3,236 research outputs found
Security and Privacy Issues of Big Data
This chapter revises the most important aspects in how computing
infrastructures should be configured and intelligently managed to fulfill the
most notably security aspects required by Big Data applications. One of them is
privacy. It is a pertinent aspect to be addressed because users share more and
more personal data and content through their devices and computers to social
networks and public clouds. So, a secure framework to social networks is a very
hot topic research. This last topic is addressed in one of the two sections of
the current chapter with case studies. In addition, the traditional mechanisms
to support security such as firewalls and demilitarized zones are not suitable
to be applied in computing systems to support Big Data. SDN is an emergent
management solution that could become a convenient mechanism to implement
security in Big Data systems, as we show through a second case study at the end
of the chapter. This also discusses current relevant work and identifies open
issues.Comment: In book Handbook of Research on Trends and Future Directions in Big
Data and Web Intelligence, IGI Global, 201
Prevention of information harvesting in a cloud services environment
We consider a cloud data storage involving three entities, the cloud customer, the cloud business centre which provides services, and the cloud data storage centre. Data stored in the data storage centre comes from a variety of customers and some of these customers may compete with each other in the market place or may own data which comprises confidential information about their own clients. Cloud staff have access to data in the data storage centre which could be used to steal identities or to compromise cloud customers. In this paper, we provide an efficient method of data storage which prevents staff from accessing data which can be abused as described above. We also suggest a method of securing access to data which requires more than one staff member to access it at any given time. This ensures that, in case of a dispute, a staff member always has a witness to the fact that she accessed data
Data Security in Cloud Computing Based on Advanced Secret Sharing Key Management Scheme
Cloud computing is a globalised concept and there are no borders within the cloud. Computers used to process and store user data can be located anywhere on the globe, depending on where the capacities that are required are available in the global computer networks used for cloud computing. Because of the attaractive features of cloud computing many organizations are using cloud storage for storing their critical information. The data can be stored remotely in the cloud by the users and can be accessed using thin clients as and when required.One of the major issue in cloud today is data security in cloud computing.Storage of data in the cloud can be risky because of use of Internet by cloud based services which means less control over the stored data. One of the major concern in cloud is how do we grab all the benefits of the cloud while maintaining security controls over the organizations assets. Our aim is to propose a more reliable, decentralized light weight key management technique for cloud systems which provides more effecient data security and key management in cloud systems. Our proposed technique provides better security against byzantine failure, server colluding and data modification attacks
Privacy-Preserving Hierarchical Anonymization Framework over Encrypted Data
Smart cities, which can monitor the real world and provide smart services in
a variety of fields, have improved people's living standards as urbanization
has accelerated. However, there are security and privacy concerns because smart
city applications collect large amounts of privacy-sensitive information from
people and their social circles. Anonymization, which generalizes data and
reduces data uniqueness is an important step in preserving the privacy of
sensitive information. However, anonymization methods frequently require large
datasets and rely on untrusted third parties to collect and manage data,
particularly in a cloud environment. In this case, private data leakage remains
a critical issue, discouraging users from sharing their data and impeding the
advancement of smart city services. This problem can be solved if the
computational entity can perform the anonymization process without obtaining
the original plain text. This study proposed a hierarchical k-anonymization
framework using homomorphic encryption and secret sharing composed of two types
of domains. Different computing methods are selected flexibly, and two domains
are connected hierarchically to obtain higher-level anonymization results in an
efficient manner. The experimental results show that connecting two domains can
accelerate the anonymization process, indicating that the proposed secure
hierarchical architecture is practical and efficient.Comment: 8 pages, 12 figures, submitted to IEEE TRANSACTIONS ON INDUSTRIAL
INFORMATICS and under revie
- …