201
Views
0
CrossRef citations to date
0
Altmetric
Original Articles

Fast-Sec: an approach to secure Big Data processing in the cloud

, , , , , & show all
Pages 272-287 | Received 19 Apr 2017, Accepted 21 May 2017, Published online: 14 Jun 2017

References

  • Pereira DA , Moraisde WO , Freitasde EP . Nosql real-time database performance comparison. Int J Parallel Emergent Distrib Syst. 2017:1–13. DOI:10.1080/17445760.2017.1307367
  • Choi J , Nazareth DL , Ngo-Ye TL . The effect of innovation characteristics on cloud computing diffusion. J Comput Inform Syst. 2017:1–9. DOI:10.1080/08874417.2016.1261377
  • Jansen W , Grance T . Guidelines on security and privacy in public cloud computing; 2011. ( Technical Report 800-144); [cited 2015 Sep]. Available from http://csrc.nist.gov/publications/nistpubs/800-144/SP800-144.pdf
  • Stonebraker M , Madden S , Dubey P . Intel “Big Data” science and technology center vision and execution plan, SIGMOD Rec. 42; 2013. p. 44–49. DOI:10.1145/2481528.2481537
  • Anjos JCS , Fedak G , Geyer CFR . BIGhybrid: a simulator for MapReduce applications in hybrid distributed infrastructures validated with the Grid5000 experimental platform. Concurr Comput Pract Exper. 2015;1:1–24. DOI:10.1002/cpe.3665
  • Xu G , Yu W , Chen Z , et al . A cloud computing based system for cyber security management. Int J Parallel Emergent Distrib Syst. 2014;30:29–45. DOI:10.1080/17445760.2014.925110
  • Ahmed M , Litchfield AT . Taxonomy for identification of security issues in cloud computing environments. J Comput Inform Syst. 2016:1–10. DOI:10.1080/08874417.2016.1192520
  • Hu VC , Ferraiolo D , Kuhn R , et al . Computer security; 2014. ( Technical Report 800-162); [cited 2015 Sep]. DOI:10.6028/NIST.SP.800-162
  • Whitworth J , Suthaharan S . Security problems and challenges in a machine learning-based hybrid big data processing network systems. SIGMETRICS Perform Eval Rev. 2014;41:82–85. DOI:10.1145/2627534.2627560
  • Liu Q , Tan CC , Wu J , et al . Reliable re-encryption in unreliable clouds. In: 2011 IEEE Global Telecommunications Conference (GLOBECOM 2011), Houston, TX; 2011 Dec. p. 1–5.
  • Chen D , Zhao H . Data security and privacy protection issues in cloud computing. In: 2012 International Conference on Computer Science and Electronics Engineering (ICCSEE), Vol. 1; 2012 Mar. p. 647–651.
  • Rajan S , Ginkel WV , Sundaresan N , et al . Expanded top ten big data security and privacy challenges; 2013. (Technical Report). Available from: https://downloads.cloudsecurityalliance.org/initiatives/bdwg/Expanded_Top_Ten_Big_Data_Security_and_Privacy_Challenges.pdf
  • Anjos JCS , Assuncao MD , Bez J , et al . SMART: an application framework for real time big data analysis on heterogeneous cloud environments. In: 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computingand Communications; Dependable, Autonomic and Secure Computing; PervasiveIntelligence and Computing (CIT/IUCC/DASC/PICOM), Liverpool, UK; 2015 Oct. p. 199–206.
  • Zhang W , Lin Y , Xiao S , et al . Secure distributed keyword search in multiple clouds. In: 2014 IEEE 22nd International Symposium of Quality of Service (IWQoS); 2014 May. p. 370–379.
  • Zhang C , Chang EC , Yap RH . Tagged-MapReduce: a general framework for secure computing with mixed-sensitivity data on hybrid clouds. In: 2014 14th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid), Chicago, IL, USA; 2014 May. p. 31–40.
  • Hu VC , Grance T , Ferraiolo DF , et al . An access control scheme for big data processing. In: 2014 International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom). Miami, FL, USA: IEEE Computer Society; 2014 Oct. p. 1–7.
  • Lublinsky B , Smith KT , Yakubovich A . Professional Hadoop solutions. 1st ed. Indianapolis (IN): Wiley; 2013. p. 504.
  • Zheng K , Jiang W . A token authentication solution for Hadoop based on kerberos pre-authentication. In: 2014 International Conference on Data Science and Advanced Analytics (DSAA); 2014 Oct. p. 354–360.
  • Galibus T , Vissia H . Cloud storage security. In: Chan K , editor. Network Security and Communication Engineering. CRC Press; 2015. p. 123–126.
  • U.S. Commerceof . Announcing the Advanced Encryption Standard (AES). Springfield, VA; 2001. ( Technical Report (NTIS)); [cited 2015 Sep]. Available from: http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
  • Hu VC , Kuhn DR , Xie T , et al . Model checking for verification of mandatory access control models and properties. Int J Softw Eng Knowl Eng. 2011;21:103–127.
  • Zeng W , Yang Y , Luo B . Access control for big data using data content. In: 2013 IEEE International Conference on Big Data. Silicon Valley, CA: IEEE Computer Society; 2013 Oct. p. 45–47.
  • Bethencourt J , Sahai A , Waters B . Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, 2007. SP ’07; 2007 May. p. 321–334.
  • Goyal V , Pandey O , Sahai A , et al . Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS ’06, Alexandria, VA, USA. New York (NY): ACM; 2006. p. 89–98. DOI:10.1145/1180405.1180418
  • Qiao Z , Liang S , Davis S , et al . Survey of attribute based encryption. In: 2014 15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD); 2014 Jun. p. 1–6.
  • Liu Z , Wong DS . Practical attribute-based encryption: traitor tracing, revocation, and large universe; 2014. (Cryptology ePrint Archive, Report 2014/616). Available from: http://eprint.iacr.org
  • Le DH , Truong HL , Copil G , et al . SALSA: a framework for dynamic configuration of cloud services. In: 2014 IEEE 6th International Conference on Cloud Computing Technology and Science (CloudCom); 2014 Dec. p. 146–153.
  • Delamare S , Fedak G , Kondo D , et al . SpeQuloS: a QoS service for BoT applications using best effort distributed computing infrastructures. In: Proceedings of the 21th International Symposium on High-Performance Parallel and Distributed Computing, HPDC ’12, Delft, The Netherlands. New York (NY): ACM; 2012. p. 173–186. DOI:10.1145/2287076.2287106
  • Zhang T . Reliable event messaging in big data enterprises: looking for the balance between producers and consumers. In: Proceedings of the 9th ACM International Conference on Distributed Event-Based Systems, DEBS ’15, Oslo, Norway. New York (NY): ACM; 2015. p. 226–233.
  • Alexandrov A , Bergmann R , Ewen S , et al . The Stratosphere platform for big data analytics. VLBD J. 2014;23:939–964.
  • Mashayekhy L , Nejad M , Grosu D . A PTAS mechanism for provisioning and allocation of heterogeneous cloud resources. IEEE Trans Parallel Distrib Syst. 2014:1–14.
  • BV BDS . Storgrid EFSS: secure enterprise file sharing software; 2016. Available from: http://www.storgrid.com/

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.