Ijeta V7i4p7
Ijeta V7i4p7
Ijeta V7i4p7
ABSTRACT
The cloud computing and the collaborative source security system for big data security are explained in detail in this
paper. This research proposes a collaborative encryption technique framework to satisfy the needs of quicker encryption
in the future. The whole security during cloud computing cannot be provided by a standard information security solution.
The approach outlined in this study uses a distributed, parallel encryption system to reap the benefits of homomorphic
encryption. It is laborious to use the encryption feature when communicating with an object via mobile. Because of the
quantity of the huge data, the encryption and decryption process is slowed down by the security of the data. Big data
cloud computing security cannot be achieved with a single encryption method based on a single source.
Each cloud has the ability to cooperate with other cloud servers and has its own security features. As a result,
distributed and parallel encryption capabilities are available at every cloud's doorstep without interfering with the
encryption process's order. The most important resources become the distant resources, and these resources may be
allocated and managed across all clouds. The majority of the time, the network and other resources are available when
using cloud computing. It is challenging to provide information security when resources are unavailable for encryption
and decoding. With the help of the collaborative encryption approach, many clouds can operate concurrently with
dispersed processing. The homomorphic encryption enhances the security mechanism.
Keywords – Data Security, Data Encryption, BigData, Cloud Computing
I. INTRODUCTION
presented both service providers and customers with
Cloud computing has developed over the past few years numerous security challenges. How can cloud computing
from a potential commercial idea to one of the IT customers know that there are no security or availability
industry's fastest-growing divisions. Now, businesses problems with their data? Everyone asks: Is their personal
struggling with the recession are beginning to realize that data safe? In order to inform suppliers and end users alike
they can significantly increase their infrastructure about the major security risks connected to cloud
resources or quickly obtain best-of-breed business apps by computing, this study attempts to pinpoint the most
simply leveraging the cloud, all at a very low cost. susceptible security risks in the cloud. Through our effort,
However, worries about the security of the cloud are researchers and security experts will be able to critically
starting to surface as more and more data about people and analyze the many security models and technologies that
businesses is stored there. The security concerns, have been offered and learn about the issues raised by
specifications, and difficulties that cloud service providers vendors and users.
(CSP) encounter during cloud engineering are covered in Cloud computing is essential to mobile computing
this paper. For the technical and corporate communities, because it provides autonomous, ready-to-use mobile
recommended security standards and management resources—like networks, cooperating servers, virtual data
approaches are proposed to address them. storage, tools, and applications—on demand and within a
A collection of online resources and services is known shared pool1. The cloud is a framework for mobility that
as cloud computing. Globally dispersed data centers are makes various services and resources available through
used to provide cloud services. Through the internet, cloud various cloud models. The cloud computing and data
computing makes virtual resources available to its users. storage scenario is shown in Figure 1. Among the services
Google applications, which are offered by Google and offered by various clouds are:-
Microsoft SharePoint, are a general example of cloud
services. Severe security problems are also raised by the 1.1 On-demand Self Service
"cloud computing" industry's explosive expansion. The Automatic services available from the cloud to anyone
issue of security has persisted for Open Systems and the connected to the cloud.
internet; cloud computing is particularly vulnerable in this
1.2 Heterogeneous Platforms
regard. The sole obstacle to cloud computing's widespread
Network access can possible to any type of devices having
acceptance is its lack of security. Numerous security
any platform without cloud-to-cloud surfing2.
concerns, such as protecting data and monitoring cloud
usage by cloud computing providers, surround cloud 1.3 Resource Sharing
computing.
The widespread recognition Much as cloud computing Every cloud has a pool of resources that are scheduled and
has brought forth countless benefits, it has also increased accessible to connected users when they travel3. Physical
security vulnerabilities. Cloud computing's explosion has resources in the cloud behave virtually and are not
dependent on location4. These resources are accessible on of information may be stored digitally14. Even while it
all clouds without requiring the user to define their addresses the issue of the storage space needed for paper
locations, allowing them to be transferred from one to libraries, it can also offer additional advantages such
another. These resources consist of CPUs, virtual storage, making digital content easily accessible and manipulable.
and network bandwidth5.
IV. PROPOSED SOLUTION TO BIG DATA organizations, individuals, and the Big Data cloud itself
SECURITY is maintaining the confidentiality of sensitive data.
Transition: Converting unstructured data into structured
Larger data means more security challenges. A
data to ease the process of indexing, sorting, and
constraint for big data and cloud computing technologies
identifying the data's valuable information.
is weaker security. The big data platform is examined in
the section that follows. Retrieval: To obtain the valuable information from the
massive data storage, a sophisticated query framework is
4.1 Big Data Platform
necessary27. Data that is well-structured and ordered
makes searching easier and conserves cloud resources.
Not all data is helpful, and scientists are working to
Retrieval, communication, and sharing speeds decrease
extract the relevant information from the vast amount of
with user count.
data. Big Data requires an infrastructure that can move,
Views and query processing: Complicated query
store, and integrate massive amounts of data more
processing effectively handles massive amounts of data,
quickly and accurately than traditional infrastructure can.
resulting in valuable client views. The valuable data
The process involves using a sophisticated structured
from the massive amount of data is produced by
database management system to convert unstructured big
distributed query processing with colla- bration functions
data into a structured format. The necessary Big Data
from numerous servers across different clouds and their
security platform is shown in Figure 3.
storages.
Storage: To store the enormous amounts of data, large
storages are needed. Greater storage is needed as the user
base grows. Since no single point of storage retains all of
the data, parallel collab- rating storages are necessary for
large storage.
Failure/Leakage Management: In the event of a possible. A few years later, significant technological
failure, log-based recovery must be preserved. Big Data advancements cause standard encryption methods to no
leakage management benefits from the adoption of the longer meet security requirements. This work presents a
Two-Phase-Locking protocol. distributed, parallel encryption solution that lessens the
need for secure storage of sensitive data. Encrypting the
4.3 Encryption: various data components at different places and
combining them at one place is helpful.
Big Data information security is mostly dependent on
encryption. To protect the data, a number of encryption REFERENCES
methods are available, including TDES and AES.
[1] Ranjan R. Streaming big data processing in datacenter
Real-time big data encryption: For tiny local data,
clouds. Proceedings of IEEE Cloud Computing.
offline encryption works well. 2014 May; 1(1):78–6.
Nonetheless, real-time encryption is required to secure [2] Bagheri R, Jahanshahi M. Scheduling workflow
the vast amounts of online data. Only by encrypting and applications on the heterogeneous cloud resources.
recording the data's source can this be accomplished. Indian Journal of Science and Technology. 2015
The key management issues are resolved when the client Jun; 8(12):1–8. DOI:
encrypts the data and transfers it via the cloud. 10.17485/ijst/2015/v8i12/57984.
[3] Bagheri R, Jahanshahi M. Scheduling workflow
Parallel/Distributed Encryption: This technique applica- tions on the heterogeneous cloud resources.
effectively manages large amounts of data related to Indian Journal of Science and Technology. 2015
Jun; 8(12):1–8. DOI:
security in the cloud. Together, several servers in several
10.17485/ijst/2015/v8i12/57984.
clouds carry out the encryption. [4] Zhao F, Li C, Liu CF. A cloud computing security
solu- tion based on fully homomorphic encryption.
Encryption Key Management: The maintenance of the Proceedings of 16th International Conference on
encryption key is greatly aided by a reliable third party. Advanced Communication Technology (ICACT);
The key does not need to be maintained on the server if 2014 Feb. p. 485–4.
the user encrypts the data at the source. The digital [5] Jasmine RM, Nishibha GM. Public cloud secure
certificate technique is helpful if servers handle the group sharing and accessing in cloud computing.
Indian Journal of Science and Technology. 2015
encryption portion.
Jul; 8(15):1–7. DOI:
10.17485/ijst/2015/v8i15/75177.
Homomorphic Encryption: This more recent
[6] Jeuk S, Szefer J, Zhou S. Towards cloud, service
completely homomorphic encryption method supports and ten- ant classification for cloud computing.
the encrypted search by combining several encrypted Proceedings of 14th IEEE/ACM International
data segments. In multiparty encryption, homomorphic Symposium on Cluster, Cloud and Grid Computing
encryption helps to maintain the encrypted data at the (CCGrid); 2014 May. p. 792–10.
merging location 28, 29. When using homomorphic [7] Murthy PK. Top ten challenges in Big Data security
encryption, where clients from many locations encrypt and privacy. Proceedings of IEEE International Test
their own data and store it in a single cloud, Conference (ITC). 2014 Oct. p.1.
[8] Kirubakaramoorthi R, Arivazhagan D, Helen D.
collaborative encryption is useful. Without knowing the
Analysis of cloud computing technology. Indian
meaning of the ciphertext, the encrypted query can be Journal of Science and Technology. 2015 Sep;
searched on that server. 8(21):1–3. DOI: 10.17485/ijst/2015/ v8i21/79144.
[9] Pal AS, Pattnaik BP. Classification of virtualization
V. CONCLUSION envi- ronment for cloud computing. Indian Journal
of Science and Technology. 2013 Jan; 6(1):127–33.
It takes some time to put the security framework for big DOI: 10.17485/ ijst/2013/v6i1/30572.
data in cloud computing into practice. For complete [10] Xu L, Jiang C, Wang J, Yuan J, Ren Y. Information
security, the current cryptosystem is insufficiently security in big data: privacy and data mining. IEEE
Access. 2014 Oct; 2:1149–28.
useful. The encrypted data saved on cloud big data
[11] Lee JY. A study on the use of secure data in cloud
server storages cannot be searched at all if conventional storage for collaboration. Indian Journal of Science
encryption techniques are used. One amazing method and Technology. 2015 Mar; 8(S5):33–6. DOI:
that can assist the encrypted search is the fully 10.17485/ijst/2015/ v8iS5/61462.
homographic encryption technology. The cooperating [12] Rajathi A, Saravanan N. A survey on secure storage
encryption method covered in this work can be used to in cloud computing. Indian Journal of Science and
implement this. Another main topic of this article is real- Technology. 2013 Apr; 6(4):4398–401. DOI:
time encryption of data moving via cloud networks. 10.17485/ijst/2013/v6i4/31871.
Collaboration between cloud-to-cloud servers makes this