Dew Computing and Asymmetric Security Framework for Big Data File Sharing

被引:1
|
作者
Suwansrikham, Parinya [1 ]
Kun, She [1 ]
Hayat, Shaukat [1 ]
Jackson, Jehoiada [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Informat & Software Engn, Chengdu 610054, Peoples R China
关键词
asymmetric security; big data; dew computing; file sharing; multi-cloud storage; CLOUD; STORAGE; ENCRYPTION; ISSUES;
D O I
10.3390/info11060303
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the advancement of technology, devices generate huge working files at a rapid rate. These data, which are of considerable scale and are created very fast, can be called big data. Keeping such files in one storage device is impossible. Therefore, a large file size is recommended for storage in a cloud storage service. Although this concept is a solution to solve the storage problem, it still faces challenges in terms of reliability and security. The main issues are the unreliability of single cloud storage when its service is down, and the risk of insider attack from the storage service. Therefore, this paper proposes a file sharing scheme that increases both the reliability of the file fragments using a multi-cloud storage system and decreases the risk from insider attack. The dew computing concept is used as a contributor to the file-sharing scheme. The working file is split into fragments. Each fragment is deployed to cloud storage services, one fragment per one cloud provider manner. The dew server controls users' access and monitors the availability of fragments. Finally, we verify the proposed scheme in aspects of the downloading performance, and security.
引用
收藏
页数:28
相关论文
共 50 条
  • [21] The Realization Path of Network Security Technology Under Big Data and Cloud Computing
    Kang, Nan
    Zhang, Xuesong
    Cheng, Xinzhou
    Fang, Bingyi
    Jiang, Hong
    SIGNAL AND INFORMATION PROCESSING, NETWORKING AND COMPUTERS (ICSINC), 2019, 550 : 570 - 577
  • [22] Enhance Enterprise Android Application Security with Cloud Computing and Big Data Analytics
    Zhong, Hongye
    Xiao, Jitian
    Zheng, Xiangxin
    2014 IEEE 7TH JOINT INTERNATIONAL INFORMATION TECHNOLOGY AND ARTIFICIAL INTELLIGENCE CONFERENCE (ITAIC), 2014, : 238 - 243
  • [23] Big Data Security Problem Based on Hadoop Framework
    Samet, Refik
    Aydin, Ayhan
    Toy, Feridun
    2019 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2019, : 525 - 530
  • [24] A Framework for Big Data Security Analysis and the Semantic Technology
    Yao, Yuangang
    Zhang, Lei
    Yi, Jin
    Peng, Yong
    Hu, Weihua
    Shi, Lei
    2016 6TH INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS 2016), 2016, : 246 - 249
  • [25] Logistics Security in the Era of Big Data, Cloud Computing and IoT
    Enache, Gabriela Ioana
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON BUSINESS EXCELLENCE, 2023, 17 (01): : 188 - 199
  • [26] ClimateSpark: An in-memory distributed computing framework for big climate data analytics
    Hu, Fei
    Yang, Chaowei
    Schnase, John L.
    Duffy, Daniel Q.
    Xu, Mengchao
    Bowen, Michael K.
    Lee, Tsengdar
    Song, Weiwei
    COMPUTERS & GEOSCIENCES, 2018, 115 : 154 - 166
  • [27] Preface: Security and privacy in big data clouds
    Liu, Qin
    Srinivasan, Avinash
    Hu, Jiankun
    Wang, Guojun
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 72 : 206 - 207
  • [28] Big Data Security Survey on Frameworks and Algorithms
    Chandra, Sudipta
    Ray, Soumya
    Goswami, R. T.
    2017 7TH IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2017, : 48 - 54
  • [29] A Novel Data Security Framework in Distributed Cloud Computing
    Malgari, Vanaja
    Dugyala, Raman
    Kumar, Ashwani
    2019 FIFTH INTERNATIONAL CONFERENCE ON IMAGE INFORMATION PROCESSING (ICIIP 2019), 2019, : 373 - 378
  • [30] An Approach of Privacy Preservation and Data Security in Cloud Computing for Secured Data Sharing
    Dewangan, Revati Raman
    Soni, Sunita
    Mishal, Ashish
    RECENT ADVANCES IN ELECTRICAL & ELECTRONIC ENGINEERING, 2025, 18 (02) : 176 - 195