A Big Data Storage Scheme Based on Distributed Storage Locations and Multiple Authorizations
Title | A Big Data Storage Scheme Based on Distributed Storage Locations and Multiple Authorizations |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Al-Odat, Zeyad A., Al-Qtiemat, Eman M., Khan, Samee U. |
Conference Name | 2019 IEEE 5th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS) |
Date Published | May 2019 |
Publisher | IEEE |
ISBN Number | 978-1-7281-0006-7 |
Keywords | authenticity properties, authorizations, Big Data, big data security in the cloud, Big Data storage scheme, cloud computing, cloud location, cryptography, Distributed databases, distributed storage locations, distribution phase, dividing phase, Encryption, Metrics, pubcrawl, resilience, Resiliency, retrieving phase, Scalability, secure hash algorithm, secured distributed Big Data, security, security property, Shamir secret sharing algorithm, Standards, storage management |
Abstract | This paper introduces a secured and distributed Big Data storage scheme with multiple authorizations. It divides the Big Data into small chunks and distributes them through multiple Cloud locations. The Shamir's Secret Sharing and Secure Hash Algorithm are employed to provide the security and authenticity of this work. The proposed methodology consists of two phases: the distribution and retrieving phases. The distribution phase comprises three operations of dividing, encrypting, and distribution. The retrieving phase performs collecting and verifying operations. To increase the security level, the encryption key is divided into secret shares using Shamir's Algorithm. Moreover, the Secure Hash Algorithm is used to verify the Big Data after retrieving from the Cloud. The experimental results show that the proposed design can reconstruct a distributed Big Data with good speed while conserving the security and authenticity properties. |
URL | https://ieeexplore.ieee.org/document/8819475 |
DOI | 10.1109/BigDataSecurity-HPSC-IDS.2019.00014 |
Citation Key | al-odat_big_2019 |
- Metrics
- storage management
- standards
- Shamir secret sharing algorithm
- security property
- security
- secured distributed Big Data
- secure hash algorithm
- Scalability
- retrieving phase
- Resiliency
- resilience
- pubcrawl
- authenticity properties
- encryption
- dividing phase
- distribution phase
- distributed storage locations
- Distributed databases
- Cryptography
- cloud location
- Cloud Computing
- Big Data storage scheme
- big data security in the cloud
- Big Data
- authorizations