Skip to main content
Erschienen in: Evolutionary Intelligence 2/2021

30.04.2020 | Special Issue

Hybrid encryption framework for securing big data storage in multi-cloud environment

verfasst von: G. Viswanath, P. Venkata Krishna

Erschienen in: Evolutionary Intelligence | Ausgabe 2/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In the present scenario, big data is facing many challenges regarding the data storage, data theft and unauthorized access. Many researchers are concentrated on developing the security mechanism for big data storage. To overcome the above issue, this paper concentrated on developing the encryption algorithm for storing big data in the multi cloud storage. The multi cloud storage environment permits the user to store the data in to different cloud storage services. This paper aims to develop the secure framework which restricts the insider attacks. The proposed framework contains data uploading, slicing, indexing, encryption, distribution, decryption, retrieval and merging process. The hybrid encryption algorithm was developed to provide the security to the big data before storing it in to the multi cloud. The Simulation analysis is carried with real time cloud storage environments. The proposed algorithm recorded around 2630 KB/S for the encryption process. The results prove the superiority of the proposed algorithm compared to the bench mark algorithms.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Hashem IAT, Yaqoob I, Anuar NB, Mokhtar S, Gani A, Khan SU (2015) The rise of “big data” on cloud computing: review and open research issues. Inf Syst 47:98–115CrossRef Hashem IAT, Yaqoob I, Anuar NB, Mokhtar S, Gani A, Khan SU (2015) The rise of “big data” on cloud computing: review and open research issues. Inf Syst 47:98–115CrossRef
3.
Zurück zum Zitat AlZain, MA., Eric P, Ben S, James AT (2012) Cloud computing security: from single to multi-clouds. In: 2012 45th Hawaii international conference on system sciences. IEEE, pp 5490–5499 AlZain, MA., Eric P, Ben S, James AT (2012) Cloud computing security: from single to multi-clouds. In: 2012 45th Hawaii international conference on system sciences. IEEE, pp 5490–5499
4.
Zurück zum Zitat Fu Z, Sun X, Liu Q, Zhou L, Shu J (2015) Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans Commun 98(1):190–200CrossRef Fu Z, Sun X, Liu Q, Zhou L, Shu J (2015) Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans Commun 98(1):190–200CrossRef
5.
Zurück zum Zitat Li R, Xu Z, Kang W, Yow KC, Xu CZ (2014) Efficient multi-keyword ranked query over encrypted data in cloud computing. Future Gener Comput Syst 30:179–190CrossRef Li R, Xu Z, Kang W, Yow KC, Xu CZ (2014) Efficient multi-keyword ranked query over encrypted data in cloud computing. Future Gener Comput Syst 30:179–190CrossRef
6.
Zurück zum Zitat Xia Z, Wang X, Sun X, Wang Q (2015) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 27(2):340–352CrossRef Xia Z, Wang X, Sun X, Wang Q (2015) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 27(2):340–352CrossRef
7.
Zurück zum Zitat Somani U, Kanika L, Manish M (2010) Implementing digital signature with RSA encryption algorithm to enhance the Data Security of cloud in Cloud Computing. In: 2010 First international conference on parallel, distributed and grid computing (PDGC 2010). IEEE, pp. 211–216 Somani U, Kanika L, Manish M (2010) Implementing digital signature with RSA encryption algorithm to enhance the Data Security of cloud in Cloud Computing. In: 2010 First international conference on parallel, distributed and grid computing (PDGC 2010). IEEE, pp. 211–216
8.
Zurück zum Zitat Li P, Li J, Huang Z, Gao C-Z, Chen W-B, Chen K (2018) Privacy-preserving outsourced classification in cloud computing. Cluster Comput 21(1):277–286CrossRef Li P, Li J, Huang Z, Gao C-Z, Chen W-B, Chen K (2018) Privacy-preserving outsourced classification in cloud computing. Cluster Comput 21(1):277–286CrossRef
9.
Zurück zum Zitat Yang K, Jia X, Ren K, Zhang Bo, Xie R (2013) DAC-MACS: effective data access control for multiauthority cloud storage systems. IEEE Trans Inf Forensics Secur 8(11):1790–1801CrossRef Yang K, Jia X, Ren K, Zhang Bo, Xie R (2013) DAC-MACS: effective data access control for multiauthority cloud storage systems. IEEE Trans Inf Forensics Secur 8(11):1790–1801CrossRef
10.
Zurück zum Zitat Li M, Shucheng Yu, Zheng Y, Ren K, Lou W (2012) Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans Parallel Distrib Syst 24(1):131–143CrossRef Li M, Shucheng Yu, Zheng Y, Ren K, Lou W (2012) Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans Parallel Distrib Syst 24(1):131–143CrossRef
11.
Zurück zum Zitat Yang J-J, Li J-Q, Niu Yu (2015) A hybrid solution for privacy preserving medical data sharing in the cloud environment. Future Gener Comput Syst 43:74–86CrossRef Yang J-J, Li J-Q, Niu Yu (2015) A hybrid solution for privacy preserving medical data sharing in the cloud environment. Future Gener Comput Syst 43:74–86CrossRef
12.
Zurück zum Zitat Akioka S, Muraoka Y (2010) HPC benchmarks on Amazon EC2, IEEE, pp 1029–1034 Akioka S, Muraoka Y (2010) HPC benchmarks on Amazon EC2, IEEE, pp 1029–1034
14.
Zurück zum Zitat Wang F, Mickens J, Zeldovich N, Vaikuntanathan V (2016) Sieve: cryptographically enforced access control for user data in untrusted clouds. NSDI 16:611–626 Wang F, Mickens J, Zeldovich N, Vaikuntanathan V (2016) Sieve: cryptographically enforced access control for user data in untrusted clouds. NSDI 16:611–626
15.
Zurück zum Zitat Singh AP, Pasupuleti SK (2016) Optimized public auditing and data dynamics for data storage security in cloud computing. Proc Comput Sci 93:751–759CrossRef Singh AP, Pasupuleti SK (2016) Optimized public auditing and data dynamics for data storage security in cloud computing. Proc Comput Sci 93:751–759CrossRef
16.
Zurück zum Zitat Matallah H, Belalem G, Bouamrane K (2017) Towards a new model of storage and access to data in big data and cloud computing. Int J Ambient Comput Intell 8(4):31–44CrossRef Matallah H, Belalem G, Bouamrane K (2017) Towards a new model of storage and access to data in big data and cloud computing. Int J Ambient Comput Intell 8(4):31–44CrossRef
17.
Zurück zum Zitat Manogaran G, Thota C, Lopez D, Sundarasekar R (2017) Big data security intelligence for healthcare industry 4.0. In: Cybersecurity for Industry 4.0. Springer, Cham, pp 103–126 Manogaran G, Thota C, Lopez D, Sundarasekar R (2017) Big data security intelligence for healthcare industry 4.0. In: Cybersecurity for Industry 4.0. Springer, Cham, pp 103–126
18.
Zurück zum Zitat Jakóbik A, Grzonka D, Palmieri F (2017) Non-deterministic security driven meta scheduler for distributed cloud organizations. Simul Model Pract Theory 76:67–81CrossRef Jakóbik A, Grzonka D, Palmieri F (2017) Non-deterministic security driven meta scheduler for distributed cloud organizations. Simul Model Pract Theory 76:67–81CrossRef
19.
Zurück zum Zitat Cai H, Boyi Xu, Jiang L, Vasilakos AV (2017) IoT-based big data storage systems in cloud computing: perspectives and challenges. IEEE Internet Things J 4(1):75–87CrossRef Cai H, Boyi Xu, Jiang L, Vasilakos AV (2017) IoT-based big data storage systems in cloud computing: perspectives and challenges. IEEE Internet Things J 4(1):75–87CrossRef
20.
Zurück zum Zitat Althamary IA, Alkharobi TM (2016) Secure file sharing in multi-cloud using shamir’s secret sharing scheme. Trans Netw Commun 4(6):53–67 Althamary IA, Alkharobi TM (2016) Secure file sharing in multi-cloud using shamir’s secret sharing scheme. Trans Netw Commun 4(6):53–67
21.
Zurück zum Zitat Jouini M, Rabai LBA (2019) A security framework for secure cloud computing environments. In: Cloud security: concepts, methodologies, tools, and applications. IGI Global, pp. 249–263 Jouini M, Rabai LBA (2019) A security framework for secure cloud computing environments. In: Cloud security: concepts, methodologies, tools, and applications. IGI Global, pp. 249–263
22.
Zurück zum Zitat Du M, Wang Q, He M, Weng J (2018) Privacy-preserving indexing and query processing for secure dynamic cloud storage. IEEE Trans Inf Forensics Secur 13(9):2320–2332CrossRef Du M, Wang Q, He M, Weng J (2018) Privacy-preserving indexing and query processing for secure dynamic cloud storage. IEEE Trans Inf Forensics Secur 13(9):2320–2332CrossRef
23.
Zurück zum Zitat Kuwakado H, Morii M (2010) Quantum distinguisher between the 3-round Feistel cipher and the random permutation. In: IEEE international symposium on information theory. IEEE, pp 2682–2685 Kuwakado H, Morii M (2010) Quantum distinguisher between the 3-round Feistel cipher and the random permutation. In: IEEE international symposium on information theory. IEEE, pp 2682–2685
24.
Zurück zum Zitat Mahajan P, Sachdeva A (2013) A study of encryption algorithms AES, DES and RSA for security. Glob J Comput Sci Technol 13(15):15–22 Mahajan P, Sachdeva A (2013) A study of encryption algorithms AES, DES and RSA for security. Glob J Comput Sci Technol 13(15):15–22
25.
Zurück zum Zitat Devi G, Kumar MP (2012) Cloud computing: a CRM service based on a separate encryption and decryption using Blowfish Algorithm. Int J Comput Trends Technol 3(4):592–596 Devi G, Kumar MP (2012) Cloud computing: a CRM service based on a separate encryption and decryption using Blowfish Algorithm. Int J Comput Trends Technol 3(4):592–596
26.
Zurück zum Zitat Lu CC, Tseng SY (2002) Integrated design of AES (Advanced Encryption Standard) encrypter and decrypter. In: Proceedings. The IEEE international conference on application-specific systems, architectures and processors. IEEE, pp 277–285 Lu CC, Tseng SY (2002) Integrated design of AES (Advanced Encryption Standard) encrypter and decrypter. In: Proceedings. The IEEE international conference on application-specific systems, architectures and processors. IEEE, pp 277–285
27.
Zurück zum Zitat Rivest RL, Robshaw MJ, Sidney R, Yin YL (1998) The RC6 block cipher. In: First advanced encryption standard (AES) conference Rivest RL, Robshaw MJ, Sidney R, Yin YL (1998) The RC6 block cipher. In: First advanced encryption standard (AES) conference
29.
Zurück zum Zitat Elminaam DS, Abdual-Kader HM, Hadhoud MM (2010) Evaluating the performance of symmetric encryption algorithms. IJ Netw Secur 10:216–222 Elminaam DS, Abdual-Kader HM, Hadhoud MM (2010) Evaluating the performance of symmetric encryption algorithms. IJ Netw Secur 10:216–222
Metadaten
Titel
Hybrid encryption framework for securing big data storage in multi-cloud environment
verfasst von
G. Viswanath
P. Venkata Krishna
Publikationsdatum
30.04.2020
Verlag
Springer Berlin Heidelberg
Erschienen in
Evolutionary Intelligence / Ausgabe 2/2021
Print ISSN: 1864-5909
Elektronische ISSN: 1864-5917
DOI
https://doi.org/10.1007/s12065-020-00404-w

Weitere Artikel der Ausgabe 2/2021

Evolutionary Intelligence 2/2021 Zur Ausgabe

Premium Partner