Ijeta V7i4p7

Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

International Journal of Computer Science Trends and Technology (IJCST) – Volume 7 Issue 4, Jul-Aug 2020

RESEARCH ARTICLE OPEN ACCESS

BigData Security and Data Encryption in Cloud Computing


Naseemuddin Mohammad
IT Project Manager, Software Engineering Wipro Limited Hyderabad, India
Karuturi S R V Satish
Research Scholar, Computer Science and Engineering Mewar University Rajasthan, India

ABSTRACT
The cloud computing and the collaborative source security system for big data security are explained in detail in this
paper. This research proposes a collaborative encryption technique framework to satisfy the needs of quicker encryption
in the future. The whole security during cloud computing cannot be provided by a standard information security solution.
The approach outlined in this study uses a distributed, parallel encryption system to reap the benefits of homomorphic
encryption. It is laborious to use the encryption feature when communicating with an object via mobile. Because of the
quantity of the huge data, the encryption and decryption process is slowed down by the security of the data. Big data
cloud computing security cannot be achieved with a single encryption method based on a single source.
Each cloud has the ability to cooperate with other cloud servers and has its own security features. As a result,
distributed and parallel encryption capabilities are available at every cloud's doorstep without interfering with the
encryption process's order. The most important resources become the distant resources, and these resources may be
allocated and managed across all clouds. The majority of the time, the network and other resources are available when
using cloud computing. It is challenging to provide information security when resources are unavailable for encryption
and decoding. With the help of the collaborative encryption approach, many clouds can operate concurrently with
dispersed processing. The homomorphic encryption enhances the security mechanism.
Keywords – Data Security, Data Encryption, BigData, Cloud Computing

I. INTRODUCTION
presented both service providers and customers with
Cloud computing has developed over the past few years numerous security challenges. How can cloud computing
from a potential commercial idea to one of the IT customers know that there are no security or availability
industry's fastest-growing divisions. Now, businesses problems with their data? Everyone asks: Is their personal
struggling with the recession are beginning to realize that data safe? In order to inform suppliers and end users alike
they can significantly increase their infrastructure about the major security risks connected to cloud
resources or quickly obtain best-of-breed business apps by computing, this study attempts to pinpoint the most
simply leveraging the cloud, all at a very low cost. susceptible security risks in the cloud. Through our effort,
However, worries about the security of the cloud are researchers and security experts will be able to critically
starting to surface as more and more data about people and analyze the many security models and technologies that
businesses is stored there. The security concerns, have been offered and learn about the issues raised by
specifications, and difficulties that cloud service providers vendors and users.
(CSP) encounter during cloud engineering are covered in Cloud computing is essential to mobile computing
this paper. For the technical and corporate communities, because it provides autonomous, ready-to-use mobile
recommended security standards and management resources—like networks, cooperating servers, virtual data
approaches are proposed to address them. storage, tools, and applications—on demand and within a
A collection of online resources and services is known shared pool1. The cloud is a framework for mobility that
as cloud computing. Globally dispersed data centers are makes various services and resources available through
used to provide cloud services. Through the internet, cloud various cloud models. The cloud computing and data
computing makes virtual resources available to its users. storage scenario is shown in Figure 1. Among the services
Google applications, which are offered by Google and offered by various clouds are:-
Microsoft SharePoint, are a general example of cloud
services. Severe security problems are also raised by the 1.1 On-demand Self Service
"cloud computing" industry's explosive expansion. The Automatic services available from the cloud to anyone
issue of security has persisted for Open Systems and the connected to the cloud.
internet; cloud computing is particularly vulnerable in this
1.2 Heterogeneous Platforms
regard. The sole obstacle to cloud computing's widespread
Network access can possible to any type of devices having
acceptance is its lack of security. Numerous security
any platform without cloud-to-cloud surfing2.
concerns, such as protecting data and monitoring cloud
usage by cloud computing providers, surround cloud 1.3 Resource Sharing
computing.
The widespread recognition Much as cloud computing Every cloud has a pool of resources that are scheduled and
has brought forth countless benefits, it has also increased accessible to connected users when they travel3. Physical
security vulnerabilities. Cloud computing's explosion has resources in the cloud behave virtually and are not

ISSN: 2393-9516 www.ijetajournal.org Page 35


International Journal of Computer Science Trends and Technology (IJCST) – Volume 7 Issue 4, Jul-Aug 2020

dependent on location4. These resources are accessible on of information may be stored digitally14. Even while it
all clouds without requiring the user to define their addresses the issue of the storage space needed for paper
locations, allowing them to be transferred from one to libraries, it can also offer additional advantages such
another. These resources consist of CPUs, virtual storage, making digital content easily accessible and manipulable.
and network bandwidth5.

1.4 Cloud Collaboration


To offer the linked users uninterrupted services, many
clouds are cooperating. Moving from one place to another
has no effect on the device's mobile computing.7-8. The
cloud services are interoperable and accessible to users
who are switching between clouds. Different types of
clouds are available to the users such as

➢ Private Cloud: This enterprise cloud provides on-


demand internal access to resources and services for
users within the designated campus area.
Community cloud: This is a backbone network of
clouds with restricted private policies that are shared Fig.1. Automatic Cloud Collaboration
by several enterprises.
2.1 Big Data Security Challenge
➢ Public Cloud: All of the resources and functionalities
provided to a connected user are publicly accessible Big data is a vast collection of digital information that is
through the public cloud. There are instances where a kept on several servers and is accessible via the cloud15.
public organization owns it, and customers have Smaller data can be encrypted and decrypted more readily
specifically requested cloud services. during storage and transport. Larger data sets are more
susceptible to security issues, hardware overload, resource
➢ Hybrid cloud: Multiple cloud types cooperate to offer management and operating system issues, data collecting,
services to users who are traveling from one place to tasks associated with data analysis and processing,
another without requiring them to switch between indexing, cataloging, searching, data mining, and
clouds. dissemination16. While data in text format is sometimes
easier to handle, its enormous size makes it more difficult
II. BIG DATA to keep and manage in the case of audio, image, and video
Big data is a new technology that is becoming even more data. Even with supercomputers or cluster machines,
significant than cloud computing in comparison. The processing data that has been collected by any
fields of data storage and virtual smart computing are organization in the few terabytes or petabytes size is more
revolutionized by cloud computing. difficult on a single machine17–19. Following Figure 2,
which shows the massive data storage and necessary
Big data is a vast collection of information that may be cloud resources, is the security scenario.
stored in several places and is made up of several data
types with distinct data structures9. A vast amount of
storage space is needed because of the daily collection
and dissemination of information from faraway regions. It
can be challenging to organize, store, analyze, and
retrieve the data because of its unusual monolithic
structure10–12.The world is currently transitioning to a
digital age. All paper documents with bar codes will be
converted to digital format.

Traditional paper book libraries are replaced by digital


libraries. It is simpler and easier to store huge amounts of
material digitally in a paperless format as opposed to hard
copy, such what is kept in paper libraries13. However, a
significant number of digital manipulating resources are
Fig.2. Cloud Data Security Mechanism
needed due to the ease with which the enormous amount

ISSN: 2393-9516 www.ijetajournal.org Page 36


International Journal of Computer Science Trends and Technology (IJCST) – Volume 7 Issue 4, Jul-Aug 2020

2.1.1 Encrypted Storage III. EXISTING BIG DATA SECURITY


All individuals or organizations attempting to store FRAMEWORK
sensitive data on cloud storage. The cloud gathers vast The following are the BigData security challenges.
amounts of data from a variety of sources, whether it be
plain, private information or secure, encrypted data20. 3.1 Secure Parallel and Distributed Processing
To encrypt the data, either the client computer or the
cloud server can be used, or both can be used. It The client's large data set is split up into equal-sized
becomes more difficult for a single cloud server to portions for distributed, parallel processing. The security
encrypt and store bigger data21. at each computer must be maintained at a separate level
while the data is split up for encryption and then collected
again24–26.
2.1.2 Encrypted Workload
The quantity of data handled throughout the encryption 3.2 Secured Data Storage and Retrieval
process is known as the workload. The amount of labor However, as data storage grows exponentially across
required for encryption increases with the size of the clouds, keeping massive amounts of data becomes
entering data. The encryption process can be managed increasingly difficult in terms of scalability and
by the client or server. In the event that the client availability.
executes the encryption and frees up the server, the
transfer of massive encrypted data22 would negatively 3.3 Source Input Validation
impact network traffic. It is preferable to encrypt data at
the source, or the client computer, for various security Numerous sources contribute large amounts of data to
reasons23. It can fix issues with key maintenance, the storage. How can the data coming from the reliable
transfer, encryption, and decryption. source be guaranteed? Controlling the data storage from
the legitimate data sources is a significant difficulty in
this case, because input validation is required.
2.1.3 Decryption
The client computer can handle the decryption portion if 3.4 Active Monitoring
the cloud server stores the encrypted data that the clients
have sent. Transferring the encrypted data to the client One of the biggest challenges is real-time, active security
computer is the only task. monitoring using large data. The volume of data is
increasing, necessitating the use of multiple cloud
servers to monitor the data flow in real time for storage
2.1.4 Encrypted Storage
purposes.
Larger data sets require more processing power and
network bandwidth for indexing, sorting, and searching, 3.5 Privacy Preserving
which makes retrieval time-consuming.
The more the data, the more cloud servers it needs to be
stored on. One important factor in privacy leaks is the
2.1.5 Failure and Recovery
possibility of the transaction log being stored on the
When working with transactions, the Database same servers. Restricting the private storage and retrieval
Management System (DBMS) makes use of the ACID of confidential data via large data cloud storage systems
qualities, such as Atomicity, Consistency, Isolation, and is a serious problem. The privacy is leaked by real-time
Durability. It guarantees the successful completion of the activity.
transaction processing. The log-based recovery solution is
available in case of failure.
3.6 Secure Communication
The application of ACID principles in conjunction with Data stored by the client in the cloud must be encrypted
the log-based idea can facilitate recovery in big data cloud and securely stored before being sent via an unsecure
computing. This study looks into the security problems communication channel.
that big data and cloud computing are now facing and
suggests a framework to improve security. The core of big
data security can be effectively managed by a 3.7 Access Control
collaborative encryption system, wherein the entities To ensure the security of the data, access to any other
involved in the security process can be cloud servers reliable sources cannot be blocked. Malicious users are
cooperating with client security mechanisms. Instead of prevented from accessing the original source by
being handled by a single framework. recognizing its authentication. By preserving the
metadata of the user and their access, this can be made
possible.

ISSN: 2393-9516 www.ijetajournal.org Page 37


International Journal of Computer Science Trends and Technology (IJCST) – Volume 7 Issue 4, Jul-Aug 2020

IV. PROPOSED SOLUTION TO BIG DATA organizations, individuals, and the Big Data cloud itself
SECURITY is maintaining the confidentiality of sensitive data.
Transition: Converting unstructured data into structured
Larger data means more security challenges. A
data to ease the process of indexing, sorting, and
constraint for big data and cloud computing technologies
identifying the data's valuable information.
is weaker security. The big data platform is examined in
the section that follows. Retrieval: To obtain the valuable information from the
massive data storage, a sophisticated query framework is
4.1 Big Data Platform
necessary27. Data that is well-structured and ordered
makes searching easier and conserves cloud resources.
Not all data is helpful, and scientists are working to
Retrieval, communication, and sharing speeds decrease
extract the relevant information from the vast amount of
with user count.
data. Big Data requires an infrastructure that can move,
Views and query processing: Complicated query
store, and integrate massive amounts of data more
processing effectively handles massive amounts of data,
quickly and accurately than traditional infrastructure can.
resulting in valuable client views. The valuable data
The process involves using a sophisticated structured
from the massive amount of data is produced by
database management system to convert unstructured big
distributed query processing with colla- bration functions
data into a structured format. The necessary Big Data
from numerous servers across different clouds and their
security platform is shown in Figure 3.
storages.
Storage: To store the enormous amounts of data, large
storages are needed. Greater storage is needed as the user
base grows. Since no single point of storage retains all of
the data, parallel collab- rating storages are necessary for
large storage.

Communication and Distribution: A considerable


amount of data must be distributed quickly and nimbly
between servers and from client to Big Data cloud
storage.
Structuring unstructured data: More hardware,
processing, and networking resources are needed to
convert the unstructured incoming data into a structured
format.

Unstructured data take up needless storage space


whereas structured data is valuable.
Metadata management: As the data is bigger, the
Fig.3. Big Data security platform.
metadata also becomes bigger. The unstructured data
cannot yield the right metadata. To search the useful data Security:
across the metadata, the data required be structured.
User/Administrator Authentication: By keeping the
Management of metadata: When data grows, so does metadata for them, registered users, guests, and
the metadata. The proper metadata cannot be extracted administrators must authenticate themselves. For every
from the unstructured material. The data must be cloud big data, a software or hardware-based front end
formatted in order to search through the metadata and processor controls the security.
find relevant information. Secure Front End Processors for Encrypted Search:
One of the most important components of a Big Data
4.2 Big Data Processing
security solution is encrypted search. Front-end
Processing such large amounts of data is more processors, whether hardware or software-based, are
expensive. Processing greater data requires more crucial to preserving cloud and big data security.
expensive networking, software, hardware, and storage. Type-dependent security: Various data types call for
Sharing: It takes time to share data from client to server, various security measures. Popular cryptographic
server to server, and cloud to cloud. The exchange of techniques like AES are used to secure text data. While
data poses a security risk. A primary objective for all several steganographic techniques are used to ensure the
security of the audio, pictures, and video.

ISSN: 2393-9516 www.ijetajournal.org Page 38


International Journal of Computer Science Trends and Technology (IJCST) – Volume 7 Issue 4, Jul-Aug 2020

Failure/Leakage Management: In the event of a possible. A few years later, significant technological
failure, log-based recovery must be preserved. Big Data advancements cause standard encryption methods to no
leakage management benefits from the adoption of the longer meet security requirements. This work presents a
Two-Phase-Locking protocol. distributed, parallel encryption solution that lessens the
need for secure storage of sensitive data. Encrypting the
4.3 Encryption: various data components at different places and
combining them at one place is helpful.
Big Data information security is mostly dependent on
encryption. To protect the data, a number of encryption REFERENCES
methods are available, including TDES and AES.
[1] Ranjan R. Streaming big data processing in datacenter
Real-time big data encryption: For tiny local data,
clouds. Proceedings of IEEE Cloud Computing.
offline encryption works well. 2014 May; 1(1):78–6.
Nonetheless, real-time encryption is required to secure [2] Bagheri R, Jahanshahi M. Scheduling workflow
the vast amounts of online data. Only by encrypting and applications on the heterogeneous cloud resources.
recording the data's source can this be accomplished. Indian Journal of Science and Technology. 2015
The key management issues are resolved when the client Jun; 8(12):1–8. DOI:
encrypts the data and transfers it via the cloud. 10.17485/ijst/2015/v8i12/57984.
[3] Bagheri R, Jahanshahi M. Scheduling workflow
Parallel/Distributed Encryption: This technique applica- tions on the heterogeneous cloud resources.
effectively manages large amounts of data related to Indian Journal of Science and Technology. 2015
Jun; 8(12):1–8. DOI:
security in the cloud. Together, several servers in several
10.17485/ijst/2015/v8i12/57984.
clouds carry out the encryption. [4] Zhao F, Li C, Liu CF. A cloud computing security
solu- tion based on fully homomorphic encryption.
Encryption Key Management: The maintenance of the Proceedings of 16th International Conference on
encryption key is greatly aided by a reliable third party. Advanced Communication Technology (ICACT);
The key does not need to be maintained on the server if 2014 Feb. p. 485–4.
the user encrypts the data at the source. The digital [5] Jasmine RM, Nishibha GM. Public cloud secure
certificate technique is helpful if servers handle the group sharing and accessing in cloud computing.
Indian Journal of Science and Technology. 2015
encryption portion.
Jul; 8(15):1–7. DOI:
10.17485/ijst/2015/v8i15/75177.
Homomorphic Encryption: This more recent
[6] Jeuk S, Szefer J, Zhou S. Towards cloud, service
completely homomorphic encryption method supports and ten- ant classification for cloud computing.
the encrypted search by combining several encrypted Proceedings of 14th IEEE/ACM International
data segments. In multiparty encryption, homomorphic Symposium on Cluster, Cloud and Grid Computing
encryption helps to maintain the encrypted data at the (CCGrid); 2014 May. p. 792–10.
merging location 28, 29. When using homomorphic [7] Murthy PK. Top ten challenges in Big Data security
encryption, where clients from many locations encrypt and privacy. Proceedings of IEEE International Test
their own data and store it in a single cloud, Conference (ITC). 2014 Oct. p.1.
[8] Kirubakaramoorthi R, Arivazhagan D, Helen D.
collaborative encryption is useful. Without knowing the
Analysis of cloud computing technology. Indian
meaning of the ciphertext, the encrypted query can be Journal of Science and Technology. 2015 Sep;
searched on that server. 8(21):1–3. DOI: 10.17485/ijst/2015/ v8i21/79144.
[9] Pal AS, Pattnaik BP. Classification of virtualization
V. CONCLUSION envi- ronment for cloud computing. Indian Journal
of Science and Technology. 2013 Jan; 6(1):127–33.
It takes some time to put the security framework for big DOI: 10.17485/ ijst/2013/v6i1/30572.
data in cloud computing into practice. For complete [10] Xu L, Jiang C, Wang J, Yuan J, Ren Y. Information
security, the current cryptosystem is insufficiently security in big data: privacy and data mining. IEEE
Access. 2014 Oct; 2:1149–28.
useful. The encrypted data saved on cloud big data
[11] Lee JY. A study on the use of secure data in cloud
server storages cannot be searched at all if conventional storage for collaboration. Indian Journal of Science
encryption techniques are used. One amazing method and Technology. 2015 Mar; 8(S5):33–6. DOI:
that can assist the encrypted search is the fully 10.17485/ijst/2015/ v8iS5/61462.
homographic encryption technology. The cooperating [12] Rajathi A, Saravanan N. A survey on secure storage
encryption method covered in this work can be used to in cloud computing. Indian Journal of Science and
implement this. Another main topic of this article is real- Technology. 2013 Apr; 6(4):4398–401. DOI:
time encryption of data moving via cloud networks. 10.17485/ijst/2013/v6i4/31871.
Collaboration between cloud-to-cloud servers makes this

ISSN: 2393-9516 www.ijetajournal.org Page 39


International Journal of Computer Science Trends and Technology (IJCST) – Volume 7 Issue 4, Jul-Aug 2020

[13] K. Ramesh et al., "Intrusion Determent using


Dempster-Shafer Theory in MANET
Routing", (IJCSIT) International Journal of
Computer Science and Information Technologies,
vol. 6, no. 1, pp. 37-41, 2015.
[14] Ahmed ST, Loguinov D. On the performance of
mapreduce: a stochastic approach. Proceedings of
IEEE International Conference on Big Data (Big
Data); 2014 Oct. p. 49–54.
[15] M Swamy Das et al., "REVIEW OF CLOUD
COMPUTING AND DATA
SECURITY", (IJAEMA) The International journal
of analytical and experimental modal analysis, vol.
10, no. 3, pp. 123-130, 2018.
[16] Matturdi B, Xianwei Z, Shuai L, Fuhong L. Big
data secu- rity and privacy: a review. China
Communications. 2014 Supplement; 11(14):135–
11.
[17] Kalpana V, Meena V. Study on data storage
correctness methods in mobile cloud computing.
Indian Journal of Science and Technology. 2015
Mar; 8(6):495–500. DOI:
10.17485/ijst/2015/v8i6/70094.
[18] Marchal S, Jiang X, State R, Engel T. A big data
architecture for large scale security monitoring.
Proceedings of IEEE International Con-gress on
Big Data (BigData Congress); 2014 Jun 27–Jul 2. p.
56–8.
[19] Dong X, Li R, He H, Zhou W, Xue Z, Wu H.
Secure sensitive data sharing on a big data platform.
Tsinghua Science and Technology. 2015 Feb;
20(1):72–9.
[20] Bosch C, Peter A, Leenders B, Lim HW, Tang Q,
Wang H, Hartel P, Jonker W. Distributed
searchable symmetric encryption. Proceed-ings of
Twelfth Annual International Conference on
Privacy, Security and Trust (PST); 2014 Jul.
[21] Tan Z, Nagar UT, He X, Nanda P, Liu RP, Wang
S, Hu J. Enhancing big data security with
collaborative intrusion detection. IEEE Cloud
Computing. 2014 Sep; 1(3):27–7.

ISSN: 2393-9516 www.ijetajournal.org Page 40

You might also like