Open Access   Article Go Back

Efficient Security Framework for Sensitive Data sharing On Big Data Platform in Cloud Computing

J. Vimala Roselin1 , G.M Nasira2

Section:Survey Paper, Product Type: Journal Paper
Volume-7 , Issue-5 , Page no. 277-280, May-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i5.277280

Online published on May 31, 2019

Copyright © J. Vimala Roselin, G.M Nasira . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: J. Vimala Roselin, G.M Nasira, “Efficient Security Framework for Sensitive Data sharing On Big Data Platform in Cloud Computing,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.277-280, 2019.

MLA Style Citation: J. Vimala Roselin, G.M Nasira "Efficient Security Framework for Sensitive Data sharing On Big Data Platform in Cloud Computing." International Journal of Computer Sciences and Engineering 7.5 (2019): 277-280.

APA Style Citation: J. Vimala Roselin, G.M Nasira, (2019). Efficient Security Framework for Sensitive Data sharing On Big Data Platform in Cloud Computing. International Journal of Computer Sciences and Engineering, 7(5), 277-280.

BibTex Style Citation:
@article{Roselin_2019,
author = {J. Vimala Roselin, G.M Nasira},
title = {Efficient Security Framework for Sensitive Data sharing On Big Data Platform in Cloud Computing},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {7},
Issue = {5},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {277-280},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4236},
doi = {https://doi.org/10.26438/ijcse/v7i5.277280}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i5.277280}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4236
TI - Efficient Security Framework for Sensitive Data sharing On Big Data Platform in Cloud Computing
T2 - International Journal of Computer Sciences and Engineering
AU - J. Vimala Roselin, G.M Nasira
PY - 2019
DA - 2019/05/31
PB - IJCSE, Indore, INDIA
SP - 277-280
IS - 5
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
270 272 downloads 157 downloads
  
  
           

Abstract

Big data contains enormous number of semi structured and unstructured data. It is hard to process these data utilizing traditional databases and programming technologies. The association acquire substantial data storage data delivery on big data sharing platform. It expands the use. An organisation and enterprise can acquire huge amount of sensitive data by putting away, breaking down, handling these information. They utilized logging, vulnerability and encryption to keep sensitive data secure in advanced world. It offers some benefit included data administrations. Clients are looking at encryption, tokenization advancements to secure the information. The major objective of the work is to examine security issues comprising the entire sensitive data sharing and clarify a security mode created to guarantee secure sensitive data sharing on a big data platform. It also assures secure capacity on the big data platform. This abstract presents a framework to share the secure sensitive data on a big data platform using Identity based ConditionaI Proxy Re-encryption (IBCPRE) algorithm. It is based on heterogeneous cipher text transformation technique to gives the end-to-end security of big data in the cloud It provides the security when sharing the sensitive data.

Key-Words / Index Term

Secure Data, Sensitive, and Identity Based Conditional Proxy Re-Encryption (IBCPRE), Encryption

References

[1] J. Bethencourt, A. Sahai, and B. Waters, Ciphertext-policy attribute-based encryption, in Proc. IEEE Symposium on Security and Privacy, Oakland, USA, 2007, pp. 321–334.
[2] J. Li, G. Zhao, X. Chen, D. Xie, C. Rong, W. Li, L. Tang, and Y. Tang, Fine-grained data access control systems with user accountability in cloud computing, in Proc. 2nd Int. Conf. on Cloud Computing, Indianapolis, USA, 2010, pp. 89–96.
[3] L. Wang, L. Wang, M. Mambo, and E. Okamoto, New identity-based proxy re-encryption schemes to prevent collusion attacks, in Proc. 4th Int. Conf.Pairing-Based cryptography-Pairing, Ishikawa, Japan, 2010, pp. 327– 346.
[4] C. Gentry, A fully homographic encryption scheme, PhD dissertation ,Stanford University, California, USA, 2009.
[5] S. Ananthi, M.S. Sendil, and S. Karthik, Privacy preserving keyword search over encrypted cloud data, in Proc. 1st Advances in Computing and Communications, Kochi, India, 2011, pp. 480–487.
[6] H. Hu, J. Xu, C. Ren, and B. Choi, Processing private queries over untrusted data cloud through privacy homomorphism, in Proc. 27th IEEE Int. Conf. on Data Engineering, Hannover, Germany, 2011, pp. 601–612.
[7] N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, Privacypreserving multi-keyword ranked search over encrypted cloud data, in Proc. 30th IEEE INFOCOM, Shanghai, China, 2011, pp. 829–837.
[8] C. Hong, M. Zhang, and D. Feng, AB-ACCS: A cryptographic access control scheme for cloud storage, (in Chinese), Journal of Computer Research and Development, vol. 47, no. 1, pp. 259–265, 2010.
[9] N. Zeldovich, S. Boyd-Wickizer, and D. Mazieres, Securing distributed systems with information flow control, in Proc. 5th USENIX Symposium on Networked Systems Design and Implementation, San Francisco, USA, 2008, pp. 293–308.
[9] Z. Lv, C. Hong, M. Zhang, and D. Feng, A secure and efficient revocation scheme for fine-grained access control in cloud storage, in Proc. 4th IEEE Int. Conf. on Cloud Computing Technology and Science, Taipei, Taiwan, China, 2012, pp. 545–550.
[10] A. M. Azab, P. Ning, E. C. Sezer, and X. Zhang, HIMA: A hypervisor-based integrity measurement agent, in Proc. 25th Annual Computer Security Applications Conf., Hawaii, USA, 2009, pp. 461–470.
[11] A. M. Azab, P. Ning, Z. Wang, X. Jiang, X. Zhang, and N. C. Skalsky, HyperSentry: Enabling stealthy in-context measurement of hypervisor integrity, in Proc. 17th ACM Conference on Computer and Communications Security, Chicago, USA, 2010, pp. 38–49. [12] Trusted Computing Group, TNC architecture for interoperability, http://www.trustedcomputinggroup.org/ resources/tnc architecture for interoperability specification, 2014.
[13] H. Zhang, L. Chen, and L. Zhang, Research on trusted network connection, (in Chinese), Chinese Journal of Computers, vol. 33, no. 4, pp. 706–717, 2010.
[14] D. Feng, Y. Qin, D. Wang, and X. Chu, Research on trusted computing technology, (in Chinese), Journal of Computer Research and Development, vol. 48, no. 8, pp. 1332–1349, 2011.
[15] F. Zhang, J. Chen, H. Chen, and B. Zang, Cloudvisor: Retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization, in Proc. 23rd ACM Symposium on Operating Systems Principles, Cascais, Portugal, 2011, pp. 203–216.
[16] X. Chen, T. Garfinkel, E. C. Lewis, and B. Spasojevic, Overshadow: A virtualization-based approach to retrofitting protection in commodity operating systems, in Proc. 13th Int. Conf. on Architectural Support for Programming Languages and Operating Systems, Seattle, USA, 2008, pp. 2–13. 80 Tsinghua Science and Technology, February 2015, 20(1): 72-80.