Skip to main content
Top
Published in:
Cover of the book

2019 | OriginalPaper | Chapter

Big Data Security on Cloud Servers Using Data Fragmentation Technique and NoSQL Database

Authors : Nelson Santos, Giovanni L. Masala

Published in: Intelligent Interactive Multimedia Systems and Services

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Cloud computing has become so popular that most sensitive data are hosted on the cloud. This fast-growing paradigm has brought along many problems, including the security and integrity of the data, where users rely entirely on the providers to secure their data. This paper investigates the use of the pattern fragmentation to split data into chunks before storing it in the cloud, by comparing the performance on two different cloud providers. In addition, it proposes a novel approach combining a pattern fragmentation technique with a NoSQL database, to organize and manage the chunks. Our research has indicated that there is a trade-off on the performance when using a database. Any slight difference on a big data environment is always important, however, this cost is compensated by having the data organized and managed. The use of random pattern fragmentation has great potential, as it adds a layer of protection on the data without using as much resources, contrary to using encryption.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference NIST, Definition of Cloud Computing. National Institute of Standards and Technology (2011) NIST, Definition of Cloud Computing. National Institute of Standards and Technology (2011)
2.
go back to reference Cloud Security Alliance: Top threats to cloud computing. Version 1.0 (2010) Cloud Security Alliance: Top threats to cloud computing. Version 1.0 (2010)
3.
go back to reference Bahrami, M., Singhal, M.: The role of cloud computing architecture in Big Data. In: Pedrycz, W., Chen, S.-M. (eds.) Information Granularity, Big Data, and Computational Intelligence. SBD, vol. 8, pp. 275–295. Springer, Cham (2015) Bahrami, M., Singhal, M.: The role of cloud computing architecture in Big Data. In: Pedrycz, W., Chen, S.-M. (eds.) Information Granularity, Big Data, and Computational Intelligence. SBD, vol. 8, pp. 275–295. Springer, Cham (2015)
4.
go back to reference Kumar, P., Raj, H., Jelciana, P.: Exploring data security issues and solutions in cloud computing. Procedia Comput. Sci. 125, 691–697 (2018)CrossRef Kumar, P., Raj, H., Jelciana, P.: Exploring data security issues and solutions in cloud computing. Procedia Comput. Sci. 125, 691–697 (2018)CrossRef
5.
go back to reference Hegarty, R., Haggerty, J.: Extrusion detection of illegal files in cloud-based systems. Int. J. Space Based Situ. Comput. 5(3), 150–158 (2015)CrossRef Hegarty, R., Haggerty, J.: Extrusion detection of illegal files in cloud-based systems. Int. J. Space Based Situ. Comput. 5(3), 150–158 (2015)CrossRef
6.
go back to reference Dev, H., Sen, T., Basak, M., Ali, M.: An approach to protect the privacy of cloud data from data mining based attacks. In: Companion: High Performance Computing, Networking Storage and Analysis, pp. 1006–1115. IEEE, Salt Lake City (2012) Dev, H., Sen, T., Basak, M., Ali, M.: An approach to protect the privacy of cloud data from data mining based attacks. In: Companion: High Performance Computing, Networking Storage and Analysis, pp. 1006–1115. IEEE, Salt Lake City (2012)
7.
go back to reference Chakraborty, D., Sarkar, P.: A new mode of encryption providing a tweakable strong pseudo-random permutation. In: Robshaw, M. (ed.) FSE 2006. LNCS, vol. 4047, pp. 293–309. Springer, Heidelberg (2006)CrossRef Chakraborty, D., Sarkar, P.: A new mode of encryption providing a tweakable strong pseudo-random permutation. In: Robshaw, M. (ed.) FSE 2006. LNCS, vol. 4047, pp. 293–309. Springer, Heidelberg (2006)CrossRef
8.
go back to reference Gharajedaghi, J.: Systems Thinking: Managing Chaos and Complexity: A Platform for Designing Business Architecture. Elsevier, Boston (2011)CrossRef Gharajedaghi, J.: Systems Thinking: Managing Chaos and Complexity: A Platform for Designing Business Architecture. Elsevier, Boston (2011)CrossRef
9.
go back to reference Bahramim, M., Singhal, M.: A light-weight permutation based method for data privacy in Mobile Cloud Computing. In: 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, pp. 189–198. IEEE, San Francisco (2015) Bahramim, M., Singhal, M.: A light-weight permutation based method for data privacy in Mobile Cloud Computing. In: 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, pp. 189–198. IEEE, San Francisco (2015)
10.
go back to reference Bahrami, M., Singhal, M.: CloudPDB: a light-weight data privacy schema for cloud-based databases. In: 2016 International Conference on Computing, Networking and Communications (ICNC), pp. 1–5, Kauai (2016) Bahrami, M., Singhal, M.: CloudPDB: a light-weight data privacy schema for cloud-based databases. In: 2016 International Conference on Computing, Networking and Communications (ICNC), pp. 1–5, Kauai (2016)
11.
go back to reference Kapusta, K., Memmi, G.: Data protection by means of fragmentation in distributed storage systems. In: 2015 International Conference on Protocol Engineering (ICPE) and International Conference on New Technologies of Distributed Systems (NTDS), pp. 1–8. IEEE, Paris (2015) Kapusta, K., Memmi, G.: Data protection by means of fragmentation in distributed storage systems. In: 2015 International Conference on Protocol Engineering (ICPE) and International Conference on New Technologies of Distributed Systems (NTDS), pp. 1–8. IEEE, Paris (2015)
12.
go back to reference Lentini, S., Grosso, E., Masala, G.: A comparison of data fragmentation techniques in cloud servers. In: Proceedings of International Conference on Emerging Internet, Data and Web Technologies (EIDWT 2018), Tirana (2018)CrossRef Lentini, S., Grosso, E., Masala, G.: A comparison of data fragmentation techniques in cloud servers. In: Proceedings of International Conference on Emerging Internet, Data and Web Technologies (EIDWT 2018), Tirana (2018)CrossRef
13.
go back to reference Rafique, A., Van Landuyt, D., Reniers, V., Joosen, W.: Leveraging NoSQL for scalable and dynamic data encryption in multi-tenant SaaS. In: 2017 IEEE Trustcom/BigDataSE/ICESS, pp. 885–892, Sydney (2017) Rafique, A., Van Landuyt, D., Reniers, V., Joosen, W.: Leveraging NoSQL for scalable and dynamic data encryption in multi-tenant SaaS. In: 2017 IEEE Trustcom/BigDataSE/ICESS, pp. 885–892, Sydney (2017)
14.
go back to reference Alsirhani, A., Bodorik, P., Sampalli, S.: Improving database security in cloud computing by fragmentation of data. In: International Conference on Computer and Applications, pp. 43–49. IEEE, Dubai (2017) Alsirhani, A., Bodorik, P., Sampalli, S.: Improving database security in cloud computing by fragmentation of data. In: International Conference on Computer and Applications, pp. 43–49. IEEE, Dubai (2017)
15.
go back to reference Masala, G.L., Ruiu, P., Grosso, E.: Biometric authentication and data security in cloud computing. In: Daimi, K. (eds.) Computer and Network Security Essentials. Springer, Heidelberg (2018) Masala, G.L., Ruiu, P., Grosso, E.: Biometric authentication and data security in cloud computing. In: Daimi, K. (eds.) Computer and Network Security Essentials. Springer, Heidelberg (2018)
18.
go back to reference SANS Institute: Extending your business network through a virtual private network (VPN). SANS Infosec Reading room (2016) SANS Institute: Extending your business network through a virtual private network (VPN). SANS Infosec Reading room (2016)
21.
go back to reference Federal Information. Announcing the Advanced Encryption Standard (AES). Federal Information Processing Standards Publication 197 (2001) Federal Information. Announcing the Advanced Encryption Standard (AES). Federal Information Processing Standards Publication 197 (2001)
Metadata
Title
Big Data Security on Cloud Servers Using Data Fragmentation Technique and NoSQL Database
Authors
Nelson Santos
Giovanni L. Masala
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-319-92231-7_1

Premium Partner