skip to main content
10.1145/2905055.2905202acmotherconferencesArticle/Chapter ViewAbstractPublication PagesictcsConference Proceedingsconference-collections
research-article

Agent based Security Model for Cloud Big Data

Published: 04 March 2016 Publication History

Abstract

As we know that digitization is one of boon of 21st century technologies. With the massstorage of digital information and development of internet based technologies like cloud computing, researcher interest has been increased in Big Data and its security. The term Big Data refers to the huge amount of digital information. Actually, Big Data is not a fully new technology; but it is the expansion of data mining technique. In this paper, we propose an agent based security model for cloud big data. The main objective of this security model is to facilitate the IT companies in term of data protection; those are using Cloud Big Data for the analyzing purpose.

References

[1]
Cloud Security Alliance (CSA) 2014. Big Data Working Group Big Data Taxonomy, September 14,https://cloudsecurityalliance.org/research/big-data/
[2]
Roy, I., Setty, S.T.V., Kilzer, A., Shmatikov, V., Shmatikov, E., Witchel 2010. Airavat: Security and privacy for MapReduce in USENIX conference on Networked systems design and implementation, pp. 20--20, 2010.
[3]
Yulong, R., Wen T. 2012. A service integrity assurance framework for cloud computing based on MapReduce. In Proceedings of2012 IEEE 2nd International Conference on Cloud Computing and Intelligent Systems(Hangzhou, China, Oct. 30 2012-Nov. 1 2012) CCIS '12, vol. 01, IEEE, New York, NY, 240--244. DOI= http://dx.doi.org/10.1109/CCIS.2012.6664404.
[4]
Singh, J.P., Mamta, Kumar, S. 2015, Authentication and Encryption in Cloud Computing. In Proceedings of 2015International Conference on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials(Chennai, T.N., India, May 6-8 2015)ICSTM'15,IEEE, New York, NY, 216--219. DOI= http://dx.doi.org/10.1109/ICSTM.2015.7225417.
[5]
Gadepally, V., Hancock, B., Kaiser, B., Kepner, J., Michaleas, P., Varia, M., Yerukhimovich, A. 2015. Computing on Masked Data to improve the security of big data. In Proceedings of2015 IEEE International Symposium on Technologies for Homeland Security (Waltham, MA, April 14-16 2015) HST'15,IEEE, New York, NY, 1--6. DOI= http://dx.doi.org/10.1109/THS.2015.7225312
[6]
Zhiyuan, T., Nagar, U.T., Xiangjian H, Nanda, P., Ren, P.L., Song W., Jiankun H 2014. Enhancing Big Data Security with Collaborative Intrusion Detection.Cloud Computing IEEE, (September 2014), 27--33. DOI= http://dx.doi.org/10.1109/MCC.2014.53.
[7]
Sung-Hwan K., Nam-Uk K., Tai-Myoung C 2013. Attribute Relationship Evaluation Methodology for Big Data Security.In Proceedings of 2013 International Conference on IT Convergence and Security (Macao, China, Dec. 16-18 2013). ICITCS'13,IEEE, New York, NY, 1--4, DOI= http://dx.doi.org/10.1109/ICITCS.2013.6717808
[8]
Min-Sheng, L., Chien-Yi C., Yuh-Jye L., Hsing- Kuo P. 2013, Malicious URL filtering --- A big data application. In Proceedings of 2013 IEEE International Conference on Big Data(Silicon Valley, CA, Oct. 6-9 2013),IEEE, 589--596. DOI= http://dx.doi.org/10.1109/BigData.2013.6691627
[9]
Okman, L., Gal-Oz, N, Gonen, Y., Gudes, E., Abramov, J. 2011. Security Issues in NoSQL Databases.In Proceedings of 2011 IEEE 10th International Conferenece onTrust, Security and Privacy in Computing and Communications(Changsha, China, Nov. 16-18 2011), TrustCom'11, IEEE, New York, NY, 541--547. DOI= http://dx.doi.org/10.1109/TrustCom.2011.70
[10]
Xueli, H, Xiaojiang, D. 2014. Achieving big data privacy via hybrid cloud.In Proceedings of 2014 IEEE Conference on Computer Communications Workshops (Toronto, ON, April 27 2014-May 2 2014), INFOCOM WKSHPS'14, IEEE, New York, NY, pp. 512--517. DOI= http://dx.doi.org/10.1109/INFCOMW.2014.6849284.
[11]
Yang Y., Xianghan Z, Bogang L. 2013. Type Based Keyword Search for Securing Big Data. In Proceedings of 2013 International Conference on Cloud Computing and Big Data (Fuzhou, China, Dec. 16-19 2013), CloudCom-Asia'13, 354--359. DOI= http://dx.doi.org/10.1109/CLOUDCOM-ASIA.2013.107
[12]
Kumar, S. and Shekhar, J. 2014. Current Security problems and solutions of Cloud storage:An Analysis.In Proceedingsof International Multi Track Conference on Sciences, Engineering & Technical Innovation(Jalandhar, Punjab, India, June 04-06 2014) IMTC'14, Vol. 1, 317--321. DOI= 10.13140/RG.2.1.3173.4801
[13]
Simone Brunozzi. 2012. Big Data and NoSQL with Amazon DynamoDB. In Proceedings of the 2012 workshop on Management of big data systems (MBDS '12). ACM, New York, NY, USA, 41--42. DOI=/proxy/http://dx.doi.org/10.1145/2378356.2378369.
[14]
John Klein, Ian Gorton, Neil Ernst, Patrick Donohoe, Kim Pham, andChrisjan Matser. 2015. Performance Evaluation of NoSQL Databases: A Case Study. In Proceedings of the 1st Workshop on PerformanceAnalysis of Big Data Systems (PABS '15). ACM, New York, NY, USA,5--10. DOI=/proxy/http://dx.doi.org/10.1145/2694730.2694731.
[15]
Current Data Security Issues of NoSQL Databases 2014. White paper. FidelisCybersecurity. URL=/proxy/https://www.fidelissecurity.com/files/NDFInsightsWhitePaper.pdf
[16]
Lei, X., Chunxiao, J., Jian, W., Jian Y., Yong R. 2014. Information Security in Big Data: Privacy and Data Mining.IEEE Access, vol. 2, 1149--1176. DOI=/proxy/http://dx.doi.org/10.1109/ACCESS.2014.2362522

Cited By

View all
  • (2023)A Novel Hybrid Encryption Technique for Cloud Data Security2023 3rd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE)10.1109/ICACITE57410.2023.10182499(1883-1886)Online publication date: 12-May-2023
  • (2019)Impact of SQL Injection in Database Security2019 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE)10.1109/ICCIKE47802.2019.9004430(296-299)Online publication date: Dec-2019
  • (2019)An Authentication Model for Secure Electronic Transaction2019 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE)10.1109/ICCIKE47802.2019.9004334(283-286)Online publication date: Dec-2019
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICTCS '16: Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies
March 2016
843 pages
ISBN:9781450339629
DOI:10.1145/2905055
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 04 March 2016

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Agent Based Security
  2. Big Data Security
  3. Cloud Security
  4. NoSQL Security

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ICTCS '16

Acceptance Rates

Overall Acceptance Rate 97 of 270 submissions, 36%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)12
  • Downloads (Last 6 weeks)1
Reflects downloads up to 22 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2023)A Novel Hybrid Encryption Technique for Cloud Data Security2023 3rd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE)10.1109/ICACITE57410.2023.10182499(1883-1886)Online publication date: 12-May-2023
  • (2019)Impact of SQL Injection in Database Security2019 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE)10.1109/ICCIKE47802.2019.9004430(296-299)Online publication date: Dec-2019
  • (2019)An Authentication Model for Secure Electronic Transaction2019 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE)10.1109/ICCIKE47802.2019.9004334(283-286)Online publication date: Dec-2019
  • (2017)A Review of MongoDB and Singularity Container Security in regards to HIPAA RegulationsCompanion Proceedings of the10th International Conference on Utility and Cloud Computing10.1145/3147234.3148133(91-97)Online publication date: 5-Dec-2017
  • (2017)Secure NoSQL Based Medical Data Processing and RetrievalCompanion Proceedings of the10th International Conference on Utility and Cloud Computing10.1145/3147234.3148132(99-105)Online publication date: 5-Dec-2017

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media