Skip to main content
Erschienen in: Wireless Personal Communications 1/2021

10.08.2020

Exploring New Vista of Secured and Optimized Data Slicing for Big Data: An IOT Paradigm

verfasst von: Manash Sarkar, Aboul Ella Hassanien

Erschienen in: Wireless Personal Communications | Ausgabe 1/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Security and privacy are useful concerns in the context of big data. The Internet of Things (IoT) serves both to bolster and to ease security worries. IoT gadgets raise immense new security challenges, particularly with regards to things like basic framework. Be that as it may, they additionally offer approaches to help keep clients progressively secure by adding additional obstructions of safeguard to information and people. In order to sustain the integrity of data and to provide in order to implicit security for any big database, data slicing is constructive. Data slicing implicitly provides the preservation and the query performance to the database users. The sliced data are stored at servers in a distributed system to protect the data from the attackers. In this article, an intelligent and efficient model is developed to partition the polynomial data securely and to store at various servers in a distributed system. An auto-key generator spawns an encryption key to encrypt the polynomial data as a higher level security. Encrypted data is partitioned by an efficient Fast Fourier transform Technique. A novel clustering methodology entitled as Binary Reverse Clustering is introduced to optimize the performance as well as to reduce the servers’ requisition. Moreover, the novel clustering technique is compared with the traditional clustering algorithm.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Literatur
1.
Zurück zum Zitat Jasimhadi, H., Shnain, A. H., Hadishaheed, S., & Ahmad, A. H. (2015). Big data and five V’s characteristics. International Journal of Advances in Electronics and Computer Science, 2(1), 16–23. Jasimhadi, H., Shnain, A. H., Hadishaheed, S., & Ahmad, A. H. (2015). Big data and five V’s characteristics. International Journal of Advances in Electronics and Computer Science, 2(1), 16–23.
2.
Zurück zum Zitat Aldossary, S., & Allen, W. (2016). Data security, privacy, availability and integrity in cloud computing: Issues and current solutions. International Journal of Advanced Computer Science and Applications, 7(4), 485–498.CrossRef Aldossary, S., & Allen, W. (2016). Data security, privacy, availability and integrity in cloud computing: Issues and current solutions. International Journal of Advanced Computer Science and Applications, 7(4), 485–498.CrossRef
3.
Zurück zum Zitat Sarkar, M., Banerjee, S., Badr, Y., & Sangaiah, A. K. (2017). Configuring a trusted cloud service model for smart city exploration using hybrid intelligence. International Journal of Ambient Computing and Intelligence IGI Global, 8(3), 1–21.CrossRef Sarkar, M., Banerjee, S., Badr, Y., & Sangaiah, A. K. (2017). Configuring a trusted cloud service model for smart city exploration using hybrid intelligence. International Journal of Ambient Computing and Intelligence IGI Global, 8(3), 1–21.CrossRef
4.
Zurück zum Zitat Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., et al. (2014). Security and privacy for storage and computation in cloud computing. Information Sciences, 258, 371–386.CrossRef Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., et al. (2014). Security and privacy for storage and computation in cloud computing. Information Sciences, 258, 371–386.CrossRef
6.
Zurück zum Zitat Zhang, Y., Chunxiang, X., Liang, X., Li, H., Yi, M., & Zhang, X. (2017). Efficient public verification of data integrity for cloud storage systems from indistinguishability obfuscation. IEEE Transactions on Information Forensics and Security, 12(3), 676–688.CrossRef Zhang, Y., Chunxiang, X., Liang, X., Li, H., Yi, M., & Zhang, X. (2017). Efficient public verification of data integrity for cloud storage systems from indistinguishability obfuscation. IEEE Transactions on Information Forensics and Security, 12(3), 676–688.CrossRef
7.
Zurück zum Zitat Sarkar, M., Banerjee, S., & Hassanieen, A. E. (2015). Evaluating the degree of trust for a context sensitive relational database model: Through a hybrid intelligent approach. International Journal of Rough Sets and Data Analysis (IJRSDA), 2(1), 1–21.CrossRef Sarkar, M., Banerjee, S., & Hassanieen, A. E. (2015). Evaluating the degree of trust for a context sensitive relational database model: Through a hybrid intelligent approach. International Journal of Rough Sets and Data Analysis (IJRSDA), 2(1), 1–21.CrossRef
8.
Zurück zum Zitat Oracle Partitioning Policy, Oracle Corporation, November 6, 2013. Oracle Partitioning Policy, Oracle Corporation, November 6, 2013.
9.
Zurück zum Zitat Grosskreutz, H., Lemmen, B., & Ruping, S. (2011). Secure Distributed Subgroup Discovery in Horizontally Partitioned Data. Transactions on Data pPrivacy, 4, 147–165.MathSciNetMATH Grosskreutz, H., Lemmen, B., & Ruping, S. (2011). Secure Distributed Subgroup Discovery in Horizontally Partitioned Data. Transactions on Data pPrivacy, 4, 147–165.MathSciNetMATH
10.
Zurück zum Zitat Nehme, R., & Bruno, N. (2011). Automated partitioning design in parallel database systems. In ACM. Nehme, R., & Bruno, N. (2011). Automated partitioning design in parallel database systems. In ACM.
11.
Zurück zum Zitat Becker, B. A. (2011). High-level data partitioning for parallel computing on heterogeneous hierarchical HPC platforms. Technical report UCD-CSI-2011-10. Becker, B. A. (2011). High-level data partitioning for parallel computing on heterogeneous hierarchical HPC platforms. Technical report UCD-CSI-2011-10.
12.
Zurück zum Zitat Hunyadi, L., & Vajk, I. (2013). Modeling by fitting a union of polynomial functions to data in an errors-in-variables context. International Journal of Pattern Recognition and Artificial Intelligence, 27(2), 1350004.MathSciNetCrossRef Hunyadi, L., & Vajk, I. (2013). Modeling by fitting a union of polynomial functions to data in an errors-in-variables context. International Journal of Pattern Recognition and Artificial Intelligence, 27(2), 1350004.MathSciNetCrossRef
13.
Zurück zum Zitat Monagan, M., & Pearce, R. (2012). POLY: A new polynomial data structure for Maple 17. ACM Communications in Computer Algebra, 46(182), 1–22.MathSciNetMATH Monagan, M., & Pearce, R. (2012). POLY: A new polynomial data structure for Maple 17. ACM Communications in Computer Algebra, 46(182), 1–22.MathSciNetMATH
14.
Zurück zum Zitat Hansen, S. L. & Mukherjee, S. (2003). A polynomial algorithm for optimal univariate microaggregation. IEEE Transactions on Knowledge and Data Engineering, 15(4), 1043–1044.CrossRef Hansen, S. L. & Mukherjee, S. (2003). A polynomial algorithm for optimal univariate microaggregation. IEEE Transactions on Knowledge and Data Engineering, 15(4), 1043–1044.CrossRef
15.
Zurück zum Zitat Cormen, T. H., Leiserson, C. E., Rivest, R. L., & Stein, C. (2009). Introduction to algorithms, 2nd Edn. New Delhi: PHI Learning Pvt. Ltd. ISBN-978-81-203-2141-0, 2009. Cormen, T. H., Leiserson, C. E., Rivest, R. L., & Stein, C. (2009). Introduction to algorithms, 2nd Edn. New Delhi: PHI Learning Pvt. Ltd. ISBN-978-81-203-2141-0, 2009.
16.
Zurück zum Zitat Katz, J., Sahai, A., & Waters, B. (2008). Predicate Encryption supporting disjunctions, polynomial equations, and inner products. In Advances in Cryptology – EUROCRYPT 2008. EUROCRYPT 2008. Lecture Notes in Computer Science (Vol 4965, pp. 146–162). Berlin: Springer. Katz, J., Sahai, A., & Waters, B. (2008). Predicate Encryption supporting disjunctions, polynomial equations, and inner products. In Advances in Cryptology – EUROCRYPT 2008. EUROCRYPT 2008. Lecture Notes in Computer Science (Vol 4965, pp. 146–162). Berlin: Springer.
17.
Zurück zum Zitat Chen, Q., Tang, Z., Li, Y., Niu, Y., & Mo, J. (2011). Research on encryption algorithm of data security for wireless sensor network. Journal of Computational Information Systems, 7(2), 369–376. Chen, Q., Tang, Z., Li, Y., Niu, Y., & Mo, J. (2011). Research on encryption algorithm of data security for wireless sensor network. Journal of Computational Information Systems, 7(2), 369–376.
18.
Zurück zum Zitat Mohassel, P. (2011). Fast computation on encrypted polynomials and applications. In Cryptology and network security. CANS 2011. Lecture notes in computer science, Vol 7092, pp. 234-254. Berlin: Springer. Mohassel, P. (2011). Fast computation on encrypted polynomials and applications. In Cryptology and network security. CANS 2011. Lecture notes in computer science, Vol 7092, pp. 234-254. Berlin: Springer.
19.
Zurück zum Zitat Owens, J., & Matthews, J. (2008). A study of passwords and methods used in brute-force SSH attacks. A Thesis of Master of Science, Department of Mathematics and Computer Science, Clarkson University. Owens, J., & Matthews, J. (2008). A study of passwords and methods used in brute-force SSH attacks. A Thesis of Master of Science, Department of Mathematics and Computer Science, Clarkson University.
20.
Zurück zum Zitat Owens, J. P. Jr. (2008). A study of passwords and methods used in brute-force SSH attacks. A thesis, March 20, 2008. Owens, J. P. Jr. (2008). A study of passwords and methods used in brute-force SSH attacks. A thesis, March 20, 2008.
21.
Zurück zum Zitat Dzitac, I., & Barbat, B. E. (2009). Artificial intelligence + distributed systems = agents. International Journal of Computers, Communications and Control, IV(1), 17–26 ISSN 1841-9836, E-ISSN 1841-9844. Dzitac, I., & Barbat, B. E. (2009). Artificial intelligence + distributed systems = agents. International Journal of Computers, Communications and Control, IV(1), 17–26 ISSN 1841-9836, E-ISSN 1841-9844.
22.
Zurück zum Zitat Firdhous, M. (2011). Implementation of security in distributed systems—A comparative study. International Journal of Computer Information Systems, 2(2), 1–6. Firdhous, M. (2011). Implementation of security in distributed systems—A comparative study. International Journal of Computer Information Systems, 2(2), 1–6.
23.
Zurück zum Zitat Hamlen, K., Kantarcioglu, M., Khan, L., & Thuraisingham, B. (2010). Security issues for cloud computing. International Journal of Information Security and Privacy, 4(2), 39–51.CrossRef Hamlen, K., Kantarcioglu, M., Khan, L., & Thuraisingham, B. (2010). Security issues for cloud computing. International Journal of Information Security and Privacy, 4(2), 39–51.CrossRef
24.
Zurück zum Zitat Hashizume, K., Rosado, D. G., Fernandez-Medina, E., & Fernandez, E. B. (2013) An analysis of security issues for cloud computing. Journal of Internet Services and Applications 4(5), 1–13. Hashizume, K., Rosado, D. G., Fernandez-Medina, E., & Fernandez, E. B. (2013) An analysis of security issues for cloud computing. Journal of Internet Services and Applications 4(5), 1–13.
25.
Zurück zum Zitat Aikebaier, A., Enokido, T., & Takizawa, M. (2011). Human-centric Computing and Information Sciences, 1(6). Aikebaier, A., Enokido, T., & Takizawa, M. (2011). Human-centric Computing and Information Sciences, 1(6).
26.
Zurück zum Zitat Parakh, A., & Kak, S. (2009). Online data storage using implicit security. Information Sciences, 179, 3323–3331.MATHCrossRef Parakh, A., & Kak, S. (2009). Online data storage using implicit security. Information Sciences, 179, 3323–3331.MATHCrossRef
28.
Zurück zum Zitat Sawant, M., Kinage, K., Pilankar, P., & Chaudhari, N. (2013). Database partitioning: a review paper. International Journal of Innovative Technology and Exploring Engineering, 3(5), October 2013. ISSN: 2278-3075. Sawant, M., Kinage, K., Pilankar, P., & Chaudhari, N. (2013). Database partitioning: a review paper. International Journal of Innovative Technology and Exploring Engineering, 3(5), October 2013. ISSN: 2278-3075.
29.
Zurück zum Zitat Ali, M., Khan, S. U., & Vasilakos, A. V. (2015). Security in cloud computing: Opportunities and challenges. Information Sciences, 305, 357–383.MathSciNetCrossRef Ali, M., Khan, S. U., & Vasilakos, A. V. (2015). Security in cloud computing: Opportunities and challenges. Information Sciences, 305, 357–383.MathSciNetCrossRef
30.
Zurück zum Zitat Lee, K., Liu, L., Tang, Y., Zhang, Q., & Zhou, Y. Efficient and customizable data partitioning framework for distributed big RDF data processing in the cloud. Lee, K., Liu, L., Tang, Y., Zhang, Q., & Zhou, Y. Efficient and customizable data partitioning framework for distributed big RDF data processing in the cloud.
31.
Zurück zum Zitat Karr, A. F., Lin, X., Sanil, A. P., & Reiter, J. P. (2009). Privacy-preserving analysis of vertically partitioned data using secure matrix products. Journal of Official Statistics, 25(1), 125–138. Karr, A. F., Lin, X., Sanil, A. P., & Reiter, J. P. (2009). Privacy-preserving analysis of vertically partitioned data using secure matrix products. Journal of Official Statistics, 25(1), 125–138.
32.
Zurück zum Zitat Grosskreutz, H., Lemmen, B., & Uping, S. R. (2011). Secure distributed subgroup discovery in horizontally partitioned data. Transactions on Data Privacy, 4, 147–165.MathSciNet Grosskreutz, H., Lemmen, B., & Uping, S. R. (2011). Secure distributed subgroup discovery in horizontally partitioned data. Transactions on Data Privacy, 4, 147–165.MathSciNet
33.
Zurück zum Zitat Inan, A., Saygın, Y., Savas, E., Hintoglu, A. A., & Levi, A. (2006) Privacy preserving clustering on horizontally partitioned data. In Proceedings of the 22nd International Conference on Data Engineering Workshops (ICDEW’06), IEEE 2006. Inan, A., Saygın, Y., Savas, E., Hintoglu, A. A., & Levi, A. (2006) Privacy preserving clustering on horizontally partitioned data. In Proceedings of the 22nd International Conference on Data Engineering Workshops (ICDEW’06), IEEE 2006.
34.
Zurück zum Zitat Lakshmipathi Raju, N. V. S., Seetaramanath, M. N., Srinivasa Rao, P., & Nandini, G. (2013, November). Rough set based privacy preserving attribute reduction on horizontally partitioned data and generation of Rules. International Journal of Advanced Research in Computer and Communication Engineering, 2(11), 2278–1021 ISSN (Online). Lakshmipathi Raju, N. V. S., Seetaramanath, M. N., Srinivasa Rao, P., & Nandini, G. (2013, November). Rough set based privacy preserving attribute reduction on horizontally partitioned data and generation of Rules. International Journal of Advanced Research in Computer and Communication Engineering, 2(11), 2278–1021 ISSN (Online).
35.
Zurück zum Zitat Pavlo, A., Curino, C., & Zdonik, S. (2012) Skew-aware automatic database partitioning in shared-nothing. In Parallel OLTP systems, ACM. Pavlo, A., Curino, C., & Zdonik, S. (2012) Skew-aware automatic database partitioning in shared-nothing. In Parallel OLTP systems, ACM.
37.
Zurück zum Zitat Zheng, L., Chong, S., Myers, A. C., & Zdancewic, S. (2003). Using replication and partitioning to build secure distributed systems. In Proceedings of the 2003 IEEE symposium on security and privacy, pp. 236–250. Zheng, L., Chong, S., Myers, A. C., & Zdancewic, S. (2003). Using replication and partitioning to build secure distributed systems. In Proceedings of the 2003 IEEE symposium on security and privacy, pp. 236–250.
38.
Zurück zum Zitat Siddiqui, I. F., Qureshi, N. M. F., Shankar Chowdhry, B., & Aslam Uqaili, M. (2019). Edge-node-aware adaptive data processing framework for smart grid. Wireless Personal Communications, 106(1), 179–189.CrossRef Siddiqui, I. F., Qureshi, N. M. F., Shankar Chowdhry, B., & Aslam Uqaili, M. (2019). Edge-node-aware adaptive data processing framework for smart grid. Wireless Personal Communications, 106(1), 179–189.CrossRef
39.
Zurück zum Zitat Konur, D., Campbell, J. F., & Monfared, S. A. (2017). “Economic and environmental considerations in a stochastic inventory control model with order splitting under different delivery schedules among suppliers. Omega, 71, 46–65.CrossRef Konur, D., Campbell, J. F., & Monfared, S. A. (2017). “Economic and environmental considerations in a stochastic inventory control model with order splitting under different delivery schedules among suppliers. Omega, 71, 46–65.CrossRef
40.
Zurück zum Zitat Yao, J. (2017). Optimisation of one-stop delivery scheduling in online shopping based on the physical Internet. International Journal of Production Research, 55(2), 358–376.CrossRef Yao, J. (2017). Optimisation of one-stop delivery scheduling in online shopping based on the physical Internet. International Journal of Production Research, 55(2), 358–376.CrossRef
41.
Zurück zum Zitat Grunder, O., Hammoudan, Z., & Moudni, A. E. (2016). Production and delivery scheduling problem with delivery time and costs dependent on batch-size. International Journal of Logistics Systems and Management, 24(3), 333–355. Grunder, O., Hammoudan, Z., & Moudni, A. E. (2016). Production and delivery scheduling problem with delivery time and costs dependent on batch-size. International Journal of Logistics Systems and Management, 24(3), 333–355.
42.
Zurück zum Zitat Patier, D., David, B., Chalon, R., et al. (2014). A new concept for urban logistics delivery area booking. Procedia- Social and Behavioral Sciences, 125, 99–110.CrossRef Patier, D., David, B., Chalon, R., et al. (2014). A new concept for urban logistics delivery area booking. Procedia- Social and Behavioral Sciences, 125, 99–110.CrossRef
44.
Zurück zum Zitat Conti, M., Dehghantanha, A., & KatrinFranke, S. W. (2018). Internet of things security and forensics: Challenges andopportunities. Future Generation Computer Systems, 78, 544–546.CrossRef Conti, M., Dehghantanha, A., & KatrinFranke, S. W. (2018). Internet of things security and forensics: Challenges andopportunities. Future Generation Computer Systems, 78, 544–546.CrossRef
45.
Zurück zum Zitat Osman, A. M. S. (2019). A novel big data analytics framework for smart cities. Future Generation Computer Systems, 91, 620–633.CrossRef Osman, A. M. S. (2019). A novel big data analytics framework for smart cities. Future Generation Computer Systems, 91, 620–633.CrossRef
46.
Zurück zum Zitat Lenda, G. (2008). The application of least-squares method for approximating the surfaces of engineering structures. Geomatics and Environmental Engineering, 2(1), 50–56. Lenda, G. (2008). The application of least-squares method for approximating the surfaces of engineering structures. Geomatics and Environmental Engineering, 2(1), 50–56.
47.
Zurück zum Zitat Cui, Q., Li, Q., Li, G., Li, Z., Han, X., Lee, H. P., et al. (2017). Globally-optimal prediction-based adaptive mutation particle swarm optimization. Information Sciences, 418–419, 186–217.CrossRef Cui, Q., Li, Q., Li, G., Li, Z., Han, X., Lee, H. P., et al. (2017). Globally-optimal prediction-based adaptive mutation particle swarm optimization. Information Sciences, 418–419, 186–217.CrossRef
49.
Zurück zum Zitat Kaur, S., & Singh, C. (2016). Comparative study of data clustering techniques. International Journal of Engineering Development and Research, 4(4), 309–312. Kaur, S., & Singh, C. (2016). Comparative study of data clustering techniques. International Journal of Engineering Development and Research, 4(4), 309–312.
50.
Zurück zum Zitat Priyono, A., Ridwan, M., Alias, J. A., Rahmat, R. A. O. K., Hassan, A., Alauddin, Mohd., et al. (2005). Generation of fuzzy rules with subtractive clustering. Jurnal Teknologi, 43(1), 143–153.CrossRef Priyono, A., Ridwan, M., Alias, J. A., Rahmat, R. A. O. K., Hassan, A., Alauddin, Mohd., et al. (2005). Generation of fuzzy rules with subtractive clustering. Jurnal Teknologi, 43(1), 143–153.CrossRef
51.
Zurück zum Zitat Berneti, S. M. (2011). Design of fuzzy subtractive clustering model using particle swarm optimization for the permeability prediction of the reservoir. International Journal of Computer Applications, 29(11), 33–37.CrossRef Berneti, S. M. (2011). Design of fuzzy subtractive clustering model using particle swarm optimization for the permeability prediction of the reservoir. International Journal of Computer Applications, 29(11), 33–37.CrossRef
Metadaten
Titel
Exploring New Vista of Secured and Optimized Data Slicing for Big Data: An IOT Paradigm
verfasst von
Manash Sarkar
Aboul Ella Hassanien
Publikationsdatum
10.08.2020
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 1/2021
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-020-07730-3

Weitere Artikel der Ausgabe 1/2021

Wireless Personal Communications 1/2021 Zur Ausgabe

Neuer Inhalt