Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2896387.2896423acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccConference Proceedingsconference-collections
research-article

Efficient Security Framework for Sensitive Data Sharing and Privacy Preserving on Big-Data and Cloud Platforms

Published: 22 March 2016 Publication History

Abstract

Now day's use of big data platforms is increasing for storing large amount of end user's data remotely on big data servers. Cloud computing storage was widely used for storing user's data, but cloud computing only providing the tasks of data storage but not supporting the important functionalities like computation and database operations. These operations are supported by big data systems and hence currently use of big data platform for storage in increases worldwide by enterprises. Sharing sensitive information and data resulted into big reduction in costs of enterprises for users to provide value added data and personalized services. As enterprises are sharing their important and sensitive information on big data platforms from different and many domains, it becomes necessary to provide the security and privacy in big data platform. Data security and privacy is gaining significant attentions of researchers. There are many security methods already proposed for cloud computing platform, now same methods slowly adopted on big data platform. For Big Data platforms, secure sharing of sensitive data is challenging research problem. In this paper, first we are introducing the different security and privacy preserving methods of cloud computing and big data platforms with their limitations, and then presenting the novel hybrid framework for secure sensitive data sharing and privacy preserving public auditing for shared data over big data systems including functionalities such as privacy preserving, public auditing, data security, storage, data access, deletion or secure data destruction using cloud services.

References

[1]
M. Green and G. Ateniese. Identity-based proxy re-encryption. In ACNS '07, vol. 4512 of LNCS, pp. 288--306. Springer, 2007.
[2]
C.-K. Chu and W.-G. Tzeng. Identity-based proxy re-encryption without random oracles. In ISC '07, vol. 4779 of LNCS, pp. 189--202. Springer, 2007.
[3]
J. Shao. Anonymous id-based proxy re-encryption. In ACISP, vol. 7372 of LNCS, pp. 364--375. Springer, 2012.
[4]
J. Shao and Z. Cao. Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption. Inform. Sci.,2012. http://dx.doi.org/10.1016/j.ins.2012.04.013.
[5]
Xu An Wang, Xiaoyuan Yang. New Identity Based Encryption And Its Proxy Re-encryption, The International Conference on Biomedical Engineering and Computer Science (ICBECS2010), May 3, 2012
[6]
JunJie Qiu, JungBok Jo and HoonJae Lee. Collusion-Resistant Identity-Based Proxy Re-Encryption Without Random Oracles. International Journal of Security and Its Applications Vol.9, No.9 (2015), pp. 337--344
[7]
Kaitai Liang, Willy Susilo. Privacy-Preserving Ciphertext Multi-Sharing Control for Big Data Storage. IEEE Transactions on Information Forensics and Security, 1556--6013 (c) 2015 IEEE.
[8]
Xinhua Dong, Ruixuan Li, Heng He, Wanwan Zhou, Zhengyuan Xue, and Hao Wu. Secure Sensitive Data Sharing on a Big Data Platform. TSINGHUA SCIENCE AND TECHNOLOGY ISSNl 11007-02141 108/111 1pp72--80, Volume 20, Number 1, February 2015.
[9]
Kalyani Shirudkar, Dilip Motwani. Big-Data Security. Volume 5, Issue 3, March 2015 ISSN: 2277 128X, International Journal of Advanced Research in Computer Science and Software Engineering.
[10]
S. Razick, R. Mocnik, L. F. Thomas, E. Ryeng, F. Drabløs, and P. Sætrom, The eGenVar data management system --- Cataloguing and sharing sensitive data and metadata for the life sciences, Database, vol. 2014, p. bau027, 2014.

Cited By

View all
  • (2024)Internet of Things Data Privacy and Security-Based on Blockchain TechnologyForthcoming Networks and Sustainability in the AIoT Era10.1007/978-3-031-62881-8_5(52-63)Online publication date: 26-Jun-2024
  • (2021)Analyzing and Evaluating Critical Challenges and Practices for Software Vendor Organizations to Secure Big Data on Cloud Computing: An AHP-Based Systematic ApproachIEEE Access10.1109/ACCESS.2021.31002879(107309-107332)Online publication date: 2021
  • (2021)Identification and prioritization of security challenges of big data on cloud computing based on SLR: A fuzzy‐TOPSIS analysis approachJournal of Software: Evolution and Process10.1002/smr.2387Online publication date: 7-Nov-2021
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICC '16: Proceedings of the International Conference on Internet of things and Cloud Computing
March 2016
535 pages
ISBN:9781450340632
DOI:10.1145/2896387
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 22 March 2016

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Big Data
  2. Data Security
  3. Data Sharing
  4. Privacy Preserving
  5. Proxy Re-encryption
  6. Public Auditing
  7. Ring Search
  8. Sensitive Data

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ICC '16

Acceptance Rates

Overall Acceptance Rate 213 of 590 submissions, 36%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)17
  • Downloads (Last 6 weeks)1
Reflects downloads up to 27 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Internet of Things Data Privacy and Security-Based on Blockchain TechnologyForthcoming Networks and Sustainability in the AIoT Era10.1007/978-3-031-62881-8_5(52-63)Online publication date: 26-Jun-2024
  • (2021)Analyzing and Evaluating Critical Challenges and Practices for Software Vendor Organizations to Secure Big Data on Cloud Computing: An AHP-Based Systematic ApproachIEEE Access10.1109/ACCESS.2021.31002879(107309-107332)Online publication date: 2021
  • (2021)Identification and prioritization of security challenges of big data on cloud computing based on SLR: A fuzzy‐TOPSIS analysis approachJournal of Software: Evolution and Process10.1002/smr.2387Online publication date: 7-Nov-2021
  • (2020)Biometrics-Based Un-Locker to Enhance Cloud Security SystemsInternational Journal of Cloud Applications and Computing10.4018/IJCAC.202010010110:4(1-12)Online publication date: 1-Oct-2020
  • (2020)A data privacy protection scheme for Internet of things based on blockchainTransactions on Emerging Telecommunications Technologies10.1002/ett.4010Online publication date: 9-Jul-2020
  • (2018)A Privacy-Preserving Attribute-Based Authentication Scheme for Cloud Computing2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)10.23919/APSIPA.2018.8659725(260-265)Online publication date: Nov-2018

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media