Open Access Open Access  Restricted Access Subscription or Fee Access

Preserving Big Data Integrity in Cloud with an Efficient Manner

M. BalaAnand, S. Murugan, S. Sangeeta

Abstract


A man’s dream is process Big Data in cloud. But, nowadays this is achieved by using a new technology called cloud computing. Security is the major concern in Big Data. In cloud storage for Big Data are easily modified by the attackers. To overcome this data modification problem in cloud storage for Big Data, in this paper a novel Proxy Re-signature technique called Homomorphic Authenticable Proxy Iterative-signature is used for enhancing data security by using public key verifier. Public key Verifier will verify the integrity of shared data without accessing the entire big data from the cloud storage and also digital signature is attached to each block of message. With this digital signature, individual users can access the big data in the cloud storage. Whenever the attacker modifies the block of data in the cloud then signature is provided to user for modifying the particular block alone, these avoids the modification of data


Keywords


Big Data, Digital Signature, Homomorphic Authenticable Proxy Re-Signature, Group Manager, Public Key Verifier.

Full Text:

PDF

References


S.M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski,,G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia“,A View of Cloud Computing,” Communications of the ACM, vol. 53,no. 4, pp. 50–58, Apirl 2010.

Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, “Enabling Public Verifiability and Data Dynamic for Storage Security in Cloud Computing,” in the Proceedings of ESORICS 2009. Springer-Verlag, 2009, pp. 355–370.

G. Ateniese and S. Hohen berger, “Proxy Re-signatures: New Definitions, Algorithms and Applications”, in the Proceedings of ACM CCS 2005, 2005, pp. 310–319.

B. Wang, B. Li, and H. Li, “Public Auditing for Shared Data with Efficient User Revocation in theCloud,” in the Proceedings of IEEE INFOCOM 2013,pp. 2904–2912

B. Wang, S. S. Chow, M. Li, and H. Li, “Storing Shared Data on the Cloud via Security-Mediator”, in Proceedings of IEEE ICDCS 2013.

R.C.Wong, J.Y.Li, A.W. Fu, “(a, k)-Anonymity: An Enhanced k- Anonymity Model for Privacy-Preserving Data Publishing”, In Proceedings of the 12th ACM SIGKDD, International Conference on Knowledge Discovery and Data Mining, pp.754-759, 2006.

Yao, C. Andrew, “How to Generate and Exchange Secrets”, In Proceedings of the 27th IEEE Symposium on Foundations of Computer Science, pp.162-167, 1986.

Pascal Paillier, “Public-key cryptosystems based on composite degree residuosity classes”, In 18th Annual Eurocrypt Conference (EUROCRYPT'99), Prague, Czech Republic , volume 1592, 1999

R. Vidya Banu, N .Nagaveni, “Evaluation of a perturbation-based Technique for privacy preservation in a multiparty clustering scenario”, Information Sciences 232 (2013) 437–448.

Weijia Yang, Sanzheng Qiao, “A novel anonymization algorithm: Privacy protection and knowledge preservation”, Expert Systems with Applications 37 (2010) 756–766.

MahaTEBAA, Saïd EL HAJJI, Abdellatif GHAZI,”Homomorphic Encryption Applied to the Cloud Computing Security”, Proceedings of the World Congress on Engineering 2012 Vol I,WCE 2012, July 4 - 6, 2012, London, U.K.

MahaTEBAA, Saïd EL HAJJI, Abdellatif GHAZI,”Homomorphic Encryption Applied to the Cloud Computing Security”, Proceedings of the World Congress on Engineering 2012 Vol I,WCE 2012, July 4 - 6, 2012, London, U.K.

Jaume Ferrarons, Mulu Adhana, Carlos Colmenares, Sandra Pietrowska, Fadila Bentayeb, and J´erˆome Darmont “PRIMEBALL: A Parallel Processing Framework Benchmark for Big Data Applications in the Cloud”, Springer International Publishing Switzerland 2014.

Hidayet Aksu Mustafa Canim, Yuan-Chi Chang Ibrahim Korpeoglu, Özgür Ulusoy, “Multi-resolution Social Network Community Identification and Maintenance on Big Data Platform”, 2013 IEEE International Congress on Big Data.

Sabine Brunswicker, Elisa Bertino, Sorin Matei, “Big Data for Open Digital Innovation – A Research Roadmap”, Big Data Research (2015)

Gang Chen, Sai Wu, Yuan Wang, “The Evolvement of Big Data Systems: From the Perspective of an Information Security Application”, Big Data Research (2015)


Refbacks

  • There are currently no refbacks.