2PBDC: privacy-preserving bigdata collection in cloud environment

被引:0
作者
Jangirala Srinivas
Ashok Kumar Das
Joel J. P. C. Rodrigues
机构
[1] International Institute of Information Technology,Center for Security, Theory and Algorithmic Research
[2] Hyderabad,undefined
[3] National Institute of Telecommunications (Inatel),undefined
[4] Instituto de Telecomunicações,undefined
[5] ITMO University,undefined
[6] University of Fortaleza (UNIFOR),undefined
来源
The Journal of Supercomputing | 2020年 / 76卷
关键词
Bigdata; Cloud computing; Privacy preservation; Authentication; Key agreement; Security; AVISPA simulation;
D O I
暂无
中图分类号
学科分类号
摘要
The combination of two overlapping technologies (bigdata and cloud computing) helps easy access to the evolving applications. In this context, there is a serious requirement of ensuring the transmission of data securely in order to improve the productivity over the public channel. Since the data collected by various sources are strictly private and confidential, there is also a great requirement to deal with the privacy preservation of the bigdata. To handle this issue, a new privacy-preserving bigdata collection technique in cloud computing environment, called 2PBDC, has been designed, which allows secure communication between the bigdata gateway nodes and the cloud servers. 2PBDC is shown to be secure against various known attacks against an active/passive adversary through the formal security verification as well as informal security analysis. A detailed comparative study among 2PBDC and other existing schemes has been conducted. This study shows that 2PBDC offers a better trade-off among the security and functionality features and communication and computation overheads while these are compared with other schemes.
引用
收藏
页码:4772 / 4801
页数:29
相关论文
共 87 条
[1]  
Chen X(2016)Verifiable computation over large database with incremental updates IEEE Trans Comput 65 3184-3195
[2]  
Li J(2014)Big data: a survey Mob Netw Appl 19 171-209
[3]  
Weng J(1983)On the security of public key protocols IEEE Tran Inf Theory 29 198-208
[4]  
Ma J(2014)Data-intensive applications, challenges, techniques and technologies: a survey on big data Inf Sci 275 314-347
[5]  
Lou W(2017)Big Data technologies: a survey J King Saud Univ Comput Inf Sci 56 78-85
[6]  
Chen M(2018)SecSVA: secure storage, verification, and auditing of big data in the cloud environment IEEE Commun Mag 9 805-815
[7]  
Mao S(2015)A privacy-aware authentication scheme for distributed mobile cloud computing services IEEE Syst J 68 74-88
[8]  
Liu Y(2017)Provably secure authenticated key agreement scheme for distributed mobile cloud computing services Future Gener Comput Syst 9 4650-4666
[9]  
Dolev D(2016)A more secure and privacy-aware anonymous user authentication scheme for distributed mobile cloud computing environments Secur Commun Netw 19 59-67
[10]  
Yao A(2017)An improved authentication protocol for distributed mobile cloud computing services Int J Crit Infrastruct Prot 68 320-330