Open Access Open Access  Restricted Access Subscription Access

Multi- Level Data Security Model for Big Data on Public Cloud:A New Model


Affiliations
1 Department of Computer Engineering, RK University, Rajkot, India
2 M.Phil. Program, C.U. Shah University, Wadhvan City, India
 

With the advent of cloud computing the big data has emerged as a very crucial technology. The certain type of cloud provides the consumers with the free services like storage, computational power etc. This paper is intended to make use of infrastructure as a service where the storage service from the public cloud providers is going to leveraged by an individual or organization. The paper will emphasize the model which can be used by anyone without any cost. They can store the confidential data without any type of security issue, as the data will be altered in such a way that it cannot be understood by the intruder if any. Not only that but the user can retrieve back the original data within no time. The proposed security model is going to effectively and efficiently provide a robust security while data is on cloud infrastructure as well as when data is getting migrated towards cloud infrastructure or vice versa.

Keywords

Cloud, Big Data, Data Security.
User
Notifications
Font Size

  • M. Thamizhselvan, R. Raghuraman, S. Gershon Manoj, P. Victer Paul “DATA SECURITY MODEL FOR CLOUD COMPUTING USING V -GRT METHODOLOGY.” Published in IEEE.
  • Mortada A.Aman and Egemen K¸Cetinkaya “Towards Cloud Security Improvement with Encryption Intensity Selection” Published in IEEE.
  • Jingwei Li, Jin Li, Dongqing Xie and Zhang Cai “Secure Auditing and Deduplicating Data in Cloud.” Published in IEEE.
  • Hend Gedawy, Sannan Tariq, Abderrahmen Mtibaa, Khaled Harras School of Computer Science, Carnegie Mellon University, “Cumulus: ADistributed and Flexible Computing Testbed for Edge Cloud Computational Offloading” published in IEEE-2016.
  • Vinay kumar pant, Jyoti Prakash , Amit Asthana “Three Step Data Security Model for Cloud Computing based on RSA and Steganography Techniques ”, 2015 International Conference on Green Computing and Internet of Things (ICGCloT).
  • Meena Kumari , Rajender Nath “Security Concerns and Countermeasures in Cloud Computing Paradigm”, 2015 Fifth International Conference on Advanced Computing & Communication Technologies.
  • Shakeeba S. Khan, Prof.R.R. Tuteja “Security in Cloud Computing using Cryptographic Algorithms” International Journal of Innovative Research in Computer and Communication Engineering (An ISO 3297: 2007 Certified Organization) Vol. 3, Issue 1, January 2015.
  • Neha Jain and Gurpreet Kaur ‘Implementing DES Algorithm in Cloud for Data Security” VSRD International Journal of CS & IT Vol. 2 Issue 4, pp. 316-321, 2012
  • G. Devi , M. Pramod Kumar, “Cloud Computing: A CRM Service Based on a Separate Encryption and Decryption using Blowfish algorithm” International Journal Of Computer Trends And Technology Volume 3 Issue 4, ISSN: 2231-2803, pp. 592-596,2012
  • Gurpreet Singh, Supriya Kinger”Integrating AES, DES, and 3-DES Encryption Algorithms for Enhanced Data Security “International Journal of Scientific & Engineering Research, Volume 4, Issue 7, July-2013
  • Arthur Rahumed, Henry C. H. Chen, Yang Tang, Patrick P. C. Lee, and John C. S. Lui “A Secure Cloud Backup System with Assured Deletion and Version Control” 1530-2016/11 IEEE DOI 10.1109/ICPPW.2011.17
  • Jay Dave, Ashwin Raiyani “The security perusal of big data in cloud computing environment”, Proceedings of RK University’s First International Conference on Research & Entrepreneurship (Jan. 5th& Jan. 6th, 20

Abstract Views: 174

PDF Views: 0




  • Multi- Level Data Security Model for Big Data on Public Cloud:A New Model

Abstract Views: 174  |  PDF Views: 0

Authors

Jay Dave
Department of Computer Engineering, RK University, Rajkot, India
Dhaval Vyas
M.Phil. Program, C.U. Shah University, Wadhvan City, India

Abstract


With the advent of cloud computing the big data has emerged as a very crucial technology. The certain type of cloud provides the consumers with the free services like storage, computational power etc. This paper is intended to make use of infrastructure as a service where the storage service from the public cloud providers is going to leveraged by an individual or organization. The paper will emphasize the model which can be used by anyone without any cost. They can store the confidential data without any type of security issue, as the data will be altered in such a way that it cannot be understood by the intruder if any. Not only that but the user can retrieve back the original data within no time. The proposed security model is going to effectively and efficiently provide a robust security while data is on cloud infrastructure as well as when data is getting migrated towards cloud infrastructure or vice versa.

Keywords


Cloud, Big Data, Data Security.

References