Secure Big Data Processing in the Cloud: An Access Pattern Matching-Based Security Assurance Framework
DOI:
https://doi.org/10.63671/ijsssr.v1i2.23Keywords:
Access Pattern Matching, Big data security, Privacy protection, timestamp, XOR Public, Private Key, Double Elliptic Curve, CryptographyAbstract
Access Pattern Matching (APM) secures and authenticates Big Data (BD) access requests. It compares the Data User (DU) access pattern with the Data Owner (DO) access structure defined during data upload. The proposed approach generates an access structure from BD reduced blocks. This structure defines data access patterns. The Cloud Server (CS) compares the access pattern in a DU’s access request to the DO’s access structure. The access pattern generally includes the DU’s desired data blocks or subsets of BD, their order, and any DO-defined criteria or constraints. The access structure checks this pattern to see if the DU can access the data. System design determines access pattern matching algorithms. These algorithms compare the access pattern and structure to the DO’s approved patterns and circumstances. The DU gets data if the access pattern meets the access structure. Access pattern matching restricts BD content to authorized users with valid access patterns. It prevents unauthorized access and enforces DO access control regulations to safeguard data.
Downloads
Published
Issue
Section
License
Copyright (c) 2023 International Journal of Science and Social Science Research

This work is licensed under a Creative Commons Attribution 4.0 International License.
