Exploring New Vista of Secured and Optimized Data Slicing for Big Data: An IOT Paradigm

被引:0
作者
Manash Sarkar
Aboul Ella Hassanien
机构
[1] SRM Institute of Science and Technology,Computer Science and Engineering
[2] Cairo University,Faculty of Computers and Information
来源
Wireless Personal Communications | 2021年 / 116卷
关键词
Big data; IOT; Fast Fourier transform; Binary Reverse Clustering; Polynomial data; Data slicing;
D O I
暂无
中图分类号
学科分类号
摘要
Security and privacy are useful concerns in the context of big data. The Internet of Things (IoT) serves both to bolster and to ease security worries. IoT gadgets raise immense new security challenges, particularly with regards to things like basic framework. Be that as it may, they additionally offer approaches to help keep clients progressively secure by adding additional obstructions of safeguard to information and people. In order to sustain the integrity of data and to provide in order to implicit security for any big database, data slicing is constructive. Data slicing implicitly provides the preservation and the query performance to the database users. The sliced data are stored at servers in a distributed system to protect the data from the attackers. In this article, an intelligent and efficient model is developed to partition the polynomial data securely and to store at various servers in a distributed system. An auto-key generator spawns an encryption key to encrypt the polynomial data as a higher level security. Encrypted data is partitioned by an efficient Fast Fourier transform Technique. A novel clustering methodology entitled as Binary Reverse Clustering is introduced to optimize the performance as well as to reduce the servers’ requisition. Moreover, the novel clustering technique is compared with the traditional clustering algorithm.
引用
收藏
页码:601 / 628
页数:27
相关论文
共 105 条
  • [1] Jasimhadi H(2015)Big data and five V’s characteristics International Journal of Advances in Electronics and Computer Science 2 16-23
  • [2] Shnain AH(2016)Data security, privacy, availability and integrity in cloud computing: Issues and current solutions International Journal of Advanced Computer Science and Applications 7 485-498
  • [3] Hadishaheed S(2017)Configuring a trusted cloud service model for smart city exploration using hybrid intelligence International Journal of Ambient Computing and Intelligence IGI Global 8 1-21
  • [4] Ahmad AH(2014)Security and privacy for storage and computation in cloud computing Information Sciences 258 371-386
  • [5] Aldossary S(2017)Efficient public verification of data integrity for cloud storage systems from indistinguishability obfuscation IEEE Transactions on Information Forensics and Security 12 676-688
  • [6] Allen W(2015)Evaluating the degree of trust for a context sensitive relational database model: Through a hybrid intelligent approach International Journal of Rough Sets and Data Analysis (IJRSDA) 2 1-21
  • [7] Sarkar M(2011)Secure Distributed Subgroup Discovery in Horizontally Partitioned Data Transactions on Data pPrivacy 4 147-165
  • [8] Banerjee S(2013)Modeling by fitting a union of polynomial functions to data in an errors-in-variables context International Journal of Pattern Recognition and Artificial Intelligence 27 1350004-22
  • [9] Badr Y(2012)POLY: A new polynomial data structure for Maple ACM Communications in Computer Algebra 46 1-1044
  • [10] Sangaiah AK(2003)A polynomial algorithm for optimal univariate microaggregation IEEE Transactions on Knowledge and Data Engineering 15 1043-376