Communication Pattern Based Data Authentication (CPDA) Designed for Big Data Processing in a Multiple Public Cloud Environment

被引:0
作者
Sirapaisan, Soontorn [1 ]
Zhang, Ning [1 ]
He, Qian [2 ]
机构
[1] Univ Manchester, Dept Comp Sci, Manchester M13 9PL, Lancs, England
[2] Guilin Univ Elect Technol, Sch Comp Sci & Informat Secur, Guilin 541004, Peoples R China
关键词
Authentication; Big Data; Distributed databases; Containers; Cloud computing; Big data; cloud; data authentication; distributed computing; MapReduce; MAPREDUCE; FRAMEWORK; SECURITY;
D O I
10.1109/ACCESS.2020.3000989
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of cloud computing, there is a growing trend of multi-cloud Collaborative Big Data Computation (CBDC). In this environment, threats from authorized insiders are of particular concerns. Based on an extreme case of distributed computation where multiple collaborators jointly perform CBDC on shared datasets using an example distributed computing framework, MapReduce (MR), deployed in a Multiple Public Cloud (MPC) environment, this paper investigates how to protect the authenticity of data used during the computation in an efficient and scalable manner by proposing and evaluating a novel data authentication solution. The solution, called a Communication Pattern based Data Authentication (CPDA) framework, ensures data authenticity and non-repudiation of origin at the finest granularity without compromising efficiency and scalability. This is achieved by using an idea of communication pattern based authentication data aggregation. The framework has been comprehensively evaluated both theoretically and experimentally. The evaluation results show that the CPDA framework offers the strongest level of data authenticity protection (equivalent to that provided by digitally signing each data object individually) but introduces much lower overhead cost than the digital signature based solution. The results demonstrate that the idea of communication pattern based authentication data aggregation brings much benefit in terms of supporting efficient and scalable data authentication in a large-scale distributed system.
引用
收藏
页码:107716 / 107748
页数:33
相关论文
共 50 条
[31]   Cloud Computing in Remote Sensing : High Performance Remote Sensing Data Processing in a Big data Environment [J].
Sabri, Y. ;
Aouad, S. .
INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2021, 16 (06)
[32]   Algorithms for Big Data in Advanced Communication Systems and Cloud Computing [J].
Stergiou, Christos ;
Psannis, Kostas E. .
2017 IEEE 19TH CONFERENCE ON BUSINESS INFORMATICS (CBI), VOL 1, 2017, 1 :196-201
[33]   "Big" Data Management in Cloud Computing Environment [J].
Agarwal, Mohit ;
Srivastava, Gur Mauj Saran .
HARMONY SEARCH AND NATURE INSPIRED OPTIMIZATION ALGORITHMS, 2019, 741 :707-716
[34]   Cloud Based Big Data Analytics A Review [J].
Manekar, Amitkumar ;
Pradeepini, G. .
2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (CICN), 2015, :785-788
[35]   Big Data Services Security and Security Challenges in Cloud Environment [J].
Alsufyani, Raed ;
Jama, Khursand ;
Yao, Yulin ;
Ramachandran, Muthu ;
Chang, Victor .
IOTBD: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTERNET OF THINGS AND BIG DATA, 2016, :461-468
[36]   Healthcare big data processing mechanisms: The role of cloud computing [J].
Rajabion, Lila ;
Shaltooki, Abdusalam Abdulla ;
Taghikhah, Masoud ;
Ghasemi, Amirhossein ;
Badfar, Arshad .
INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2019, 49 :271-289
[37]   A MapReduce Based Distributed Framework for Similarity Search in Healthcare Big Data Environment [J].
Sarma, Hiren K. D. ;
Dwivedi, Yogesh K. ;
Rana, Nripendra P. ;
Slade, Emma L. .
OPEN AND BIG DATA MANAGEMENT AND INNOVATION, I3E 2015, 2015, 9373 :173-182
[38]   VISUAL ENVIRONMENT MONITORING SYSTEM BASED ON CLOUD COMPUTING AND BIG DATA [J].
Fang, Li ;
Zhi, Zhang .
JOURNAL OF ENVIRONMENTAL PROTECTION AND ECOLOGY, 2022, 23 (05) :2150-2157
[39]   Toward a Cloud-based security intelligence with big data processing [J].
Benzidane, Karim ;
El Alloussi, Hassan ;
El Warrak, Othman ;
Fetjah, Leila ;
Andaloussi, Said Jai ;
Sekkaki, Abderrahim .
NOMS 2016 - 2016 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, 2016, :1089-1092
[40]   Research of network data mining based on reliability source under big data environment [J].
Li, Jinhai ;
He, Youshi ;
Ma, Yunlei .
NEURAL COMPUTING & APPLICATIONS, 2017, 28 :S327-S335