Analysis and Research on the Big Data Security Based on Cloud Platform. Bo Yang1, a

Similar documents
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data

Framework Research on Privacy Protection of PHR Owners in Medical Cloud System Based on Aggregation Key Encryption Algorithm

The Establishment of Large Data Mining Platform Based on Cloud Computing. Wei CAI

Construction of SSI Framework Based on MVC Software Design Model Yongchang Rena, Yongzhe Mab

The Design and Implementation of Disaster Recovery in Dual-active Cloud Center

Processing Technology of Massive Human Health Data Based on Hadoop

Chongqing, China. *Corresponding author. Keywords: Wireless body area network, Privacy protection, Data aggregation.

Intelligent Terminal System Based on Trusted Platform Module

Study on data encryption technology in network information security. Jianliang Meng, Tao Wu a

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. Study on secure data storage based on cloud computing ABSTRACT KEYWORDS

Construction Scheme for Cloud Platform of NSFC Information System

New research on Key Technologies of unstructured data cloud storage

ABSTRACT I. INTRODUCTION

Integration of information security and network data mining technology in the era of big data

Design of student information system based on association algorithm and data mining technology. CaiYan, ChenHua

The Research and Application of the Fingerprint Key based USB-Key Pin Number Protection System Yu Lu 1, a, Zhong Liang 2, b, Chen Yue 3, c

A New Method Of VPN Based On LSP Technology

Data Mining in the Application of E-Commerce Website

S. Indirakumari, A. Thilagavathy

2017 2nd International Conference on Information Technology and Management Engineering (ITME 2017) ISBN:

Multisource Remote Sensing Data Mining System Construction in Cloud Computing Environment Dong YinDi 1, Liu ChengJun 1

Secret Sharing With Trusted Third Parties Using Piggy Bank Protocol

The Research on PGP Private Key Ring Cracking and Its Application

A Survey on Cryptography Based QR code authentication

Information Push Service of University Library in Network and Information Age

Based on The DES_RSA Encryption Algorithm Improvement and Implementation

The Comparative Study of Machine Learning Algorithms in Text Data Classification*

A REASONING COMPONENT S CONSTRUCTION FOR PLANNING REGIONAL AGRICULTURAL ADVANTAGEOUS INDUSTRY DEVELOPMENT

LOAD BALANCING AND DEDUPLICATION

Design and Implementation of Networked CNC Machine DNC System in. Colleges and Universities Based on Internet Plus

A QoS Load Balancing Scheduling Algorithm in Cloud Environment

Design on Office Automation System based on Domino/Notes Lijun Wang1,a, Jiahui Wang2,b

Research on Digital Library Platform Based on Cloud Computing

Web-based Building Energy Consumption Monitoring and Conservation Service DONG Wei1, a

Usability evaluation of e-commerce on B2C websites in China

Study on Computer Network Technology of Digital Library

Development and Application of Database System for Rubber Material

Enhancing Data Security with Certificateless Signature Scheme in Cloud Computing

Construction and Application of Cloud Data Center in University

Conjunctive Keyword Search with Designated Tester and Timing Enabled Proxy Re-Encryption Function for Electronic Health Cloud

Security Analysis of PSLP: Privacy-Preserving Single-Layer Perceptron Learning for e-healthcare

Enhancing Reliability and Scalability in Dynamic Group System Using Three Level Security Mechanisms

A priority based dynamic bandwidth scheduling in SDN networks 1

Implementation of Decentralized Access Control with Anonymous Authentication in Cloud

AUTHENTICATED SMART CARD APPLICATION USING MULTI CROSS CLOUD TECHNOLOGY

Research on Design and Application of Computer Database Quality Evaluation Model

TCM Health-keeping Proverb English Translation Management Platform based on SQL Server Database

An Overview on Big Data Processing in Cloud Computing: Recent Challenges & Issues

Application of Redundant Backup Technology in Network Security

ISSN Vol.08,Issue.16, October-2016, Pages:

The Application of CAN Bus in Intelligent Substation Automation System Yuehua HUANG 1, a, Ruiyong LIU 2, b, Peipei YANG 3, C, Dongxu XIANG 4,D

Geospatial Information Service Based on Ad Hoc Network

Wireless Smart Home Security System Based on Android

Integrity Check Mechanism in Cloud Using SHA-512 Algorithm

Research on Heterogeneous Communication Network for Power Distribution Automation

Research on the value of search engine optimization based on Electronic Commerce WANG Yaping1, a

A Novel Intrusion Detection Method for WSN Sijia Wang a, Qi Li and Yanhui Guo

Research on Building Baseline of IT Risk Control and Its Application in IT Risks Management

Open Access Apriori Algorithm Research Based on Map-Reduce in Cloud Computing Environments

A FAST HANDSHAKE CACHING PROTOCOL WITH CACHING CENTER

Research on Applications of Data Mining in Electronic Commerce. Xiuping YANG 1, a

Face Recognition Technology Based On Image Processing Chen Xin, Yajuan Li, Zhimin Tian

Privacy Protection on Data Self- Destruction System for Cloud Storage Networks

Crop Production Management Information System Design and Implementation

Improving data integrity on cloud storage services

Taccumulation of the social network data has raised

Construction of Trusted Computing Platform Based on Android System

DESIGN OF WEB SERVICE SINGLE SIGN-ON BASED ON TICKET AND ASSERTION

2016 BITGLASS, INC. mobile. solution brief

Research and Application of Mobile Geographic Information Service Technology Based on JSP Chengtong GUO1, a, Yan YAO1,b

Quality Assessment of Power Dispatching Data Based on Improved Cloud Model

The Key Technology and Algorithm Design for the Development of Intelligent Examination System

An Indian Journal FULL PAPER ABSTRACT KEYWORDS. Trade Science Inc. The study on magnanimous data-storage system based on cloud computing

Research and Design of Education and Teaching Resource Management System based on ASP.NET Technology

Traffic Flow Prediction Based on the location of Big Data. Xijun Zhang, Zhanting Yuan

Three Levels of Access Control to Personal Health Records in a Healthcare Cloud

A Compatible Public Service Platform for Multi-Electronic Certification Authority

Attribute-based encryption with encryption and decryption outsourcing

Research and Application of E-Commerce Recommendation System Based on Association Rules Algorithm

Design and Implementation of High-Speed Real-Time Data Acquisition and Processing System based on FPGA

Research on Online Education Interactive Application Based on Cloud Computing and Large Data

A Data Classification Algorithm of Internet of Things Based on Neural Network

To Enhance Homomorphic Encryption scheme for Key Management and Key Sharing in Cloud Computing

International Journal of Advance Research in Engineering, Science & Technology

Available online at ScienceDirect. IERI Procedia 4 (2013 ) 2 7

An Indian Journal FULL PAPER. Trade Science Inc. Research on data mining clustering algorithm in cloud computing environments ABSTRACT KEYWORDS

An Improved Method of Vehicle Driving Cycle Construction: A Case Study of Beijing

Yunfeng Zhang 1, Huan Wang 2, Jie Zhu 1 1 Computer Science & Engineering Department, North China Institute of Aerospace

PRIVACY PRESERVING RANKED MULTI KEYWORD SEARCH FOR MULTIPLE DATA OWNERS. SRM University, Kattankulathur, Chennai, IN.

Design and Realization of Data Mining System based on Web HE Defu1, a

Housing Estates Information Management System Based on.net. Jianliang Min

The principle of a fulltext searching instrument and its application research Wen Ju Gao 1, a, Yue Ou Ren 2, b and Qiu Yan Li 3,c

Three Party Authentication Scheme with Privacy in Telecare Medicine Information Systems

On the Security of a Lightweight Cloud Data Auditing Scheme

A Novel Image Super-resolution Reconstruction Algorithm based on Modified Sparse Representation

Data Hiding on Text Using Big-5 Code

The Design of Supermarket Electronic Shopping Guide System Based on ZigBee Communication

Arbiter: the Evaluation Tool in the Contests of the China NOI

Implementation of Security in Cloud Systems Based using Encryption and Steganography

Research on Two - Way Interactive Communication and Information System Design Analysis Dong Xu1, a

Transcription:

4th International Conference on Mechatronics, Materials, Chemistry and Computer Engineering (ICMMCCE 2015) Analysis and Research on the Big Data Security Based on Cloud Platform Bo Yang1, a 1 Beijing Earthquake Administration of Beijing Municipality, Beijing, 100080, China a 231373693@qq.com Keywords: data security; encryption model; cloud big data; code information Abstract. Objective: The purpose of this paper is to build a large data security encryption model in the cloud, which can make users to upload and download data more reliable. Model: This paper uses the data security storage model to analyze the security model of the cloud big data. Process: We used the mathematical code, and storage the cloud big data into the memory, then, the code information is composed of element equation, each memory is unable to obtain the code, so to achieve the purpose of encryption and protection of data. Conclusion: Cloud technology and big data security is still in its infancy, which is the trend of future development, this paper provides a theoretical reference for the security encryption mode and it has a great significance. Introduction In the era of big data[1,2,3], information and knowledge are also important resources of enterprises. Now many developed countries in the effort to become a knowledge-based enterprise, and constantly using advanced information technology to tap the knowledge from large data in the accounting, and enhance the core competitiveness of enterprises. China in the eighteen major is a clear to the level of information technology to improve the level of a comprehensive well-off society into one of the goals, so as to ensure sustained economic development, comprehensive national strength has been enhanced. As Chinese enterprises, how to adapt to the complex economic environment, realize the value of enterprise's value, is also the focus of the current enterprise information construction [1]. The core of enterprise information is accounting information, due to the high cost, low efficiency, long construction cycle, technology, and other factors, the existing accounting information system is difficult to obtain large amounts of accounting data from the external enterprise, and found the knowledge, to provide scientific basis for the management of enterprise managers. Therefore, how to obtain and excavate the valuable knowledge hidden behind the big data in accounting, and promote the sustainable development of enterprises, is the common problem of the academic and business circles. With the development of networking technology, cloud computing, it has low cost, large storage space, processing speed and other advantages, around the world with information related research began to rely on it, our country also launched a cloud computing information planning in 45 countries, focusing on three areas of cloud computing platform of big data services based on. In the construction of accounting information system [2], this paper also proposes a large data analysis platform based on cloud computing, which uses cloud computing technology to obtain, cluster and analyze the accounting data. It not only overcomes the problems of traditional accounting information system, but also greatly improves the efficiency of large data analysis. Research on security related technologies for large data storage In the traditional data relationship, Owner (Data) is a data provider; users only need to submit a user name and password can be related to the operation. But in cloud computing, data owners and cloud service providers (Service Provider Cloud) these two roles are often separated [3]. The role of cloud service providers are mostly borne by commercial organizations, these agencies in the user's trust region, so the traditional authentication methods cannot meet the needs of cloud storage security 2015. The authors - Published by Atlantis Press 303

access, cloud storage access need to take additional verification mechanism, document [4] overview of the access process of cloud storage, and the right to authentication, encryption, decoding and other operations to do a simple introduction, in this paper, a reliable security access model is proposed on the basis of document [5-7], as shown in figure 1. Users send requests to the data owner to get the real-time issue of the key, certificates, access to the cloud. This model can provide a safe and reliable access, but the defect is that when the user needs to operate the data, the data owner must be in an online state. Once communication is limited, the scheme is unable to guarantee secure access. Fig. 1 A reliable security access model In view of the above problems, the paper presents an optimized solution for document [8]. The scheme uses the access control method based on the user's ability and the related encryption strategy. The model is shown in Figure 2. Each data owner has a user's "ability to table", which stores a user's operating privileges for certain files, and then uploaded to the cloud server, along with the encrypted file, when users need access, cloud server according to user identity to operate. If the user is in the range of the ability table, it is not trusted users, directly refused access; if the ability of the table, then feedback user information, including the key to decrypt the file. Because the data owner has the message encryption, it will not leak to the cloud. In this scheme, the data owner can be in an offline state for most of the time, and can only be updated with the new user registration. Fig. 2 Model based on user access capability Similar to the literature [9], the [10] also has data from the "eternal online" in the liberation of imprisonment. In this paper, an access scheme is proposed, which is combined with attribute encryption and proxy re encryption and a large number of updates are made, and the work of the user's private key is assigned to the cloud. [11] is proposed based on Platform Module Trusted (trusted platform module) access control scheme. The scheme is based on the characteristics of mobile devices, and the security domain of cloud computing is defined from the perspective of the client. The paper proposes an access control strategy based on Merle hash tree, which optimizes the performance of the TPM, and uses the statistical method of dynamic trust degree. However, it can only be used for large lot and private file access control with no specific encryption or certificate issuing mechanism. Literature [12] proposed a control access scheme based on spanning tree, a spanning tree is composed of three minor, respectively allow the identity of the user access "," ban the identity of the user access " [13] and" the identity of the user access selection ", increase the spanning tree of the elasticity and flexibility, extent meet the data have who is convenient and flexible to manage user access to the demand. Document "14" [14] proposed an access scheme based on multiple authentication centers. This scheme assumes a trusted authentication center and multiple independent attributes authentication points, which are verified by the method of user identity and 304

multiple attribute authentications. The scheme solves the problem of data sharing in multi user identity attributes in cloud storage. Research shows that the security of cloud storage access depends on the data owner for the user access needs and related feedback. Data owner to maintain the online state can control the security of cloud computing access [15], but a large number of distribution, update the key work will give the host to increase the burden, once the host communication is blocked cannot meet the needs of users to share data. Access control based on the third party cloud server can share the workload of the host and the use of heavy encryption technology in the cloud to avoid leakage of the third parties, but the flexibility and real-time is not high enough, a large number of new users cannot cope with the needs of access [16]. Data owners should be based on the privacy of the data and the user's management mode selection of cloud access control method, in which the security of access to optimize the network efficiency. Security analysis of large data storage based on cloud platform Cloud computing market, Ali cloud, Google cloud, Microsoft cloud computing service providers more cloud storage and computing services, which help data owners to solve these massive data storage and management issues, can very well save data owners of the storage space and management costs, however, how to deal with the user data under the premise of protecting data privacy, to help data owners really get the intrinsic value of data, such as correlation, causality, etc., is a problem that has not been fully resolved. The popularity of cloud computing services has been solved. The problem of data computing has been challenged. In this scheme, the principle of polynomial solution based on finite field is applied to the algebraic cryptography, the data d Z is randomly divided into K parts (,,,) Z, and the k value is p r r 1 2 r k p considered as the root of the k polynomial. Each part is stored in a different cloud server, the process of data information is not encrypted, and we call this data processing method for the implicit mechanism. In the scheme, the various cloud servers responsible for storing the data will not reveal any information. Only when all the cloud servers are in collusion can they cause the leakage of the data information and the safe storage. Fig.3 ( k, k ) data security storage model According to the fundamental theorem of algebra, each k times equation k, for the k order equation: k k 1 x + a x + ax+ a = 0 k 1 1 0 (1) On the k root, it represents ( r, r, r,) 1 2 k {Complex set}, according to the basic definition of algebra, another way of writing it: ( x r )( x r ) ( x r ) = 0 1 2 k (2) In cryptography, we use the finite field Z p, where p is a prime number, according to the nature of the one dollar polynomial we use data d Z p instead (1) in the a, then we get the next type: 0 k k 1 k 1 x + ak 1x 0 mod p i= 1 (3) 305

Among them, o a p 1 o d p 1can be transformed into: i, k ( x r ) 0 mod p i = 1 i (4) r i is the data sub block; it is obvious that it is independent of the variable x, so it is very obvious: k r d mod p i 1 i = (5) Overall, the ( k, kscheme ) requires all of the k partitions to reshape the data, and the second scheme is extended to the first scheme, and adding redundancy to form ( k, n ) partition scheme, of which, k n and k 2, in this scheme, we only need to n in k partition to reshape the data. Similarly, when we analyze the security of the security, we can see that the stolen data information is stolen, in the ( k, kscheme, ) the d can recover the data information from the k. If you steal one of the k -1 information, then there is the possibility of d to obtain the entire data information 1/p. In the scheme, the d the whole data information can be learned by the k, which is known to be redundant information. Below our scheme will be mainly from the perspective of security privacy design, to steal the entire data information C and A in each element of the d, you must know that every element in C and A is in the information, or you can't get the full data d. This is meaningful in protecting the privacy of data information. Conclusion Cloud computing and big data is currently the world's most anticipated technological revolution, and data security is not only related to the development of cloud computing technology, but also to the privacy and interests of each user. This paper is based on 3 aspects: access control, data encryption and data integrity detection. For the research point, this paper summarizes the classical techniques and related schemes for cloud computing security. Future security for cloud computing and large data storage is still a lot of problems need to be resolved: In the access control, part of the verification scheme based on the third party is credible, but in the actual file storage operation, such authentication center is not completely credible, and its security and credibility is still required to be further improved; (2) in terms of encryption security, due to large data size, will undoubtedly increase the complexity of the algorithm, and the network will increase the complexity of the algorithm, which is easy to cause congestion. (4) Cloud storage security is not only a technical problem, but also includes the system of standardization, monitoring mode and other issues. How to establish a complete set of cloud storage mechanism let the different terminals and safer and more convenient to share data, each link can be accountability, which is a topic worthy of the probe. References [1] Hashem I A T, Yaqoob I, Anuar N B, et al. The rise of big data on cloud computing: review and open research issues. Information Systems, 2015, 47: 98-115. [2] Zuech R, Khoshgoftaar T M, Wald R. Intrusion detection and Big Heterogeneous Data: a Survey. Journal of Big Data, 2015, 2(1): 1-41. [3] Yang S, Zhang X, Diao L, et al. CAPER 3.0: A Scalable Cloud-Based System for Data-Intensive Analysis of Chromosome-Centric Human Proteome Project Data Sets. Journal of proteome research, 2015. [4] Ivan C, Popa R. Cloud based Cross Platform Mobile Applications Building and integrating cloud services with mobile client applications. Advances in Computer Science: an International Journal, 2014, 3(2): 69-77. 306

[5] Assunção M D, Calheiros R N, Bianchi S, et al. Big Data computing and clouds: Trends and future directions. Journal of Parallel and Distributed Computing, 2015, 79: 3-15. [6] Öksüz A, Walter N, Compeau D, et al. Sync&Share North Rhine-Westphalia: a case on a university-based cloud computing service provider. Journal of Information Technology Teaching Cases, 2015. [7] Chen C L, Yang T T, Shih T F. A secure medical data exchange protocol based on cloud environment. Journal of medical systems, 2014, 38(9): 1-12. [8] Dong X, Li R, He H, et al. Secure sensitive data sharing on a big data platform. Tsinghua Science and Technology, 2015, 20(1): 72-80. [9] Gonidis F, Paraskakis I, Simons A J H. Rapid Development of Service-based Cloud Applications: The Case of the Cloud Application Platforms. International Journal of Systems and Service-Oriented Engineering (IJSSOE), 2015, 5(4): 1-25. [10] Bhargava B, Khalil I, Sandhu R. Securing Big Data Applications in the Cloud. IEEE Cloud Computing, 2014 (3): 24-26. [11] Abolfazli S, Sanaei Z, Tabassi A, et al. Cloud Adoption in Malaysia: Trends, Opportunities, and Challenges. Cloud Computing, IEEE, 2015, 2(1): 60-68. [12] Liu B, Madduri R K, Sotomayor B, et al. Cloud-based bioinformatics workflow platform for large-scale next-generation sequencing analyses. Journal of biomedical informatics, 2014, 49: 119-133. [13] Sinnott R O, Voorsluys W. A scalable Cloud-based system for data-intensive spatial analysis. International Journal on Software Tools for Technology Transfer, 2015: 1-19. [14] Sahoo S S, Jayapandian C, Garg G, et al. Heart beats in the cloud: distributed analysis of electrophysiological Big Data using cloud computing for epilepsy clinical research. Journal of the American Medical Informatics Association, 2014, 21(2): 263-271. [15] Yu Y, Mu Y, Ateniese G. Recent advances in security and privacy in big data. 2015. [16] Wang L, Ranjan R, Kołodziej J, et al. Software Tools and Techniques for Big Data Computing in Healthcare Clouds. Future Generation Computer Systems, 2015, 43: 38-39. 307