Secure Big Data Processing in the Cloud: An Access Pattern Matching-Based Security Assurance Framework

Authors

  • Hriday Kumar Gupta Department of Computer Science Jamia Millia Islamia New Delhi, India
  • Rafat Parveen Department of Computer Science Jamia Millia Islamia New Delhi, India

DOI:

https://doi.org/10.63671/ijsssr.v1i2.23

Keywords:

Access Pattern Matching, Big data security, Privacy protection, timestamp, XOR Public, Private Key, Double Elliptic Curve, Cryptography

Abstract

Access Pattern Matching (APM) secures and authenticates Big Data (BD) access requests. It compares the Data User (DU) access pattern with the Data Owner (DO) access structure defined during data upload. The proposed approach generates an access structure from BD reduced blocks. This structure defines data access patterns. The Cloud Server (CS) compares the access pattern in a DU’s access request to the DO’s access structure. The access pattern generally includes the DU’s desired data blocks or subsets of BD, their order, and any DO-defined criteria or constraints. The access structure checks this pattern to see if the DU can access the data. System design determines access pattern matching algorithms. These algorithms compare the access pattern and structure to the DO’s approved patterns and circumstances. The DU gets data if the access pattern meets the access structure. Access pattern matching restricts BD content to authorized users with valid access patterns. It prevents unauthorized access and enforces DO access control regulations to safeguard data.

Downloads

Published

2023-09-30

How to Cite

Secure Big Data Processing in the Cloud: An Access Pattern Matching-Based Security Assurance Framework. (2023). International Journal of Science and Social Science Research, 1(2), 94-99. https://doi.org/10.63671/ijsssr.v1i2.23

Similar Articles

1-10 of 209

You may also start an advanced similarity search for this article.