Cloud computing environments and management for big data security, and performance (CBDS) Model

https://doi.org/10.53730/ijhs.v6nS1.7030

Authors

  • Amal G. Alghamdi
  • Mohammed A. AlZain
  • Mehedi Masud

Keywords:

big data, cloud computing, cloud computing performance, database, cloud security, data integrity, data security

Abstract

Big data is a technology that is growing at a tremendous speed in many sectors and fields, and this huge growth is also accompanied by the development of cloud computing, Cloud computing provides innovative organization in order to be able to meet the services you need to deal with big data in terms of infrastructure, where big data is processed and stored in the companies and establishments concerned, and unfortunately, still, It suffers from several problems and gaps that may threaten the security of this data In order to improve data security in cloud computing, provide secure access, and improve performance. This paper will discuss several concerns that may threaten data security, access, and cloud computing performance while managing big data, and that is by proposing a model(CBDS) Cloud for Big Data Security to develop performance in cloud management that meets several needs that will contribute to maintaining data integrity and confidentiality, providing secure access to data, and will greatly improve the performance of the cloud during data processing, storage, and recovery from the cloud at the user’s desire and in complete security.

Downloads

Download data is not yet available.

References

SCLPV: Secure Certificateless Public Verification for Cloud-Based Cyber-Physical-Social Systems Against Malicious Auditors Yuan Zhang, Student Member, IEEE, ChunxiangXu, Member, IEEE, Shui Yu, Senior Member, IEEE, Hongwei Li, Member, IEEE, and Xiaojun Zhang.

Privacy-Preserving Data Encryption Strategy for Big Data in Mobile Cloud Computing EnvironmentSumit Vikram Tripathi1, Ritukar2, Prof. Murthy B3, Dr. K. S. Jagadeesh Gowda4.

Intelligent cryptography approach for secure distributed big data storage in cloud computing Yibin Lia, Keke Gaib,∗, Longfei Qiuc, Meikang Qiub,1, Hui Zhaod a School of Computer Science and Technology, Shandong University, China b Department of Computer Science, Pace University, New York City, NY 10038, USA c Nanjing Foreign Language School, Jiangsu, China d Software School, Henan University, Kaifeng, Henan, 475000, China

C. Mulliner, W. Robertson, and E. Kirda. Hidden GEMs: Automated discovery of access control vulnerabilities in graphical user interfaces. In IEEE Symposium on Security and Privacy, pages 149–162, San Jose, CA, USA, 2014. IEEE.

S. Sen, S. Guha, A. Datta, S. Rajamani, J. Tsai, and J. Wing. Bootstrapping privacy compliance in big data systems. In IEEE Symposium on Security and Privacy, pages 327–342, San Jose, CA, USA, 2014. IEEE.

Protection of Big Data Privacy ABID MEHMOOD1, IYNKARAN NATGUNANATHAN1, YONG XIANG1, GUANG HUA2, AND SONG GUO3. 1School of Information Technology, Deakin University, Victoria 3125, Australia 2School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore 639798 3Department of Computer Science and Engineering, The University of Aizu, Fukushima 965-8580, Japan.

T Singh, B Kaur, GS Gaba, M Masud, M Baz, A Metaheuristic Approach to Secure Multimedia Big Data for IoT-Based Smart City ApplicationsHS Gill, Wireless Communications and Mobile Computing 2021

P Singh, M Masud, MS Hossain, A Kaur, Cross-domain secure data sharing using blockchain for industrial IoT, Journal of Parallel and Distributed Computing 156, 176-184

M Masud, GS Gaba, K Choudhary, R Alroobaea, MS Hossain, A robust and lightweight secure access scheme for cloud based E-healthcare services, Peer-to-peer Networking and Applications 14 (5), 3043-3057

MI Khalil, NZ Jhanjhi, M Humayun, SK Sivanesan, M Masud, MS Hossain, Hybrid smart grid with sustainable energy efficient resources for smart cities, Sustainable Energy Technologies and Assessments 46, 101211

P Singh, M Masud, MS Hossain, A Kaur, Blockchain and homomorphic encryption-based privacy-preserving data aggregation model in smart grid, Computers & Electrical Engineering 93, 107209

M Masud, M Alazab, K Choudhary, GS Gaba, 3P-SAKE: privacy-preserving and physically secured authenticated key establishment protocol for wireless industrial networks, Computer Communications 175, 82-90

FR Khan, M Muhabullah, R Islam, M Monirujjaman Khan, M Masud, A Cost-Efficient Autonomous Air Defense System for National Security, Security and Communication Networks 2021

A. Ullah, M. Azeem, H. Ashraf, A. A. Alaboudi, M. Humayun and N. Jhanjhi, "Secure Healthcare Data Aggregation and Transmission in IoT—A Survey," in IEEE Access, vol. 9, pp. 16849-16865, 2021, doi: 10.1109/ACCESS.2021.3052850.

M. Humayun, N. Jhanjhi, M. Alruwaili, S. S. Amalathas, V. Balasubramanian and B. Selvaraj, "Privacy Protection and Energy Optimization for 5G-Aided Industrial Internet of Things," in IEEE Access, vol. 8, pp. 183665-183677, 2020, doi: 10.1109/ACCESS.2020.3028764.

Khan, N. A., Brohi, S. N., & Jhanjhi, N. Z. (2020). UAV’s applications, architecture, security issues and attack scenarios: a survey. In Intelligent computing and innovation on data science (pp. 753-760). Springer, Singapore.

N. A. Khan, N. Z. Jhanjhi, S. N. Brohi, A. A. Almazroi and A. A. Almazroi, "A secure communication protocol for unmanned aerial vehicles," Computers, Materials & Continua, vol. 70, no.1, pp. 601–618, 2022.

M. Satheesh Kumar, S. Vimal, N.Z. Jhanjhi, Shanmuga Sundar Dhanabalan, Hesham A. Alhumyani, Blockchain based peer to peer communication in autonomous drone operation, Energy Reports, Volume 7, 2021, Pages 7925-7939, ISSN 2352-4847, https://doi.org/10.1016/j.egyr.2021.08.073.

S. Saeed, N. Z. Jhanjhi, M. Naqvi, M. Humayun and S. Ahmed, "Ransomware: A Framework for Security Challenges in Internet of Things," 2020 2nd International Conference on Computer and Information Sciences (ICCIS), 2020, pp. 1-6, doi: 10.1109/ICCIS49240.2020.9257660.

N. A. Khan, N. Z. Jhanjhi, S. N. Brohi, A. A. Almazroi and A. A. Almazroi, "A secure communication protocol for unmanned aerial vehicles," Computers, Materials & Continua, vol. 70, no.1, pp. 601–618, 2022.

M. Satheesh Kumar, S. Vimal, N.Z. Jhanjhi, Shanmuga Sundar Dhanabalan, Hesham A. Alhumyani, Blockchain based peer to peer communication in autonomous drone operation, Energy Reports,

Volume 7, 2021, Pages 7925-7939, ISSN 2352-4847, https://doi.org/10.1016/j.egyr.2021.08.073.

S. Saeed, N. Z. Jhanjhi, M. Naqvi, M. Humayun and S. Ahmed, "Ransomware: A Framework for Security Challenges in Internet of Things," 2020 2nd International Conference on Computer and Information Sciences (ICCIS), 2020, pp. 1-6, doi: 10.1109/ICCIS49240.2020.9257660.

Published

07-05-2022

How to Cite

Alghamdi, A. G., AlZain, M. A., & Masud, M. (2022). Cloud computing environments and management for big data security, and performance (CBDS) Model. International Journal of Health Sciences, 6(S1), 8860–8878. https://doi.org/10.53730/ijhs.v6nS1.7030

Issue

Section

Peer Review Articles