A survey on big data analytics for enhanced security on cloud

  • Authors

    • R Anandan
    • S Phani Kumar
    • K Kalaivani
    • P Swaminathan
    2018-04-20
    https://doi.org/10.14419/ijet.v7i2.21.12397
  • Big data, cloud computing, security, storage in cloud.
  • Cloud based data storage has become a common activity these days. Because cloud storage offers more advantages than normal storage methods those are dynamic access and unlimited storage capabilities for pay and use. But the security of the data outsourced to the cloud is still challenging. The data owner should be capable of performing integrity verification as well as to perform data dynamics of his data stored in the cloud server. Various approaches like cryptographic techniques, proxy based solutions, code based analysis, homomorphic approaches and challenge response algorithms have been proposed. This survey depicts the limitations of the existing approaches and the requirements for a novel and enhanced approach that ensures integrity of the data stored in cloud enabling better performance with reduced complexity.

     

     

  • References

    1. [1] Bernstein D, “Containers and Cloud: From LXC to Docker to Kubernetesâ€, IEEE Cloud Computing, Vol.1, No.3, (2014), pp.81-84.

      [2] Dua R, Raja A & Kakadia D, “Virtualization vs containerization to support paasâ€, IEEE International Conference on Cloud Engineering (IC2E), (2014), pp.610–614.

      [3] Tholeti BP, “Hypervisors, virtualization, and the cloud: Learn about hypervisors, system virtualization, and how it works in a cloud environmentâ€, IBM developerWorks, (2011).

      [4] Gholami A, Laure E, Somogyi P, Spjuth O, Salman N & Dowling J, “Privacy-preservation for publishing sample availability data with personal identifiersâ€, Journal of Medical and Bioengineering, Vol.4-2, (2014), pp.117–125.

      [5] Gholami A, Lind AS, Reiche J, Litton JE, Edlund A & Laure E, “Design and implementation of the advanced cloud privacy threat modelingâ€, International Journal of Network Security & Its Applications (IJNSA), (2016).

      [6] Pearson S, “Privacy, security and trust in cloud computing†Privacy and Security for Cloud Computing, (2013), pp.3–42.

      [7] Liu F, Tong J, Mao J, Bohn R, Messina J, Badger L & Leaf D, NIST Cloud Computing Reference Architecture: Recommendations of the National Institute of Standards and Technology (Special Publication 500-292), USA: CreateSpace Independent Publishing Platform, (2012).

      [8] Demchenko Y, Membrey P, Grosso P & de Laat C, “Addressing big data issues in scientific data infrastructureâ€, International Conference on Collaboration Technologies and Systems (CTS), (2013), pp.48-55.

      [9] Santos N, Gummadi KP & Rodrigues R, “Towards trusted cloud computingâ€, Proceedings of the Conference on Hot Topics in Cloud Computing, (2009).

      [10] Zhu S & Gong G, “Fuzzy authorization for cloud storageâ€, IEEE Transactions on Cloud Computing, Vol.2, (2014), pp.422–435.

      [11] Hamlen KW, Kagal L & Kantarcioglu M, “Policy enforcement framework for cloud data managementâ€, IEEE Data Eng. Bull., Vol.35, No.4, (2012), pp.39-45.

      [12] Fischer-Hubner S, Angulo J & Pulls T, “How can cloud users be supported in deciding on, tracking and controlling how their data are used?.â€, IFIP PrimeLife International Summer School on Privacy and Identity Management for Life, (2013), pp.77-92.

      [13] Huang Y & Goldberg I, “Outsourced private information retrievalâ€, Proceedings of the 12th ACM Workshop on Workshop on Privacy in the Electronic Society, (2013), pp.119–130.

      [14] Microsoft, “Data and insights†http://www.microsoft.com/ enterprise/it-trends/big-data/, 2015. Accessed July 2015.

      [15] Cappos J & Torres S, “PolyPasswordHasher: Protecting Passwords In The Event Of A Password File Disclosureâ€, Technical report, (2014).

      [16] Shankarwar M & Pawar A, “Security and privacy in cloud computing: A surveyâ€, Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA), (2014), pp.1–11.

      [17] Politz JG, Guha A & Krishnamurthi S, “Typed-based verification of Web sandboxesâ€, Journal of Computer Security, Vol.22, No.4, (2014), pp.511–565.

      [18] Katal A, Wazid M & Goudar RH, “Big data: Issues, challenges, tools and Good practicesâ€, Sixth International Conference on Contemporary Computing (IC3), (2013), pp.404-409.

      [19] Chitharanjan K & Kala Karun A, “A review on hadoop-HDFS infrastructure extensionsâ€, IEEE Conference on Information & Communication Technologies (ICT), (2013), pp.132-137.

      [20] Anisha PR, Kishor Kumar Reddy C, Srinivasulu Reddy K & Surender Reddy S, “Third Party Data Protection Applied To Cloud and Xacml Implementation in the Hadoop Environment With Sparqlâ€, Journal of Computer Engineering (IOSRJCE), Vol.2, No.1, (2012), pp.39-46.

  • Downloads

  • How to Cite

    Anandan, R., Phani Kumar, S., Kalaivani, K., & Swaminathan, P. (2018). A survey on big data analytics for enhanced security on cloud. International Journal of Engineering & Technology, 7(2.21), 331-334. https://doi.org/10.14419/ijet.v7i2.21.12397