International Research Journal of Engineering and Technology (IRJET) Volume: 04 Issue: 04 | Apr -2017www.irjet.net
e-ISSN: 2395 -0056 p-ISSN: 2395-0072
Review on Data Security on Cloud using Homomorphic Encryption over Big Data Rinkal Patel1 1PG
Student, B.V.M. Engineering College, V.V. Nagar, Gujarat, India. ---------------------------------------------------------------------***--------------------------------------------------------------------comprising of data privacy issue or confidentiality of data is Abstract—: Over a period of the last decade, cloud computing has been the most emerging technology with steady growth. Traditional data storage systems are not able to handle large amount of data and analysis of those data. That's where cloud computing comes into the picture as it has massive amount of storage and management capability where vast information can be deposited inside the cloudlets. By using data mining attacks, one can easily gain unauthorized access to valuable and sensitive information of Big Data, the consequences of which can be fatal. My aim is to protect confidentiality of data stored in cloud by making the use of digital signature and homomorphic encryption algorithm. Using a secure k-means data mining approach I will divide the Big Data, expecting that the data to be divided among various hosts while keeping the privacy. The methodology can maintain the accuracy and validity of the current k-means to produce the final results even in the distributed environment. Keywords—Homomorphic Encryption, HDFS, k-means.
1.INTRODUCTION Main goal of cloud computing is to share os, applications, storage, data and processing capacity among users. Cloud computing is an emerging computingtechnology that uses the internet and central remote servers to maintain data and application on cloud. Cloud computing collects all the computing resources and manages them automatically through software [5]. The users need not care how to buy servers, software solutions and so on. Users can buy the computing resource through internet according to their own needs. Cloud Computing has emerged as an important paradigm that has attracted considerable attention in both industry and academia[6].five essential characteristics of Cloud Computing namely: on-demand selfservice, broad network access, resource pooling, rapid elasticity and measured service. The cloud services can be divided into three categories: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). A cloud might be restricted to a single organization or group (private clouds), available to the general public over the Internet (public clouds), or shared by multiple groups or organizations (hybrid clouds) [5].
one of the major [1].Lot of advantages are bring for the use of cloud computing like reduced costs, easy maintenance and re-provisioning of resources. As all the data resides with the cloud provider, a serious data privacy issue arises if the provider misuses the data or the information [1]. This paper perform k-means clustering Algorithm of the data set which is partitioned horizontally using “HDFS” and gathered numbers of nodes. The methodology first run locally and then performs “k-means” for combined data on encrypted result to get complete (final) result. And after then run on “HDFS” and also then perform same above steps.
2.LITERATURE SURVEY A) Title :Secure Data Mining Homomorphic Encryption [1].
in Cloud using
Summary :They are provides secured mining of data in cloud using “homomorphic encryption” encryption technique. Here proposed approach perform k-means clustering Algorithm of a data set, which is partitioned horizontally using “HDFS” and save two nodes. This methodology first run locally and then implement “k-means” for combined data on encrypted result to get complete(final) result. B) Title :A Fully Homomorphic Encryption implementation on Cloud Computing Encryption[2] Summary: They are propose security ensurement both in public and also private cloud. The proposed system is used to send data to the cloud providers. Thus enabling of cloud computing merchant is done to perform operations on the data as per user call, such as analyzing sales patterns, beyond exposing the real data. This can be achieved by cryptosystems based on “Homomorphic Encryption”. Three type of homomorphic encryptions are possible.1)partial HE, 2) somewhat HE, 3) fully HE. Authors recommend to enhance HE algorithm’s complexity and response time to requests gets calculated according to public key length.
Cloud Computing security challenges and it’s also an issue to many researchers; first priority was to focus on security which is the biggest concern of organizations that are considering a move to the cloud[6]. Above issues Security © 2017, IRJET
|
Impact Factor value: 5.181
|
ISO 9001:2008 Certified Journal
| Page 1807