SecSVA: Secure Storage, Verification, and Auditing of Big Data in the Cloud Environment

被引:57
作者
Aujla, Gagangeet Singh [1 ]
Chaudhary, Rajat [1 ]
Kumar, Neeraj [2 ]
Das, Ashok Kumar [3 ]
Rodrigues, Joel J. P. C. [4 ,5 ,6 ]
机构
[1] Thapar Univ, Patiala, Punjab, India
[2] Thapar Univ, Comp Sci & Engn Dept, Patiala, Punjab, India
[3] Int Inst Informat Technol, Hyderabad, Andhra Pradesh, India
[4] Natl Inst Telecommun Inatel, Santa Rita Do Sapucai, Brazil
[5] Inst Telecommun, Lisbon, Portugal
[6] Univ Fortaleza, Fortaleza, Ceara, Brazil
关键词
AUTHENTICATION; SCHEME;
D O I
10.1109/MCOM.2018.1700379
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the widespread popularity of Internet-enabled devices, there is an exponential increase in the information sharing among different geographically located smart devices. These smart devices may be heterogeneous in nature and may use different communication protocols for information sharing among themselves. Moreover, the data shared may also change with respect to various Vs (volume, velocity, variety, and value) to categorize it as big data. However, as these devices communicate with each other using an open channel, the Internet, there is a higher chance of information leakage during communication. Most of the existing solutions reported in the literature ignore these facts. Keeping focus on these points, in this article, we propose secure storage, verification, and auditing (SecSVA) of big data in cloud environment. SecSVA includes the following modules: an attribute-based secure data deduplication framework for data storage on the cloud, Kerberos-based identity verification and authentication, and Merkle hash-tree-based trusted third-party auditing on cloud. From the analysis, it is clear that SecSVA can provide secure third party auditing with integrity preservation across multiple domains in the cloud environment.
引用
收藏
页码:78 / 85
页数:8
相关论文
共 15 条
[1]   Security in cloud computing: Opportunities and challenges [J].
Ali, Mazhar ;
Khan, Samee U. ;
Vasilakos, Athanasios V. .
INFORMATION SCIENCES, 2015, 305 :357-383
[2]   On the Design of Fine Grained Access Control With User Authentication Scheme for Telecare Medicine Information Systems [J].
Chatterjee, Santanu ;
Roy, Sandip ;
Das, Ashok Kumar ;
Chattopadhyay, Samiran ;
Kumar, Neeraj ;
Reddy, Alavalapati Goutham ;
Park, Kisung ;
Park, Youngho .
IEEE ACCESS, 2017, 5 :7012-7030
[3]   Big Data Storage in the Cloud for Smart Environment Monitoring [J].
Fazio, M. ;
Celesti, A. ;
Puliafito, A. ;
Villari, M. .
6TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT-2015), THE 5TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2015), 2015, 52 :500-506
[4]  
He D., 2011, IEEE T WIREL COMMUN, V12, P4638
[5]   Efficient Hierarchical Identity-Based Signature With Batch Verification for Automatic Dependent Surveillance-Broadcast System [J].
He, Debiao ;
Kumar, Neeraj ;
Choo, Kim-Kwang Raymond ;
Wu, Wei .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (02) :454-464
[6]   Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures [J].
He, Debiao ;
Zeadally, Sherali ;
Kumar, Neeraj ;
Wu, Wei .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (09) :2052-2064
[7]   From the Cloud to the Atmosphere: Running MapReduce across Data Centers [J].
Jayalath, Chamikara ;
Stephen, Julian ;
Eugster, Patrick .
IEEE TRANSACTIONS ON COMPUTERS, 2014, 63 (01) :74-87
[8]   Design of a provably secure biometrics-based multi-cloud-server authentication scheme [J].
Kumari, Saru ;
Li, Xiong ;
Wu, Fan ;
Das, Ashok Kumar ;
Choo, Kim-Kwang Raymond ;
Shen, Jian .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 68 :320-330
[9]   Secure Auditing and Deduplicating Data in Cloud [J].
Li, Jingwei ;
Li, Jin ;
Xie, Dongqing ;
Cai, Zhang .
IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (08) :2386-2396
[10]   MuR-DPA: Top-Down Levelled Multi-Replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud [J].
Liu, Chang ;
Ranjan, Rajiv ;
Yang, Chi ;
Zhang, Xuyun ;
Wang, Lizhe ;
Chen, Jinjun .
IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (09) :2609-2622