Layers Based Optimal Privacy Preservation of the On-premise Data Supported by the Dual Authentication and Lightweight on Fly Encryption in Cloud Ecosystem

被引:2
作者
Hemanth Kumar, N. P. [1 ]
Prabhudeva, S. [2 ]
机构
[1] Alvas Inst Engn & Technol, Dept Comp Sci & Engn, Mijar, Moodbidri, India
[2] Jawaharlal Nehru Natl Coll Engn, Dept ISE, Shivamogga, India
关键词
Big Data; Privacy; Cloud; BIG DATA;
D O I
10.1007/s11277-021-08681-z
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The Big Data stored in the cloud-based clusters of nodes requires an efficient mechanism to protect its privacy information. The traditional anonymization approach for privacy preservation is not applicable for Big Data due to overheads induced as the data storage mechanism follows a distributed file system in the cloud eco-store. This paper presents a dual-layer security model that mitigates the attackers' effect on access to private information. The model architecture consists of a strong authentication mechanism where the key generation to get the access control adopts a high random and customization policy so that at first hand the intruder's probability of entering into the cloud system is nullified and effectively handles the anonymity attack, in the second part of the security model the privacy information part of the data is encrypted with a very lightweight encryption method, and it gets synchronized with the data-deduplication template of the data nodes in the cloud so that the proposed model provides higher security of the privacy information in less time complexities of the cryptographic algorithm which makes the models more reliable as well as flexible to adopt it in the real-time scenario. The behavioral analysis of the proposed Auth-PP for the file-token generation system becomes stable with the incremental file size and exhibits a consistency measure (Ct) = 0.56, which is a mean orient pattern that shows strong stability against the file size so quite adaptable for the big data. The computational performance analysis for cost assessment of encryption and decryption process shows 72% performance improvement for running time for variable file sizes and also exhibits the superior outcome of overall 69.9% for file chunking into the data node on the respective cloud. For the decryption process also, it is observed that the formulated approach attains superior performance in terms of time complexity.
引用
收藏
页码:1489 / 1508
页数:20
相关论文
共 25 条
  • [1] A Novel Strong Password Generator for Improving Cloud Authentication
    Abdellaoui, Abderrahim
    Khamlichi, Younes Idrissi
    Chaoui, Habiba
    [J]. INTERNATIONAL CONFERENCE ON COMPUTATIONAL MODELLING AND SECURITY (CMS 2016), 2016, 85 : 293 - 300
  • [2] Single password authentication
    Acar, Tolga
    Belenkiy, Mira
    Kupcu, Alptekin
    [J]. COMPUTER NETWORKS, 2013, 57 (13) : 2597 - 2614
  • [3] Feasibility of Implementing Multi-factor Authentication Schemes in Mobile Cloud Computing
    Alizadeh, Mojtaba
    Hassan, Wan Haslina
    Khodadadi, Touraj
    [J]. PROCEEDINGS FIFTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS, MODELLING AND SIMULATION, 2014, : 615 - 618
  • [4] Andrew J, 2019, INT CONF ADVAN COMPU, P722, DOI [10.1109/ICACCS.2019.8728384, 10.1109/icaccs.2019.8728384]
  • [5] Dey S., 2014, NDSS, P1, DOI [DOI 10.1109/PCCC.2014.7017041, DOI 10.14722/NDSS.2014.23059]
  • [6] Dilmaghani S, 2019, IEEE INT CONF BIG DA, P5737, DOI 10.1109/BigData47090.2019.9006283
  • [7] Dinesha H.A., 2012, INT C COMP COMM APPL
  • [8] Mitigating Bias in Big Data for Transportation
    Greg P. Griffin
    Megan Mulhall
    Chris Simek
    William W. Riggs
    [J]. Journal of Big Data Analytics in Transportation, 2020, 2 (1): : 49 - 59
  • [9] Enhanced Secured Map Reduce layer for Big Data privacy and security
    Jain, Priyank
    Gyanchandani, Manasi
    Khare, Nilay
    [J]. JOURNAL OF BIG DATA, 2019, 6 (01)
  • [10] Li T., 2019, J SUPERCOMPUT, P1