Security Mechanisms in Cloud Computing-Based Big Data

Security Mechanisms in Cloud Computing-Based Big Data

Addepalli V. N. Krishna, Balamurugan M.
ISBN13: 9781522573357|ISBN10: 1522573356|ISBN13 Softcover: 9781522590552|EISBN13: 9781522573364
DOI: 10.4018/978-1-5225-7335-7.ch009
Cite Chapter Cite Chapter

MLA

Krishna, Addepalli V. N., and Balamurugan M. "Security Mechanisms in Cloud Computing-Based Big Data." Handbook of Research on the IoT, Cloud Computing, and Wireless Network Optimization, edited by Surjit Singh and Rajeev Mohan Sharma, IGI Global, 2019, pp. 165-195. https://doi.org/10.4018/978-1-5225-7335-7.ch009

APA

Krishna, A. V. & M., B. (2019). Security Mechanisms in Cloud Computing-Based Big Data. In S. Singh & R. Mohan Sharma (Eds.), Handbook of Research on the IoT, Cloud Computing, and Wireless Network Optimization (pp. 165-195). IGI Global. https://doi.org/10.4018/978-1-5225-7335-7.ch009

Chicago

Krishna, Addepalli V. N., and Balamurugan M. "Security Mechanisms in Cloud Computing-Based Big Data." In Handbook of Research on the IoT, Cloud Computing, and Wireless Network Optimization, edited by Surjit Singh and Rajeev Mohan Sharma, 165-195. Hershey, PA: IGI Global, 2019. https://doi.org/10.4018/978-1-5225-7335-7.ch009

Export Reference

Mendeley
Favorite

Abstract

In the existent system, data is encrypted and stored when passed to the cloud. During any operations on the data, it is decrypted and then the computation is done. This decrypted data is vulnerable and prone to be misused. After the computations are done, the data and the result are encrypted and stored back in the cloud. This creates an overhead to the system as well as increases time complexity. With this chapter, the authors aim to reduce the overhead of the systems to perform repeated encryptions and decryptions. This can be done by allowing the computations to happen directly on the encrypted text. The result obtained by performing computations on encrypted data will be the same as the ones done on the original plain text. This new security solution is fully fit for processing and retrieval of encrypted data, effectively leading to the broad applicable project, the security of data transmission, and the storage of data. The work is secured further with additional concepts like probabilistic and time stamp-based encryption processes.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.