2014)
[49] Wen, M.; Lu, R.; Lei, J.; Li, H.; Liang, X.; Shen, X., Sesa: An efficient searchable encryption scheme for auction in emerging smart grid marketing, Secur. Commun. Netw., 7, 1, 234-244 (2014)
[50] Wu, G.; Zhang, H.; Qiu, M.; Ming, Z.; Li, J.; Qin, X., A decentralized approach for mining event correlations in distributed system monitoring, J. Parallel Distrib. Comput., 73, 3, 330-340 (2013) · Zbl 1270.68049
[51] Yan, Z.; Chen, Y.; Shen, Y., A practical reputation system for pervasive social chatting, J. Comput. Syst. Sci., 79, 5, 556-572 (2013)
[52] Yan, Z.; Wang, M.; Zhang, P., A scheme to secure instant community data access based on trust and contexts, IEEE International Conference on Computer and Information Technology, 646-651 (2014), IEEE: IEEE Xi’an, China
[53] Yan, Z.; Zhang, P.; Vasilakos, A., A survey on trust management for internet of things, J. Netw. Comput. Appl., 42, 120-134 (2014)
[54] Yao, J.; Vasilakos, A.; Pedrycz, W., Granular computing: Perspectives and challenges, IEEE Trans. Cybern., 43, 6, 1977-1989 (2013)
[55] Yoon, S.; Kim, K.; Hong, J.; Kim, S.; Park, S., A community-based sampling method using DPL for online social networks, Inf. Sci., 306, 53-69 (2015)
[56] Yu, K.; Gao, Y.; Zhang, P.; Qiu, M., Design and architecture of dell acceleration appliances for database (DAAD): A practical approach with high availability guaranteed, IEEE 17th International Conference on High Performance Computing and Communications, 430-435 (2015), IEEE
[57] Yu, Y.; Ni, J.; Au, M.; Mu, Y.; Wang, B.; Li, H., Comments on a public auditing mechanism for shared cloud data service, IEEE Trans. Serv. Comput., 8, 6, 998-999 (2015)
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.