SecSVA: Secure Storage, Verification, and Auditing of Big Data in the Cloud Environment

被引:57
作者
Aujla, Gagangeet Singh [1 ]
Chaudhary, Rajat [1 ]
Kumar, Neeraj [2 ]
Das, Ashok Kumar [3 ]
Rodrigues, Joel J. P. C. [4 ,5 ,6 ]
机构
[1] Thapar Univ, Patiala, Punjab, India
[2] Thapar Univ, Comp Sci & Engn Dept, Patiala, Punjab, India
[3] Int Inst Informat Technol, Hyderabad, Andhra Pradesh, India
[4] Natl Inst Telecommun Inatel, Santa Rita Do Sapucai, Brazil
[5] Inst Telecommun, Lisbon, Portugal
[6] Univ Fortaleza, Fortaleza, Ceara, Brazil
关键词
AUTHENTICATION; SCHEME;
D O I
10.1109/MCOM.2018.1700379
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the widespread popularity of Internet-enabled devices, there is an exponential increase in the information sharing among different geographically located smart devices. These smart devices may be heterogeneous in nature and may use different communication protocols for information sharing among themselves. Moreover, the data shared may also change with respect to various Vs (volume, velocity, variety, and value) to categorize it as big data. However, as these devices communicate with each other using an open channel, the Internet, there is a higher chance of information leakage during communication. Most of the existing solutions reported in the literature ignore these facts. Keeping focus on these points, in this article, we propose secure storage, verification, and auditing (SecSVA) of big data in cloud environment. SecSVA includes the following modules: an attribute-based secure data deduplication framework for data storage on the cloud, Kerberos-based identity verification and authentication, and Merkle hash-tree-based trusted third-party auditing on cloud. From the analysis, it is clear that SecSVA can provide secure third party auditing with integrity preservation across multiple domains in the cloud environment.
引用
收藏
页码:78 / 85
页数:8
相关论文
共 15 条
  • [1] Security in cloud computing: Opportunities and challenges
    Ali, Mazhar
    Khan, Samee U.
    Vasilakos, Athanasios V.
    [J]. INFORMATION SCIENCES, 2015, 305 : 357 - 383
  • [2] On the Design of Fine Grained Access Control With User Authentication Scheme for Telecare Medicine Information Systems
    Chatterjee, Santanu
    Roy, Sandip
    Das, Ashok Kumar
    Chattopadhyay, Samiran
    Kumar, Neeraj
    Reddy, Alavalapati Goutham
    Park, Kisung
    Park, Youngho
    [J]. IEEE ACCESS, 2017, 5 : 7012 - 7030
  • [3] Big Data Storage in the Cloud for Smart Environment Monitoring
    Fazio, M.
    Celesti, A.
    Puliafito, A.
    Villari, M.
    [J]. 6TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT-2015), THE 5TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2015), 2015, 52 : 500 - 506
  • [4] He D., 2011, IEEE T WIREL COMMUN, V12, P4638
  • [5] Efficient Hierarchical Identity-Based Signature With Batch Verification for Automatic Dependent Surveillance-Broadcast System
    He, Debiao
    Kumar, Neeraj
    Choo, Kim-Kwang Raymond
    Wu, Wei
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (02) : 454 - 464
  • [6] Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures
    He, Debiao
    Zeadally, Sherali
    Kumar, Neeraj
    Wu, Wei
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (09) : 2052 - 2064
  • [7] From the Cloud to the Atmosphere: Running MapReduce across Data Centers
    Jayalath, Chamikara
    Stephen, Julian
    Eugster, Patrick
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2014, 63 (01) : 74 - 87
  • [8] Design of a provably secure biometrics-based multi-cloud-server authentication scheme
    Kumari, Saru
    Li, Xiong
    Wu, Fan
    Das, Ashok Kumar
    Choo, Kim-Kwang Raymond
    Shen, Jian
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 68 : 320 - 330
  • [9] Secure Auditing and Deduplicating Data in Cloud
    Li, Jingwei
    Li, Jin
    Xie, Dongqing
    Cai, Zhang
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (08) : 2386 - 2396
  • [10] MuR-DPA: Top-Down Levelled Multi-Replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud
    Liu, Chang
    Ranjan, Rajiv
    Yang, Chi
    Zhang, Xuyun
    Wang, Lizhe
    Chen, Jinjun
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (09) : 2609 - 2622