Cluster Based Multi Layer User Authentication Data Center Storage Architecture for Big Data Security in Cloud Computing

被引:5
作者
Ramasamy, S. [1 ]
Gnanamurthy, R. K. [2 ]
机构
[1] Vivekanandha Coll Technol Women, Dept CSE, Elaiyampalayam, India
[2] Dhanalakshmi Srinivasan Coll Engn, Dept ECE, Pichanur, India
来源
JOURNAL OF INTERNET TECHNOLOGY | 2020年 / 21卷 / 01期
关键词
Cloud computing; Security; Big data; Cluster; Multilayer;
D O I
10.3966/160792642020012101015
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In distributed computing, cloud is a fast emergent technique in data analytic technology era which is applied to stock up and retrieves the big data in distributed environment. Every day an individual person and companies are placing more data in the cloud. The organization authorities and individual users are started to worry about how the big data are safe in cloud. Information protection is one of the foremost troubles, which reduce the development of cloud computing and make difficult by means of data confidentiality and security. Day by day researchers has been introducing new techniques for secure big data in cloud computing environment. In conventional security systems are used encryption and decryption for providing security in cloud data. In our proposed work we use multilayer user authentication mechanism for big data security. First, we deal about the safety measures and challenges in cloud computing. Second, we propose cluster based multi layer user authentication data centre storage design for defending big data in cloud computing atmosphere. Multilayer authentication provides information security in three layers with different defence factors. Service providers categorize the data units in to three different clusters based on the usage of data. Proposed systems ensure the big data security through authentication in cloud and get extra engineering insights.
引用
收藏
页码:159 / 171
页数:13
相关论文
共 29 条
  • [1] AHMAD S., 2013, IJSER, V4, P2166
  • [2] Ahmed M., 2014, INT J NETWORK SECURI, V6, P25, DOI DOI 10.5121/IJNSA.2014.6103
  • [3] [Anonymous], 2016, INT J SOFTWARE ENG I
  • [4] [Anonymous], INT J ADV RES COMPUT
  • [5] Ashraf U., 2013, THESIS
  • [6] Big Data Analytics for Security
    Cardenas, Alvaro A.
    Manadhata, Pratyusa K.
    Rajan, Sreeranga P.
    [J]. IEEE SECURITY & PRIVACY, 2013, 11 (06) : 74 - 76
  • [7] A privacy preserving authorisation system for the cloud
    Chadwick, David W.
    Fatema, Kaniz
    [J]. JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2012, 78 (05) : 1359 - 1373
  • [8] An efficient and practical solution to remote authentication: Smart card
    Chien, HY
    Jan, JK
    Tseng, YM
    [J]. COMPUTERS & SECURITY, 2002, 21 (04) : 372 - 375
  • [9] A dynamic ID-based remote user authentication scheme
    Das, ML
    Saxena, A
    Gulati, VP
    [J]. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (02) : 629 - 631
  • [10] Dean J, 2004, USENIX ASSOCIATION PROCEEDINGS OF THE SIXTH SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION (OSDE '04), P137