3 research outputs found

    A Solution for Privacy-Preserving and Security in Cloud for Document Oriented Data (By Using NoSQL Database)

    Get PDF
    Cloud computing delivers massively scalable computing resources as a service with Internet based technologies those can share resources within the cloud users. The cloud offers various types of services that majorly include infrastructure as services, platform as a service, and software as a service and security as a services and deployment model as well. The foremost issues in cloud data security include data security and user privacy, data protection, data availability, data location, and secure transmission. In now day, preserving-privacy of data and user, and manipulating query from big-data is the most challenging problem in the cloud. So many researches were conducted on privacy preserving techniques for sharing data and access control; secure searching on encrypted data and verification of data integrity. This work  included preserving-privacy of document oriented data security, user privacy in the three phases those are data security at rest, at process and at transit by using Full Homomorphic encryption and decryption scheme to achieve afore most mentioned goal. This work implemented on document oriented data only by using NoSQL database and  the encryption/decryption algorithm such as RSA and Paillier’s cryptosystem in Java package with MongoDB, Apache Tomcat Server 9.1, Python, Amazon Web Service mLab for MongoDB as remote server.  Keywords: Privacy-Preserving, NoSQL, MongoDB, Cloud computing, Homomorphic encryption/decryption, public key, private key, RSA Algorithm, Paillier’s cryptosystem DOI: 10.7176/CEIS/11-3-02 Publication date:May 31st 202

    Big Data Security Issues in Three Perspectives: A Review

    Get PDF
    Big data is a term that is used to describe data that is high volume, high velocity, and/or high variety; requires new technologies and techniques to capture, store, and analyze it; and is used to enhance decision making, provide insight and discovery, and support and optimize processes. With regard to the definition of big data, IBM Company uses volume, velocity, variety, value and veracity as 5Vs to summarize the concept of big data.  There are different types of big data, for example, structured, semi-structured and un-structured data. The contents of big data can be text data, audio data, video data and still image and it indicates that the big data may have diverse data types as well as data qualities. Big data has variety of sources such as healthcare center, commercial system, industries, social media, telecommunication, transportation, sensor machines and others. In this paper, I reviewed three the most security challenging perspectives and I studied lack of concentrations in these areas by most research works. To confirm security in the big data platforms, it is critical to ascertain the data rendering points and their security techniques to safeguard the data in this pacing digital world. Then I envisage directions for the future research. In this paper, I have reviewed the big data sources and its security issues in the three directions such as data at rest, data at communication and data in process/use. Keywords: Big Data, Big Data Security, Big Data source, Attribute based encryption, storage path, Transport layer security, secure shell, Cloud service Provider DOI: 10.7176/CEIS/12-3-01 Publication date: November 30th 202

    Simulating Cloud Environment in Single Host Machine by Applying Virtual Switches in VMware

    Get PDF
    Computer virtualization in its simplest form is where one physical Server simulates being several separate servers and it allows one server to handle various functions or processes. It enables a single system to concurrently run multiple isolated virtual machines (VMs), operating systems or multiple instances of a single operating system and It minimizes resource requirements of hardware and software, minimizes power consumption, increases utilizations, maximizes hardware processing power, minimizes the work costs in the data center and maximizes the usage of available resources. Virtualization is a partitioning of single physical server into multiple logical servers. This paper work highly focuses on the configuration of virtual switch, Virtual Bridge, Virtual Host adapters and NAT devices. This paper work is implemented by using one host computer, one virtual bridge, two virtual Ethernet switches and three virtual machines. Keywords: VMware, Virtualization, Public cloud, Private cloud, Virtual cloud, community cloud, Hyper-V, VMNet, Virtual switch DOI: 10.7176/CEIS/11-4-02 Publication date:June 30th 202
    corecore