Cloud computing environments and management for big data security, and performance (CBDS) Model
Keywords:
big data, cloud computing, cloud computing performance, database, cloud security, data integrity, data securityAbstract
Big data is a technology that is growing at a tremendous speed in many sectors and fields, and this huge growth is also accompanied by the development of cloud computing, Cloud computing provides innovative organization in order to be able to meet the services you need to deal with big data in terms of infrastructure, where big data is processed and stored in the companies and establishments concerned, and unfortunately, still, It suffers from several problems and gaps that may threaten the security of this data In order to improve data security in cloud computing, provide secure access, and improve performance. This paper will discuss several concerns that may threaten data security, access, and cloud computing performance while managing big data, and that is by proposing a model(CBDS) Cloud for Big Data Security to develop performance in cloud management that meets several needs that will contribute to maintaining data integrity and confidentiality, providing secure access to data, and will greatly improve the performance of the cloud during data processing, storage, and recovery from the cloud at the user’s desire and in complete security.
Downloads
References
SCLPV: Secure Certificateless Public Verification for Cloud-Based Cyber-Physical-Social Systems Against Malicious Auditors Yuan Zhang, Student Member, IEEE, ChunxiangXu, Member, IEEE, Shui Yu, Senior Member, IEEE, Hongwei Li, Member, IEEE, and Xiaojun Zhang.
Privacy-Preserving Data Encryption Strategy for Big Data in Mobile Cloud Computing EnvironmentSumit Vikram Tripathi1, Ritukar2, Prof. Murthy B3, Dr. K. S. Jagadeesh Gowda4.
Intelligent cryptography approach for secure distributed big data storage in cloud computing Yibin Lia, Keke Gaib,∗, Longfei Qiuc, Meikang Qiub,1, Hui Zhaod a School of Computer Science and Technology, Shandong University, China b Department of Computer Science, Pace University, New York City, NY 10038, USA c Nanjing Foreign Language School, Jiangsu, China d Software School, Henan University, Kaifeng, Henan, 475000, China
C. Mulliner, W. Robertson, and E. Kirda. Hidden GEMs: Automated discovery of access control vulnerabilities in graphical user interfaces. In IEEE Symposium on Security and Privacy, pages 149–162, San Jose, CA, USA, 2014. IEEE.
S. Sen, S. Guha, A. Datta, S. Rajamani, J. Tsai, and J. Wing. Bootstrapping privacy compliance in big data systems. In IEEE Symposium on Security and Privacy, pages 327–342, San Jose, CA, USA, 2014. IEEE.
Protection of Big Data Privacy ABID MEHMOOD1, IYNKARAN NATGUNANATHAN1, YONG XIANG1, GUANG HUA2, AND SONG GUO3. 1School of Information Technology, Deakin University, Victoria 3125, Australia 2School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore 639798 3Department of Computer Science and Engineering, The University of Aizu, Fukushima 965-8580, Japan.
T Singh, B Kaur, GS Gaba, M Masud, M Baz, A Metaheuristic Approach to Secure Multimedia Big Data for IoT-Based Smart City ApplicationsHS Gill, Wireless Communications and Mobile Computing 2021
P Singh, M Masud, MS Hossain, A Kaur, Cross-domain secure data sharing using blockchain for industrial IoT, Journal of Parallel and Distributed Computing 156, 176-184
M Masud, GS Gaba, K Choudhary, R Alroobaea, MS Hossain, A robust and lightweight secure access scheme for cloud based E-healthcare services, Peer-to-peer Networking and Applications 14 (5), 3043-3057
MI Khalil, NZ Jhanjhi, M Humayun, SK Sivanesan, M Masud, MS Hossain, Hybrid smart grid with sustainable energy efficient resources for smart cities, Sustainable Energy Technologies and Assessments 46, 101211
P Singh, M Masud, MS Hossain, A Kaur, Blockchain and homomorphic encryption-based privacy-preserving data aggregation model in smart grid, Computers & Electrical Engineering 93, 107209
M Masud, M Alazab, K Choudhary, GS Gaba, 3P-SAKE: privacy-preserving and physically secured authenticated key establishment protocol for wireless industrial networks, Computer Communications 175, 82-90
FR Khan, M Muhabullah, R Islam, M Monirujjaman Khan, M Masud, A Cost-Efficient Autonomous Air Defense System for National Security, Security and Communication Networks 2021
A. Ullah, M. Azeem, H. Ashraf, A. A. Alaboudi, M. Humayun and N. Jhanjhi, "Secure Healthcare Data Aggregation and Transmission in IoT—A Survey," in IEEE Access, vol. 9, pp. 16849-16865, 2021, doi: 10.1109/ACCESS.2021.3052850.
M. Humayun, N. Jhanjhi, M. Alruwaili, S. S. Amalathas, V. Balasubramanian and B. Selvaraj, "Privacy Protection and Energy Optimization for 5G-Aided Industrial Internet of Things," in IEEE Access, vol. 8, pp. 183665-183677, 2020, doi: 10.1109/ACCESS.2020.3028764.
Khan, N. A., Brohi, S. N., & Jhanjhi, N. Z. (2020). UAV’s applications, architecture, security issues and attack scenarios: a survey. In Intelligent computing and innovation on data science (pp. 753-760). Springer, Singapore.
N. A. Khan, N. Z. Jhanjhi, S. N. Brohi, A. A. Almazroi and A. A. Almazroi, "A secure communication protocol for unmanned aerial vehicles," Computers, Materials & Continua, vol. 70, no.1, pp. 601–618, 2022.
M. Satheesh Kumar, S. Vimal, N.Z. Jhanjhi, Shanmuga Sundar Dhanabalan, Hesham A. Alhumyani, Blockchain based peer to peer communication in autonomous drone operation, Energy Reports, Volume 7, 2021, Pages 7925-7939, ISSN 2352-4847, https://doi.org/10.1016/j.egyr.2021.08.073.
S. Saeed, N. Z. Jhanjhi, M. Naqvi, M. Humayun and S. Ahmed, "Ransomware: A Framework for Security Challenges in Internet of Things," 2020 2nd International Conference on Computer and Information Sciences (ICCIS), 2020, pp. 1-6, doi: 10.1109/ICCIS49240.2020.9257660.
N. A. Khan, N. Z. Jhanjhi, S. N. Brohi, A. A. Almazroi and A. A. Almazroi, "A secure communication protocol for unmanned aerial vehicles," Computers, Materials & Continua, vol. 70, no.1, pp. 601–618, 2022.
M. Satheesh Kumar, S. Vimal, N.Z. Jhanjhi, Shanmuga Sundar Dhanabalan, Hesham A. Alhumyani, Blockchain based peer to peer communication in autonomous drone operation, Energy Reports,
Volume 7, 2021, Pages 7925-7939, ISSN 2352-4847, https://doi.org/10.1016/j.egyr.2021.08.073.
S. Saeed, N. Z. Jhanjhi, M. Naqvi, M. Humayun and S. Ahmed, "Ransomware: A Framework for Security Challenges in Internet of Things," 2020 2nd International Conference on Computer and Information Sciences (ICCIS), 2020, pp. 1-6, doi: 10.1109/ICCIS49240.2020.9257660.
Published
How to Cite
Issue
Section
Copyright (c) 2022 International journal of health sciences

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Articles published in the International Journal of Health Sciences (IJHS) are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJHS right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.
Articles published in IJHS can be copied, communicated and shared in their published form for non-commercial purposes provided full attribution is given to the author and the journal. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
This copyright notice applies to articles published in IJHS volumes 4 onwards. Please read about the copyright notices for previous volumes under Journal History.