A New Secure Model for The Use of Cloud Computing in Big Data Analytics

被引:0
作者
Chaoui, Habiba [1 ]
Makdoun, Ibtissam [1 ]
机构
[1] Ibn Tofail Univ, ENSA Kenitra, Syst Engn Lab, ADSI Team, Kenitra, Morocco
来源
PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, DATA AND CLOUD COMPUTING (ICC 2017) | 2017年
关键词
Big Data; Cloud Computing; authentication protocols; functional encryption; search over encrypted data; safe data destruction; AUTHENTICATION;
D O I
10.1145/3018896.3018913
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
When Big data and cloud computing join forces together, several domains like: healthcare, disaster prediction and decision making become easier and much more beneficial to users in term of information gathering, although cloud computing will reduce time and cost of analyzing information for big data, it may harm the confidentiality and integrity of the sensitive data, for instance, in healthcare, when analyzing disease's spreading area, the name of the infected people must remain secure, hence the obligation to adopt a secure model that protect sensitive data from malicious users. Several case studies on the integration of big data in cloud computing, urge on how easier it would be to analyze and manage big data in this complex envronement. Companies must consider outsourcing their sensitive data to the cloud to take advantage of its beneficial resources such as huge storage, fast calculation, and availability, yet cloud computing might harm the security of data stored and computed in it (confidentiality, integrity). Therefore, strict paradigm must be adopted by organization to obviate their outsourced data from being stolen, damaged or lost. In this paper, we compare between the existing models to secure big data implementation in the cloud computing. Then, we propose our own model to secure Big Data on the cloud computing environement, considering the lifecycle of data from uploading, storage, calculation to its destruction.
引用
收藏
页数:11
相关论文
共 17 条
  • [1] Aggarwal N, 2015, FRAMEWORK SECURE CLO, V4, P281
  • [2] [Anonymous], 2016, BIG DATA CONCEPTS TH
  • [3] Babaeizadeh M, RES J APPL SCI ENG T, V9, P655
  • [4] Barriers C, INFOSEC READING ROOM
  • [5] Boneh D, 2011, LECT NOTES COMPUT SC, V6597, P253, DOI 10.1007/978-3-642-19571-6_16
  • [6] Chakraborty N, 2014, FUNCTIONAL ENCRYPTIO, V107, P19
  • [7] I. B. M. Global, 2006, DM REV, P13
  • [8] Kandrouch I, 2016, P 6 JOURN NAT SEC AP, P21
  • [9] Kaur A, 2013, SECURE BROKER CLOUD, V3, P79
  • [10] Nafi KW, 2012, INT J ADV COMPUT SC, V3, P181