Security-Aware Efficient Mass Distributed Storage Approach for Cloud Systems in Big Data

被引:67
作者
Gai, Keke [1 ]
Qiu, Meikang [1 ]
Zhao, Hui [2 ]
机构
[1] Pace Univ, Dept Comp Sci, New York, NY 10038 USA
[2] Henan Univ, Software Sch, Kaifeng 475000, Henan, Peoples R China
来源
2016 IEEE 2ND INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY), IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC), AND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS) | 2016年
基金
美国国家科学基金会;
关键词
Security-aware; cybersecurity; mass distributed storage; cloud computing; big data; ENERGY MINIMIZATION;
D O I
10.1109/BigDataSecurity-HPSC-IDS.2016.68
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Implementing cloud computing empowers numerous paths to Web-based computing service offerings for meeting diverse needs. However, cloud data security and privacy information protection have also become a critical issue restraining the cloud applications. One of the major concerns in security is that cloud operators will have a chance to reach sensitive data, which dramatically increases users' anxiety and reduces the adoptability of cloud computing in many fields, such as the financial industry and governmental agencies. This paper focuses on this issues and proposes a novel approach that can efficiently split the file and separately store the data in the distributed cloud servers, in which the data cannot be directly reached by cloud service operators. The proposed scheme is entitled as Security-Aware Efficient Distributed Storage (SAEDS) model, which is mainly supported by the proposed algorithms, named Secure Efficient Data Distributions (SED2) Algorithm and Efficient Data Conflation (EDCon) Algorithm. Our experimental evaluations have assessed both security and efficiency performances.
引用
收藏
页码:140 / 145
页数:6
相关论文
共 41 条
[1]   Defense Against Primary User Emulation Attacks in Cognitive Radio Networks Using Advanced Encryption Standard [J].
Alahmadi, Ahmed ;
Abdelhakim, Mai ;
Ren, Jian ;
Li, Tongtong .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (05) :772-781
[2]  
[Anonymous], IS MICROSOFTS ONEDRI
[3]  
[Anonymous], UNLIMITED CLOUD STOR
[4]  
[Anonymous], INT J COMMUNICATION
[5]  
Ateniese G., 2006, ACM Transactions on Information and Systems Security, V9, P1, DOI 10.1145/1127345.1127346
[6]   Bigtable: A distributed storage system for structured data [J].
Chang, Fay ;
Dean, Jeffrey ;
Ghemawat, Sanjay ;
Hsieh, Wilson C. ;
Wallach, Deborah A. ;
Burrows, Mike ;
Chandra, Tushar ;
Fikes, Andrew ;
Gruber, Robert E. .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2008, 26 (02)
[7]   Adaptive Resource Allocation Optimization in Heterogeneous Mobile Cloud Systems [J].
Chen, Longbin ;
Duan, Yucong ;
Qiu, Meikang ;
Xiong, Jian ;
Gai, Keke .
2015 IEEE 2ND INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD), 2015, :19-24
[8]  
Gai K., 2013, Proceedings of the Conference for Information Systems Applied Research ISSN, V2167, P1508
[9]  
Gai K., 2014, International Journal of Computer Applications, V95, P40, DOI DOI 10.5120/16578-6268
[10]  
Gai K., 2015, Security and Communication Networks, P1, DOI DOI 10.1109/CSCLOUD.2015.73